Cybersecurity & Awareness Fair

Schedule

 

 SCHEDULE

 

Demo Village

Online privacy concerns have been increasing year after year, but many people ignore the consequences of not actively protecting their information. So much information about our lives is harvested and yet, we have become accustomed to this invasion of privacy. Cal Poly ./script (Security, Cryptography, Reverse Engineering, Incident Response, and Penetration Testing) investigates how our online actions are being tracked, how our information is used against us, and how we can protect ourselves.

Presented by SWIFT

30.9 billion IoT devices are expected to be connected by 2025. With the continuous integration of smart technologies in our everyday lives, it is critical for the next generation of cybersecurity specialists to understand the impact of vulnerable Internet of Things devices. Join us as Cal Poly Pomona’s very own SWIFT (Students With an Interest in the Future of Technology) breach into common IoT devices found at home and demonstrate the risks they bring.

Presented by FAST

Biohacking has been a topic explored in science fiction and other stories for many decades. But due to recent breakthroughs in technology, these concepts are now becoming more and more feasible for many of us. Cal Poly FAST (Forensics and Security Technology) plans to explore how personal medical devices are making their way into many people's everyday lives and how cyberattacks on these devices are an emerging threat. These attacks could target personal health information, or even a person's current location. In our presentation, we will show how a person using the FreeStyle Libre, a popular glucose monitoring device, can have their physical location tracked through Bluetooth and have sensitive information exposed to anyone within the broadcast range.

Presented by Chaffey College

Ransomware is an ever-evolving form of malware designed to encrypt files on your devices, turning them into hostages while making your devices unusable. Malicious actors then demand a ransom. The worst ransomware actors often target and threaten to sell or leak exfiltrated data or authentication information if the ransom is not paid. So, what does that mean for you? Hackers take advantage of security weak spots like the recent PrintNightmare vulnerability to steal sensitive data and/or lock files. These criminals will only give you the key to access your system, or return the files, once you’ve paid their ransom. Chaffey College will teach you the fundamentals to protect your data and help mitigate the risks associated with ransomware.

Presented by Fullerton College

Most households now run complex networks hosting devices connected to the internet, including smartphones, tablets, thermostats, TVs, cameras, computers, and wearable devices. To protect your home network and your family, you need to have the right tools in place to keep your network secure. Learn the skills protect your network and have confidence that your family members can use the internet more safely and securely.

Presented by MISSA

Cyber hygiene is making smart decisions about your smart devices. Tools such as antivirus software, network firewall, and password protection are components that can reduce your risk and strengthen the security of your personal data. Cal Poly Pomona’s MISSA (Management Information Systems Student Association) will step you through the best practices and benefits to keep yourself cyber safe.

Industry Speakers

Brett St Pierre HID,

The days of plastic are numbered. Learn about how physical access will continue to transition from smart cards to smart devices for seamless authentication and access.

Presentation Link:

zoom logo

Diane Miller, Northrop Grumman

In challenging times, perhaps even more so during a global pandemic, employers need to hire great cybersecurity talent. For some employers, their needs may not change but certainly how they fill those needs may be very different now. Diane will share insights about the Future of Work – how careers are evolving and how launching your career during a challenging time might require different approaches and skills. Let’s make sure the highly talented cybersecurity students at Cal Poly Pomona become part of our diverse global cybersecurity workforce!

 

Presentation Link:

zoom logo

Brian Donohue, Red Canary

There are nearly 200 parent techniques in the MITRE ATT&CK matrix—and who-knows-how-many subtechniques. If you try to develop thorough detection or preventive coverage for all of them, you'll end up miring your security operations team with an endless amount of work that delivers a questionable amount of value. In this talk, we'll explore how you can focus your efforts on the ATT&CK techniques that adversaries are most likely to leverage against you and the data sources that give you the best visibility into those techniques. 

 

Presentation Link:

zoom logo

Bryan S. Ware,  Cyber Infrastructure

Keynote

 Securing the Nation's  Cyber Infrastructure, Nation State attacks during Covid19 ,and career opportunities with CISA.

Presentation Link:

zoom logo

Warren Yu, Naval Postgraduate School

Come learn about little-known federal internships and scholarships (many of them dealing directly with cyber security) that pay you during summers, for tuition, or to launch a career in a STEM-related field! Topics include: Understanding the fundamental differences between Invention vs Innovation; Understanding the job impact of very recent federal cloud computing initiatives; and learn how to lead a private, secure, and convenient digital life as you transition through school and into a career.

Presentation Link:

zoom logo

Dennis London, - London Security Solutions

The statistics of cybercrime should be terrifying for everyone.  With over 800,000 records lost or stolen every 24 hours…no one is safe.  As people migrate their activities online, the threat only continues to increase.  That is why you should understand and take the necessary and needed precautions to secure your virtual self.  This session will cover those precautions, principles, and steps to ensure your virtual identity remains your own.

