November 10, 2016 at 10:00AM
University Of Oklahoma, Norman
Organizers:
- Pierre Tiako (Chair), CITRD, Tiako University
- Chenguang Xu (Co-Chair), Computer Science, University of Oklahoma
Cloud Security and Forensics @ University of Oklahoma |
|
IEEE DISTINGUISHED SPEAKER |
|
Dr. George J. Proeller Colorado Technical University 6320 Lange Drive Colorado Springs, CO 80918. gproeller@comcast.net |
|
DATE |
LOCATION |
November 10, 2016 at 10AM |
Room
#100. |
REGISTRATION |
|
REFRESHMENT |
|
Refreshments will be provided. The meeting is open to Members of IEEE, Campus Students, Faculty and Staff, as well as Guests. |
|
TOPIC |
|
Cloud Security and Forensics |
|
TOPIC DESCRIPTION |
|
Cloud Computing increases capability and productivity while decreasing overall IT costs – and its use is filtering down to everyday use –iTunes Cloud, RealAudio Cloud, etc. However the “Benefits” of the Cloud cause us to forfeit aspects of control, visibility, and tracking data origin, source, and attribution. Traditional Computer Forensics requires physical access to systems for processes such as disk imaging something not readily available when working in the Cloud. Therefore implementing traditional forensics processes can be quite difficult – especially when a deleted file's allocation space can be immediately reallocated to another user. Further the physical location of data can be very difficult to determine in a private cloud and a near impossible task in a public cloud where the data may not even reside in the same country as the user. This talk discusses the challenges and opportunities within the emerging area of cloud forensics. |
|
SPEAKER BIOGRPHY |
|
Thirty-plus years of highly technical/increasingly responsible operations and management experience in Information Technology Systems (ITS) focusing on Information Assurance/Computer Network Security with Program Management, and Process Improvement/Quality. Dr. Proeller's experience encompasses all aspects of information systems life cycle from requirements definition through development and deployment to follow-on test and evaluation to decommissioning. He holds multiple security certifications including the Certified Information Systems Security Professional (CISSP) credential, the Certified Information Security Manager, and the GIAC Security Leadership Certification and is a pioneer in the transition of information security to academia. His Department of Defense (DoD) experience includes a Certified Acquisition Professional certification in Operational Test and Evaluation and extensive experience in the DoD Information Technology Security Certification and Accreditation Process. He also serves on the adjunct faculty of the Computer Science Department of one local university and departmental advisory boards two others. |
|
SPONSORS |
|
|
|
ORGANIZERS |
|
|
November 10, 2016 at 5:30PM
Oklahoma Christian University, Edmond
Organizers:
- Pierre Tiako (Chair), CITRD, Tiako University
- Heidi VanBenthem (Co-Chair), Computer Engineering, Oklahoma Christian University
Cloud Security and Forensics @ Oklahoma Christian University |
|
IEEE DISTINGUISHED SPEAKER |
|
Dr. George J. Proeller Colorado Technical University 6320 Lange Drive Colorado Springs, CO 80918. gproeller@comcast.net |
|
DATE |
LOCATION |
November 10, 2016 at 5:30PM |
Harold Science Hall Room 207 Oklahoma Christian University 2501 E Memorial Road Edmond, OK 73136 |
REGISTRATION |
|
REFRESHMENT |
|
Refreshments will be provided. The meeting is open to Members of IEEE, Campus Students, Faculty and Staff, as well as Guests. |
|
TOPIC |
|
Cloud Security and Forensics |
|
TOPIC DESCRIPTION |
|
Cloud Computing increases capability and productivity while decreasing overall IT costs – and its use is filtering down to everyday use –iTunes Cloud, RealAudio Cloud, etc. However the “Benefits” of the Cloud cause us to forfeit aspects of control, visibility, and tracking data origin, source, and attribution. Traditional Computer Forensics requires physical access to systems for processes such as disk imaging something not readily available when working in the Cloud. Therefore implementing traditional forensics processes can be quite difficult – especially when a deleted file's allocation space can be immediately reallocated to another user. Further the physical location of data can be very difficult to determine in a private cloud and a near impossible task in a public cloud where the data may not even reside in the same country as the user. This talk discusses the challenges and opportunities within the emerging area of cloud forensics. |
|
SPEAKER BIOGRPHY |
|
Thirty-plus years of highly technical/increasingly responsible operations and management experience in Information Technology Systems (ITS) focusing on Information Assurance/Computer Network Security with Program Management, and Process Improvement/Quality. Dr. Proeller's experience encompasses all aspects of information systems life cycle from requirements definition through development and deployment to follow-on test and evaluation to decommissioning. He holds multiple security certifications including the Certified Information Systems Security Professional (CISSP) credential, the Certified Information Security Manager, and the GIAC Security Leadership Certification and is a pioneer in the transition of information security to academia. His Department of Defense (DoD) experience includes a Certified Acquisition Professional certification in Operational Test and Evaluation and extensive experience in the DoD Information Technology Security Certification and Accreditation Process. He also serves on the adjunct faculty of the Computer Science Department of one local university and departmental advisory boards two others. |
|
SPONSORS |
|
|
|
ORGANIZERS |
|
|
November 11, 2016 at 10:00AM
Oklahoma City University, Oklahoma City
Organizers:
- Pierre Tiako (Chair), CITRD, Tiako University
- Hyacinthe Aboudja (Co Chair), Oklahoma City University
Smart Phone Forensics @ Oklahoma City University |
|
IEEE DISTINGUISHED SPEAKER |
|
Dr. George J. Proeller Colorado Technical University 6320 Lange Drive Colorado Springs, CO 80918. gproeller@comcast.net |
|
DATE |
LOCATION |
November 11, 2016 at 10AM |
Large Gardner Conference room 3rd floor, Meinders School of Business Oklahoma City University 2501 North Blackwelder Av. Oklahoma City, OK 73106 |
REGISTRATION |
|
REFRESHMENT |
|
Refreshments will be provided. The meeting is open to Members of IEEE, Campus Students, Faculty and Staff, as well as Guests. |
|
TOPIC |
|
Personal Electronic Devices; iPODS, Tablets, PDAs, Cell and Smart Phones -- a Forensics Discussion |
|
TOPIC DESCRIPTION |
|
iPods, PDAs, Tablets, and cell/smart phones continue to merge in form, fit, and functionality and now include data acquisition (cameras, keyboards, USB ports, etc), data aggregation, and storage (some up to 80 gigabytes), and communications capabilities (IR, Bluetooth, wireless internet access, and cellular telephone). This presentation provides insights into the features and capabilities of such systems, their possible uses in unethical/unlawful activities, and a discussion of the concepts of forensic analyses and approaches useful in combating such uses. |
|
SPEAKER BIOGRPHY |
|
Thirty-plus years of highly technical/increasingly responsible operations and management experience in Information Technology Systems (ITS) focusing on Information Assurance/Computer Network Security with Program Management, and Process Improvement/Quality. Dr. Proeller's experience encompasses all aspects of information systems life cycle from requirements definition through development and deployment to follow-on test and evaluation to decommissioning. He holds multiple security certifications including the Certified Information Systems Security Professional (CISSP) credential, the Certified Information Security Manager, and the GIAC Security Leadership Certification and is a pioneer in the transition of information security to academia. His Department of Defense (DoD) experience includes a Certified Acquisition Professional certification in Operational Test and Evaluation and extensive experience in the DoD Information Technology Security Certification and Accreditation Process. He also serves on the adjunct faculty of the Computer Science Department of one local university and departmental advisory boards two others. |
|
SPONSORS |
|
|
|
ORGANIZERS |
|
|