Cybersecurity & Awareness Fair

2020 Cyberfair

Theme: Cyber Wizardy

Cyber wizardy banner 2020

Thursday, October 29th 2020

 

Cyber Fair 2020 Poster

Event Summary

The 16th edition of the Cyber Security and Awareness Fair was our first successful virtual Cyber Fair .  This year's event marked the first ever Capture the Flag and Virtual format. Attendees entered the event though a wizards landscape in to various Zoom rooms for the presentations. The Job Fair was hosted on the Brazen software platform. This year also brought together the college of Business, Engineering, and Science to host 4 of the 6 hands-on demonstrations alongside dynamic speakers like Bryan S. Ware from CISA covering “ Securing our Nation's  Digital Networks” and CPP alum Diane Miller on“Launching your career in challenging times .”  Chaffey College and Troy High School hosted demonstrations on securing your home & work devices and prepping for Cyberpatriot. CPP took our top five spots in the poster contest. The third Cybersecurity Workforce Job Fair was held with companies in attendance and students submitting resumes. Key recruiters were Dreambox Creations, AT&T, Tanium, and City of Hope. All  presentations, demonstrations, and poster sessions were recorded on the day of the fair and were made available for viewing after the event. 

Demo Village

Presented by /script

Learn about possible attack surfaces for routers and how to secure router/Lapps in order to keep IoT devices safe. Recent exploits of IoT vulnerabilities.

Presentation Link:

zoom logo

Presented by FAST

Artificial intelligence (AI) and facial recognition play large roles in our society. Unfortunately, they come with the all too common bias. FAST recognizes these issues and presents to you "AI: From Facial Recognition to TikTok." In our booth, we will look at the technical and societal  issues that plague artificial intelligence and facial recognition and will discuss common security issues that can be easily fixed to secure even those who find computers most difficult. Additionally, we will discuss the security of popular apps: TikTok and Snapchat.

Presentation Link:

zoom logo

Presented by Troy

Learn how to prepare and train for Cyberpatriot :

- How to compete remotely in the world of COVID

 - Practices on zoom

 - Team digital coordination 

 - Q&A with Coach Stubblefield (2x national champion) and some Troy HS CyberPatriot competitors

Presentation Link:

zoom logo

Presented by MISSA

The attacks by phishing websites have increased during covid-19. It is important that everyone, from organizations to individuals becomes aware of it in order to prevent thousands of financial losses and more importantly identity theft.

Purpose of this project is to teach people the dangers of phishing. Showing exactly how user credentials are logged and then manipulated by attackers.

Presentation Link:

zoom logo

Presented by Chaffey

Remote working is the new normal but the cyber threats have only grown and adapted. This video will show you cyber security weaknesses, cyber hacks, and things you can do to secure your mobile devices and routers at your home office and your small business away from the home.

Presentation Link:

zoom logo

Presented by SWIFT

Penetration testing plays a crucial role in cyber security by simulating how an attacker can gain access to an organization’s resources in order to prevent future attacks before they can occur. In the era of remote learning and working from home, the number of people connecting to organizations remotely is greater than ever, resulting in new potential vulnerabilities within an organization. In our presentation, we will be demonstrating the different steps in penetration testing and showcasing typical methods used by potential attackers.

Presentation Link:

zoom logo

Noble Theatre of Speakers

Brett St Pierre HID,

The days of plastic are numbered. Learn about how physical access will continue to transition from smart cards to smart devices for seamless authentication and access.

Presentation Link:

zoom logo

Diane Miller, Northrop Grumman

In challenging times, perhaps even more so during a global pandemic, employers need to hire great cybersecurity talent. For some employers, their needs may not change but certainly how they fill those needs may be very different now. Diane will share insights about the Future of Work – how careers are evolving and how launching your career during a challenging time might require different approaches and skills. Let’s make sure the highly talented cybersecurity students at Cal Poly Pomona become part of our diverse global cybersecurity workforce!

 

Presentation Link:

zoom logo

Brian Donohue, Red Canary

There are nearly 200 parent techniques in the MITRE ATT&CK matrix—and who-knows-how-many subtechniques. If you try to develop thorough detection or preventive coverage for all of them, you'll end up miring your security operations team with an endless amount of work that delivers a questionable amount of value. In this talk, we'll explore how you can focus your efforts on the ATT&CK techniques that adversaries are most likely to leverage against you and the data sources that give you the best visibility into those techniques. 

 

Presentation Link:

zoom logo

Bryan S. Ware,  Cyber Infrastructure

Keynote

 Securing the Nation's  Cyber Infrastructure, Nation State attacks during Covid19 ,and career opportunities with CISA.

Presentation Link:

zoom logo

Warren Yu, Naval Postgraduate School

Come learn about little-known federal internships and scholarships (many of them dealing directly with cyber security) that pay you during summers, for tuition, or to launch a career in a STEM-related field! Topics include: Understanding the fundamental differences between Invention vs Innovation; Understanding the job impact of very recent federal cloud computing initiatives; and learn how to lead a private, secure, and convenient digital life as you transition through school and into a career.

Presentation Link:

zoom logo

Dennis London, - London Security Solutions

The statistics of cybercrime should be terrifying for everyone.  With over 800,000 records lost or stolen every 24 hours…no one is safe.  As people migrate their activities online, the threat only continues to increase.  That is why you should understand and take the necessary and needed precautions to secure your virtual self.  This session will cover those precautions, principles, and steps to ensure your virtual identity remains your own.

