SPACE COAST, FL is the high tech leader in the third largest state. Needless to say, cybersecurity’s economic relevance is booming here which is why we’re hosting a first-ever cybersecurity conference in-partnership with the University of Florida.
This event brings a diverse set of cybersecurity stakeholders together to discuss major industry trends and get exposure to some deep technical training direct from the experts themselves.
Food and drinks will be provided throughout the conference.
Pickup: Saturday 11/04/17 at 6:30 AM
12760 Pegasus Dr.
Return: Saturday 11/04/17 at 8 PM
Pickup: Friday 11/03/17 at 12:45 PM
432 Newell Dr.
Return: Saturday 11/04/17 at 8 PM
Please email firstname.lastname@example.org to reserve your seat on the bus.
Hilton Melbourne Rialto Place
200 Rialto Pl, Melbourne, FL 32901
Residence Inn by Marriott Melbourne
1430 S. Babcock St., Melbourne, FL 32901
Mark Tehranipoor, co-director of Florida Institute for Cybersecurity (FICS) Research and Intel Endowed Chair Professor at Department of Electrical and Computer Engineering, University of Florida, will share the role that next-generation talent will play in delivering cybersecurity solutions to the connected world. The session offers an overview of the university’s current research on embedded systems security, reverse engineering, vulnerability analysis, and Internet of Things (IoT) security.
Patrick Traynor is the John H. and Mary Lou Dasburg Preeminent Chair in Engineering and the Co-Director of The Florida Institute for Cybersecurity Research. His research uncovered critical vulnerabilities in cellular networks, made the first measurement of mobile malware infections and offers robust mechanisms for combating Caller-ID scams.
Recipient of a CAREER Award from the National Science Foundation in 2010, was named a Sloan Fellow in 2014 and a Fellow for the Center for Financial Inclusion at Accion in 2016.
Jordan started his professional career at the University of Florida where he got to do a little bit of everything security related. His love of CTFs, however, drove him to a job at a government contractor where he honed his reverse engineering and vulnerability research skills. Now, his goal in life is to become a professional CTF e-sports caster which is why he founded Vector 35. He claims he can stop buying NERF any time he wants, but no one believes him.
Yier Jin is the Endowed IoT Term Professor in the Warren B. Nelms Institute for the Connected World and also an Associate Professor in the Department of Electrical and Computer Engineering (ECE) in the University of Florida (UF). His research focuses on the areas of embedded systems design and security, trusted hardware intellectual property (IP) cores and hardware-software co-design for modern computing systems. His is currently focusing on the design and security analysis on Internet of Things (IoT) and wearable devices with particular emphasis on information integrity and privacy protection in the IoT era. Dr. Jin received the Best Paper Award in the 52nd Design Automation Conference in 2015, the 21st Asia and South Pacific Design Automation Conference in 2016, and the 10th IEEE Symposium on Hardware-Oriented Security and Trust in 2017.
Bernie Lampe was a Staff Sergeant in the USAF until his honorable discharge in 2005. Afterwards he worked as a defense contractor principally with DARPA and then graduated with a bachelors of computer science from the University of Michigan in 2009. He completed his masters in electrical engineering from the University of Maryland, Baltimore County in 2016. He has worked as a software vulnerability researcher for Raytheon CSI since 2010 and is currently working to complete his PhD in Hyperspectral image processing.
Phil is a senior vulnerability researcher with Raytheon Cyber Security Innovations. Prior to joining Raytheon, he worked as a software engineer with the Department of Defense doing cyber stuff and things. His research interests include mobile and embedded devices, kernel hacking, tool development, and reverse engineering. Outside of work, he enjoys gaming and spending time with his wife and dogs.
|November 3, 2017|
|3 PM||Check-in + Let the Games Begin|
|5 PM||Dinner + Remarks + Happy hour|
|6 PM||The Evolution of Hardware-Assisted Computing Systems for IoT||Dr. Yier Jin|
|7 PM||Crackpot – Overview of the process to exploit an IoT Device||Raytheon|
|7:45 – Midnight||HR/Networking + Snacks + Gaming + Challenges|
|November 4, 2017|
|8 AM||Breakfast + Games + Challenges|
|9 AM||Welcome + Remarks|
|9:30 AM||Next Generation Cybersecurity Solutions||Dr. Mark Tehranipoor|
|11 AM||Panel: Entrepreneurism in Cybersecurity||Vector 35, Authomate, Dr. Patrick Traynor|
|12 PM||Break for Lunch + Networking + Games + Lockpick Village|
|1:30 PM||Ransomware||Dr. Patrick Traynor|
|2:30 PM||Intro Stack Based Overflows||Raytheon|
|4 PM||Bluetooth Mesh Security||Bryan Jenks|
|5 PM||Thank you + Networking|