Presentation Link:

zoom logo

Corey White,  Cyvatar Ai

There is a worldwide cybersecurity skills shortage. According to CSO online, 70% of organizations report that their business is impacted by the lack of professionally trained cybersecurity talent. This session will uncover the future of cybersecurity and how you can build skills and experience today to prepare for a career in this rapidly growing industry.

Presentation Link:

zoom logo

Great Hall of Posters

By William Vong, Zachary Donovan and Yanxun Liu

Join the zoom meeting at any time to view this poster!

Storage is an important part of our daily life from our baby pictures to our birthday videos. Early on, people needed physical drives for school, work, and personal information. The ages of expandable physical storage are beginning to come to its end. With the introduction of cloud services brings along Software Defined Storage or also known as SDS. SDS has given people the luxury of not carrying a physical storage device anymore. We can now save our information on the cloud with a press of a button. It is implemented to server infrastructures as it is not a set capacity. With Software Defined Storage, the capacity can be easily flexible depending on the company or infrastructure needs. SDS is more dynamic and allows resources to be added when demand increases during a certain period of time. This allows storage to be added almost instantaneously. Hardware is all virtualized as a software entity that is managed by an application rather than physically adding the resources to a facility. In SDS there is so much one can do in managing their storage from automation to scalability. Automation can control the total space needed by raising or dropping the storage amount based on the overall size required. Scalability plays a huge part in changing the size of all the resources without affecting the performance of it.

 

Presentation Link:

zoom logo

By  Rafael Fernando, Keshav Sreekumar, Marvin Larios and Nick Brannies

Join the zoom meeting at any time to view this poster!

Designed a mesh network that can be deployed using a swarm of drones. Mesh technology allows you to expand the total coverage based on the number of nodes that are deployed. In order to accommodate several different natural disaster scenarios. This project successfully establishes a network that victims can use to communicate during a natural disaster scenario.

 

Presentation Link:

zoom logo

By Angel Jimenez

Join the zoom meeting at any time to view this poster!

A powerful and efficient Network Intrusion Detection System (NIDS) is one of the main network security issues. Despite substantial advancement in NIDS technologies, in comparison to anomaly detection techniques, most methods are still using less capable signature-based techniques.
Detection of intruders plays a big part in network protection by engaging system administrators to warn about suspicious behavior such as assaults and malware. IDS is an important defensive line to defend sensitive networks from the ever-expanding problems of attack. Today, there are numerous obstacles to data security analysis due to rapid development in computer networks and applications. Events that may violate the computer systems standards such as availability, authority, secrecy, and integrity can be described as intrusions/attacks. Security strategies and tools are unable to detect new attack conditions and cannot study in-depth network packets. The amount of malware found is expected to expand recently at more than 90% of small- to medium-sized companies (Shekhawat et al., 2019). Real-time network malware identification can minimize malware spread on the network considerably.

 

Presentation Link:

zoom logo

By Meetkumar Patel 

Join the zoom meeting at any time to view this poster!

The need for a new authentication method such as biometrics becomes apparent as the data breaches on password-based authentication increase. However, current biometric forms of authentication become unusable once compromised. Additional limits are realized when an attacker coerces an authorized user into a forced authentication. To resolve both issues, I propose creating an authentication mechanism that depends on the user's neurophysiological responses to chosen pieces of music (non-lyrical) measured using electroencephalographic (EEG) signals. This poster will describe the procedure for creating a system that incorporates such idea for person classification and authentication. In a group study, the aim is that participant listen to individually selected music and music selected by other participants during an EEG reading. The change in the Alpha and Beta band frequencies across eight electrode EEG sensors serves as the input feature vector for a supervised machine learning algorithm that trains on the user and attacker EEG readings. Ultimately, the goal of the algorithm is to create a user-specific model to uniquely identify the respective user based on the corresponding EEG response to music and grant authentication. This research study lays a solid foundation for creating a promising EEG-based authentication system by solving the drawbacks of current biometric authentication methods

 

 

Presentation Link:

zoom logo

By Saketh Sadhu, Matthew Cervana and Kyle Huang

Join the zoom meeting at any time to view this poster!

The era of technology has inspired the creation of many technologies that improve our everyday lives. The Internet of Things (IoT) is the center of all internet technologies. IoT is described as a network of physical objects or “things” that is connected to each other. These objects range from computers to smart fridges - each have the ability to connect and share data wirelessly over the internet. Developers & Engineers will often develop new technologies to increase the efficiency and security of IoT devices. Software-Defined Network (SDN) is the latest emerging technology looking to improve IoT devices and increase efficiency.

 

Presentation Link:

zoom logo

Capture The Flag Field

Hosted by Clubs

The Capture The Flag event was hosted by the Student Data Center. SDC, SWIFT, FAST, and ./Script clubs will all participate in contributing CTF questions. There will be two CTF servers divided by skill group, one for elementary and middle school students, and the other for highschool and above. 

 

Job Faire

The Job Fair is a casual networking environment where companies will have time for discussion and interview opportunities with the students after the event.