Center for IT R&D

@ Tiako

Welcome!

The CITRD conducts  applied research and development in IT related fields. To know more about us click  here.

Working Days

Mon-Fri: 9am to 5pm

Location

Center for IT R&D  

 5912 NW 16th St
Oklahoma City, OK 73127

Call:(405) 510-6431

W:CITResearch.org
E:info@CITResearch.org

See the map

Follow Us

Search

Tiako University CITRD, in technical collaboration with local Universities and Professional Associations such as IEEE, co-organizes and/or co-sponsors a number of lecture series designed as educational resources for our Students, Faculty, Staff and IT Professionals & Students in metropolitain Oklahoma City.

November 10, 2016 at 10:00AM

University Of Oklahoma, Norman

Organizers:

  • Pierre Tiako (Chair), CITRD, Tiako University
  • Chenguang Xu (Co-Chair), Computer Science, University of Oklahoma

Cloud Security and Forensics @ University of Oklahoma

IEEE DISTINGUISHED SPEAKER

Dr. George J. Proeller

Colorado Technical University

6320 Lange Drive

Colorado Springs, CO 80918.

gproeller@comcast.net

DATE

LOCATION

November 10, 2016 at 10AM

Room #100.
Carson Engineering Center,
Engineering Quadrangle- Main campus,
University of Oklahoma
202 W. Boyd Street
Norman, OK 73069

REGISTRATION

https://meetings.vtools.ieee.org/m/41760

REFRESHMENT

Refreshments will be provided. The meeting is open to Members of IEEE, Campus Students, Faculty and Staff, as well as Guests.

TOPIC

Cloud Security and Forensics

TOPIC DESCRIPTION

Cloud Computing increases capability and productivity while decreasing overall IT costs – and its use is filtering down to everyday use –iTunes Cloud, RealAudio Cloud, etc. However the “Benefits” of the Cloud cause us to forfeit aspects of control, visibility, and tracking data origin, source, and attribution. Traditional Computer Forensics requires physical access to systems for processes such as disk imaging something not readily available when working in the Cloud. Therefore implementing traditional forensics processes can be quite difficult – especially when a deleted file's allocation space can be immediately reallocated to another user. Further the physical location of data can be very difficult to determine in a private cloud and a near impossible task in a public cloud where the data may not even reside in the same country as the user. This talk discusses the challenges and opportunities within the emerging area of cloud forensics.

SPEAKER BIOGRPHY

Thirty-plus years of highly technical/increasingly responsible operations and management experience in Information Technology Systems (ITS) focusing on Information Assurance/Computer Network Security with Program Management, and Process Improvement/Quality. Dr. Proeller's experience encompasses all aspects of information systems life cycle from requirements definition through development and deployment to follow-on test and evaluation to decommissioning. He holds multiple security certifications including the Certified Information Systems Security Professional (CISSP) credential, the Certified Information Security Manager, and the GIAC Security Leadership Certification and is a pioneer in the transition of information security to academia. His Department of Defense (DoD) experience includes a Certified Acquisition Professional certification in Operational Test and Evaluation and extensive experience in the DoD Information Technology Security Certification and Accreditation Process. He also serves on the adjunct faculty of the Computer Science Department of one local university and departmental advisory boards two others.

SPONSORS

  • IEEE Computer Society
  • IEEE Oklahoma City Section
  • IEEE Oklahoma City Computer Society

ORGANIZERS

  • Pierre F. Tiako (Chair), Tiako University
  • Chenguang Xu (Co-Chair), University of Oklahoma
  • Bob Scolli, IEEE Oklahoma City Section
  • Paoli Wognakou, Chesapeake Energy Corporation
  • Ryan Musgrove, OGE Energy Corp.


November 10, 2016 at 5:30PM

Oklahoma Christian University, Edmond

Organizers:

  • Pierre Tiako (Chair), CITRD, Tiako University
  • Heidi VanBenthem (Co-Chair), Computer Engineering, Oklahoma Christian University

Cloud Security and Forensics @ Oklahoma Christian University

IEEE DISTINGUISHED SPEAKER

Dr. George J. Proeller

Colorado Technical University

6320 Lange Drive

Colorado Springs, CO 80918.

gproeller@comcast.net

DATE

LOCATION

November 10, 2016 at 5:30PM

Harold Science Hall Room 207

Oklahoma Christian University

2501 E Memorial Road

Edmond, OK 73136

REGISTRATION

https://meetings.vtools.ieee.org/m/41764

REFRESHMENT

Refreshments will be provided. The meeting is open to Members of IEEE, Campus Students, Faculty and Staff, as well as Guests.

