Poster Contest 2019
Congratulations to last year's poster contest winners!
Poster No. | Name of Presenter | Poster Title | |
First Place |
37 |
Yash Choksi, Tanvi Gawade, Aakanksha Tasgaonkar |
Malicious URLs Detection: A Machine Learning Approach |
Second Place |
29 |
Alfredo Serna |
Even an 11-Year-Old can do It |
Third Place |
38 |
Mohamed Ghobn |
Keyloggers |
Fourth Place |
6 |
Christian Rodarte |
You Have Been Found! |
Fifth Place |
28 |
Dominic Craddock |
The Presence, Impact, and Implications of the New Online Generation |
Thank you to everyone who participated in the poster contest!
Poster No. | Name of Presenter | Poster Title | School |
1 |
Richard Arellano |
IoT vs IoT | Cal Poly Pomona |
2 |
Nathan Morey |
The 411 of Phishing | Fullerton College |
3 |
Joseph Jensen |
Biohacking | Fullerton College |
4 |
James Tarnowski |
Modern Day Trojan Horses | Fullerton College |
5 |
Patrick Chong |
How the Man in the Hot Spot is a Risk to Your Cloud | Fullerton College |
6 |
Christian Rodarte |
You Have Been Found! | Fullerton College |
7 |
Kevin Rodriguez |
Phishing Email and Website Awareness | Fullerton College |
8 |
Luis Juarros |
IOT in the Home: Security as a Responsibility for Consumers and Developers | Fullerton College |
9 |
Isaias Gastelo |
E-commerce Security Issues | Fullerton College |
10 |
Brian Lane |
Secured Wifi: Are You Really Secure? | Fullerton College |
11 |
Sherry Neher |
Privacy and technology in our homes | Fullerton College |
12 |
Jesse Jimenez |
The Rise of Artificial Intelligence | Fullerton College |
13 |
Victor Colocho |
Data Breaches in Cloud Computing | Fullerton College |
14 |
Ashish Hingle |
Creating secure IoT Device scholarly resources for Innovation & Manufacturing Labs at University Campuses | Cal Poly Pomona |
15 |
Michael MacDonald |
Malvertsing | Cal Poly Pomona |
16 |
Carlos Hidalgo |
Social Engineering, and IP Address used for Game Swatting | Fullerton College |
17 |
Doug Benner |
Staying Private While Staying Online | Fullerton College |
18 |
Nathan Pike |
Progressing from the SOC to the EOC | Cal Poly Pomona |
19 |
Tuan Truong |
Cyber Security: Bluesnarfing | Fullerton College |
20 |
Taylor Entrikin |
The Role of Social Engineering in Cybersecurity | Fullerton College |
21 |
Brandon Williams |
Bring Your Own Device | Fullerton College |
22 |
Garrett Reeve and Irioshi Melendez |
Nintendo Switch's unpatchable Tegra X1 exploit | Fullerton College |
23 |
Luke Schatzman |
VoIP Risks and Considerations | Fullerton College |
24 |
Krista Ghazaleh and Jefry Ghazaleh |
An Introduction to the Vulnerabilities of Automated Systems and Cryptographic Algorithms | Fullerton College |
25 |
Gaige Beard |
Cybersecurity: WHAT ABOUT YOU? | Fullerton College |
26 |
Ricardo Garay |
Curiosity Killed the Cat | Fullerton College |
27 |
Bruno Ferreira |
Steganography | Fullerton College |
28 |
Dominic Craddock |
The Presence, Impact, and Implications of the New Online Generation | Fullerton College |
29 |
Alfredo Serna |
Even an 11-Year-Old can do It | Fullerton College |
30 |
Gyovany Vertin |
Mobile Security | Fullerton College |
31 |
Joseph Garcia |
A Computer's Immune System: Detect, Isolate, Eliminate | Fullerton College |
32 |
Rachel Thomason |
The Importance of Being Open Source | Cal Poly Pomona |
33 |
Konstantinos Politis |
Open Source Intelligence | Fullerton College |
34 |
S Daker |
Doxing, what it is, and how it can be avoided | Fullerton College |
35 |
Hunter Gaukel and David Davilla |
Adversarial Machine Learning | Cal Poly Pomona |
36 |
Ziley Lopez |
Vulnerabilities in medical devices: a complex environment and multifaceted problem | Fullerton College |
37 |
Yash Choksi, Tanvi Gawade, Aakanksha Tasgaonkar |
Malicious URLs Detection: A Machine Learning Approach | Cal State LA |
38 |
Mohamed Ghobn |
Keyloggers | Fullerton College |
39 |
Carlos Medina |
How social media is used to hack you | Fullerton College |
40 |
Richard Cacciata |
Be Aware of the Hook on the Phishing Line | Fullerton College |
41 |
Anthony Giannini |
Bring Your Own Device, Don’t Forget the Security | Fullerton College |
42 |
Lawrence McGhee |
Mobile Devices and NFC Security | Fullerton College |
Special thanks to the ISACA Los Angeles Chapter for donating $1000 for our CSAF poster contest!