Presentation Link:

zoom logo

Corey White,  Cyvatar Ai

There is a worldwide cybersecurity skills shortage. According to CSO online, 70% of organizations report that their business is impacted by the lack of professionally trained cybersecurity talent. This session will uncover the future of cybersecurity and how you can build skills and experience today to prepare for a career in this rapidly growing industry.

Presentation Link:

zoom logo

Great Hall of Posters

By William Vong, Zachary Donovan and Yanxun Liu

Join the zoom meeting at any time to view this poster!

Storage is an important part of our daily life from our baby pictures to our birthday videos. Early on, people needed physical drives for school, work, and personal information. The ages of expandable physical storage are beginning to come to its end. With the introduction of cloud services brings along Software Defined Storage or also known as SDS. SDS has given people the luxury of not carrying a physical storage device anymore. We can now save our information on the cloud with a press of a button. It is implemented to server infrastructures as it is not a set capacity. With Software Defined Storage, the capacity can be easily flexible depending on the company or infrastructure needs. SDS is more dynamic and allows resources to be added when demand increases during a certain period of time. This allows storage to be added almost instantaneously. Hardware is all virtualized as a software entity that is managed by an application rather than physically adding the resources to a facility. In SDS there is so much one can do in managing their storage from automation to scalability. Automation can control the total space needed by raising or dropping the storage amount based on the overall size required. Scalability plays a huge part in changing the size of all the resources without affecting the performance of it.

 

Presentation Link:

zoom logo

By  Rafael Fernando, Keshav Sreekumar, Marvin Larios and Nick Brannies

Join the zoom meeting at any time to view this poster!

Designed a mesh network that can be deployed using a swarm of drones. Mesh technology allows you to expand the total coverage based on the number of nodes that are deployed. In order to accommodate several different natural disaster scenarios. This project successfully establishes a network that victims can use to communicate during a natural disaster scenario.

 

Presentation Link:

zoom logo

By Angel Jimenez

Join the zoom meeting at any time to view this poster!

A powerful and efficient Network Intrusion Detection System (NIDS) is one of the main network security issues. Despite substantial advancement in NIDS technologies, in comparison to anomaly detection techniques, most methods are still using less capable signature-based techniques.
Detection of intruders plays a big part in network protection by engaging system administrators to warn about suspicious behavior such as assaults and malware. IDS is an important defensive line to defend sensitive networks from the ever-expanding problems of attack. Today, there are numerous obstacles to data security analysis due to rapid development in computer networks and applications. Events that may violate the computer systems standards such as availability, authority, secrecy, and integrity can be described as intrusions/attacks. Security strategies and tools are unable to detect new attack conditions and cannot study in-depth network packets. The amount of malware found is expected to expand recently at more than 90% of small- to medium-sized companies (Shekhawat et al., 2019). Real-time network malware identification can minimize malware spread on the network considerably.

 

Presentation Link:

zoom logo

By Meetkumar Patel 

Join the zoom meeting at any time to view this poster!

The need for a new authentication method such as biometrics becomes apparent as the data breaches on password-based authentication increase. However, current biometric forms of authentication become unusable once compromised. Additional limits are realized when an attacker coerces an authorized user into a forced authentication. To resolve both issues, I propose creating an authentication mechanism that depends on the user's neurophysiological responses to chosen pieces of music (non-lyrical) measured using electroencephalographic (EEG) signals. This poster will describe the procedure for creating a system that incorporates such idea for person classification and authentication. In a group study, the aim is that participant listen to individually selected music and music selected by other participants during an EEG reading. The change in the Alpha and Beta band frequencies across eight electrode EEG sensors serves as the input feature vector for a supervised machine learning algorithm that trains on the user and attacker EEG readings. Ultimately, the goal of the algorithm is to create a user-specific model to uniquely identify the respective user based on the corresponding EEG response to music and grant authentication. This research study lays a solid foundation for creating a promising EEG-based authentication system by solving the drawbacks of current biometric authentication methods

 

 

Presentation Link:

zoom logo

By Saketh Sadhu, Matthew Cervana and Kyle Huang

Join the zoom meeting at any time to view this poster!

The era of technology has inspired the creation of many technologies that improve our everyday lives. The Internet of Things (IoT) is the center of all internet technologies. IoT is described as a network of physical objects or “things” that is connected to each other. These objects range from computers to smart fridges - each have the ability to connect and share data wirelessly over the internet. Developers & Engineers will often develop new technologies to increase the efficiency and security of IoT devices. Software-Defined Network (SDN) is the latest emerging technology looking to improve IoT devices and increase efficiency.

 

Presentation Link:

zoom logo

Sponsors

We would like to thank our wonderful sponsors for donating to help bring awareness to Cyber Security and the Information Technology Field.

 

Gold Scholar

dreambox creations logo  presidio logored lenovo logo

 

Silver Scholar

ISACA Logo

 

Bronze Scholar

  assa abloy logored lenovo logo

Virtual Career Fair

dreambox creations logo  hid logohid logorsmus logo

 

Virtual Format

During the event, attendees entered though a wizards landscape and while in the Zoom rooms, viewed the inside of the castle.  
landing page

zoom background