TOPIC

Cloud Security and Forensics

TOPIC DESCRIPTION

Cloud Computing increases capability and productivity while decreasing overall IT costs – and its use is filtering down to everyday use –iTunes Cloud, RealAudio Cloud, etc. However the “Benefits” of the Cloud cause us to forfeit aspects of control, visibility, and tracking data origin, source, and attribution. Traditional Computer Forensics requires physical access to systems for processes such as disk imaging something not readily available when working in the Cloud. Therefore implementing traditional forensics processes can be quite difficult – especially when a deleted file's allocation space can be immediately reallocated to another user. Further the physical location of data can be very difficult to determine in a private cloud and a near impossible task in a public cloud where the data may not even reside in the same country as the user. This talk discusses the challenges and opportunities within the emerging area of cloud forensics.

SPEAKER BIOGRPHY

Thirty-plus years of highly technical/increasingly responsible operations and management experience in Information Technology Systems (ITS) focusing on Information Assurance/Computer Network Security with Program Management, and Process Improvement/Quality. Dr. Proeller's experience encompasses all aspects of information systems life cycle from requirements definition through development and deployment to follow-on test and evaluation to decommissioning. He holds multiple security certifications including the Certified Information Systems Security Professional (CISSP) credential, the Certified Information Security Manager, and the GIAC Security Leadership Certification and is a pioneer in the transition of information security to academia. His Department of Defense (DoD) experience includes a Certified Acquisition Professional certification in Operational Test and Evaluation and extensive experience in the DoD Information Technology Security Certification and Accreditation Process. He also serves on the adjunct faculty of the Computer Science Department of one local university and departmental advisory boards two others.

SPONSORS

  • IEEE Computer Society
  • IEEE Oklahoma City Section
  • IEEE Oklahoma City Computer Society

ORGANIZERS

  • Pierre F. Tiako (Chair), Tiako University
  • Heidi VanBenthem (Co-Chair), Oklahoma Christian University
  • Bob Scolli, IEEE Oklahoma City Section
  • Paoli Wognakou, Chesapeake Energy Corporation
  • Ryan Musgrove, OGE Energy Corp.


November 11, 2016 at 10:00AM

Oklahoma City University, Oklahoma City

Organizers:

  • Pierre Tiako (Chair), CITRD, Tiako University
  • Hyacinthe Aboudja (Co Chair), Oklahoma City University

Smart Phone Forensics @ Oklahoma City University

IEEE DISTINGUISHED SPEAKER

Dr. George J. Proeller

Colorado Technical University

6320 Lange Drive

Colorado Springs, CO 80918.

gproeller@comcast.net

DATE

LOCATION

November 11, 2016 at 10AM

Large Gardner Conference room

3rd floor, Meinders School of Business

Oklahoma City University

2501 North Blackwelder Av.

Oklahoma City, OK 73106

REGISTRATION

https://meetings.vtools.ieee.org/m/41763

REFRESHMENT

Refreshments will be provided. The meeting is open to Members of IEEE, Campus Students, Faculty and Staff, as well as Guests.

TOPIC

Personal Electronic Devices; iPODS, Tablets, PDAs, Cell and Smart Phones -- a Forensics Discussion

TOPIC DESCRIPTION

iPods, PDAs, Tablets, and cell/smart phones continue to merge in form, fit, and functionality and now include data acquisition (cameras, keyboards, USB ports, etc), data aggregation, and storage (some up to 80 gigabytes), and communications capabilities (IR, Bluetooth, wireless internet access, and cellular telephone). This presentation provides insights into the features and capabilities of such systems, their possible uses in unethical/unlawful activities, and a discussion of the concepts of forensic analyses and approaches useful in combating such uses.

SPEAKER BIOGRPHY

Thirty-plus years of highly technical/increasingly responsible operations and management experience in Information Technology Systems (ITS) focusing on Information Assurance/Computer Network Security with Program Management, and Process Improvement/Quality. Dr. Proeller's experience encompasses all aspects of information systems life cycle from requirements definition through development and deployment to follow-on test and evaluation to decommissioning. He holds multiple security certifications including the Certified Information Systems Security Professional (CISSP) credential, the Certified Information Security Manager, and the GIAC Security Leadership Certification and is a pioneer in the transition of information security to academia. His Department of Defense (DoD) experience includes a Certified Acquisition Professional certification in Operational Test and Evaluation and extensive experience in the DoD Information Technology Security Certification and Accreditation Process. He also serves on the adjunct faculty of the Computer Science Department of one local university and departmental advisory boards two others.

SPONSORS

  • IEEE Computer Society
  • IEEE Oklahoma City Section
  • IEEE Oklahoma City Computer Society

ORGANIZERS

  • Pierre F. Tiako (Chair), Tiako University
  • Hyacinthe Aboudja (Co Chair), Oklahoma City University
  • Bob Scolli, IEEE Oklahoma City Section
  • Paoli Wognakou, Chesapeake Energy Corporation
  • Ryan Musgrove, OGE Energy Corp.