05/05 - 05/06

HACK-A-THON

Join us as we delve into the intricate web of Cyber Security


0

Days

0

Hours

0

Minutes

0

Seconds

Unsplashed background img 3

perm_identity

Who?

Anyone who is interested in learning about Cyber Security. No experience required.

my_location

Where?

Illinois Institute of Technology
Stuart Building
3300 S Federal St
Chicago, IL 60616

scroll down to lean more details about location

group

Teams?

Up to 4 people. If you don't have a team and still would like to participate, please email us

star

What?

Learn all about data encryption, cyber attack protocols, and computer science theories at our lightning talks. Bring a laptop to participate in our Hackathon coding competition

$

Cost?

This event is free for anyone who signs up, thanks to our wonderful sponsors

?

Questions?

Email us

Sign Up

To sign up for the hackthon, please fill out this form

Text Reminders?

alarm_on

Text the @ainco to the number 81010 to subscribe for text notifications from ACMW

Want to Volunteer?

thumb_up

If you would like to help us with this event, please

Email us

Location

For Maps directions click here

Location is Stuart Building Room 108. This is a computer lab that doubles as a CS classroom. Lunch will be available in West Lobby of Stuart Building. ACM-W volunteers can assist you with any questions you may have during the event.

Unsplashed background img 2

Schedule

Friday May 5th, 2017

  • 9:30 AM Sign in, Registration
  • 9:45 AM Introductory Remarks
  • 10:00 AM – 11:00 AM Hajara Al Amodi, PMP // Diversity in IT
  • 11:15AM – 12:15 PM William Slater, III // Bot net
  • 12:30 PM – 1:30 PM Lunch
  • 1:30 PM – 2:30 PM Taeho Jung, PhD // threats in emerging applications
  • 2:45PM – 3:45 PM Ann-Marie Horcher, PhD // distractions in mobile apps
  • 4:00PM – 5:00 PM Andrea LaStarge/ Priyum Jyoti // Interactive session cyber/ physical security in Energy & Utilities
  • 6:00 PM – 8:00 PM ACM-W Farewell Banquet - all are welcome!
  • 8:00 wrap up

Speakers

Ann-Marie Horchermore_vert

bio

Ann-Marie Horcherclose

Ann-Marie Horcher is a creator of Get My Clue application. She will be giving a talk:" Key-bored to Tears: The Dangers of Distracted Walking while Authenticating Mobile Devices "

Walking into traffic, off the beaten path, or colliding with people – distracted walking is on the rise as people struggle with touchscreen interactions designed for workstation instead of mobile devices. The keyboard is a well-known mental model for soliciting input for authentication, which conserves the user effort of understanding the desired interaction. On the other hand, the reality of the actual cognitive effort is informally documented by the fact 52% of pedestrian accidents involve a smartphone. This presentation looks at measures of the effort required for smartphone authentication using human performance modelling and the design implications for security interfaces. Security design choices can dramatically impact usability, and modelling tools can save development time by providing evidence to question current common practices.

William Favre Slater, IIImore_vert

www.billslater.com

William Favre Slater, IIIclose

ITIL Certified and PMP Certified Senior Technology Consultant / Senior Project Manager / Program Manager in IT Infrastructure Management, Data Center Operations & Development, IT Security, IT Change Management, Application System Development and Technical Services Development (U.S. Citizen & U.S. Air Force Veteran) SUMMARY: Mr. Slater's career has been characterized by both professional excellence and high-quality work performance. He leads by example and is a results-oriented, people-oriented technical manager who can effectively build, lead, and motivate high-performance teams. He has a coaching-mentoring style of leadership. Mr. Slater has worked in some of the world’s most demanding IT environments; among these are JLL, British Petroleum, the Veterans Administration, Microsoft, Technisource, and the United States Air Force. Each of these environments presented unique, high-pressure, high-visibility challenges that not only required intelligence, skills, experience and integrity, but they were demanding in ways that required creativity, adaptability, and flexibility. Mr. Slater possesses exceptional technical and leadership skills and is a well-rounded IT professional who can quickly adapt to and add great value to any organization.

Hajara Al Amodimore_vert

bio

Hajara Al Amodiclose

Hajara Al Amodi is a seasoned consultant, with 13 years of experience working in the Technology consulting industry. She currently works in project and program management. Hajra Al Amodi specializes in active risk management and working with multi million dollar project budgets. She was the founder and CEO of a software services company named Waadi Corporation and grew it to multi-million dollars in revenue. She is an international board member at companies in the Technology and Real Estate industry and a private investor. Al Amodi is a steering committee member of 2020WOB and a member of the research committee at 30% club GCC chapter, where she works with a team of committed people who are trying to increase women representation on corporate boards, and in the C- suite . She also teaches Finance and Entrepreneurship to high school students and does project management seminars.

Taeho Jungmore_vert

www.tjung.co

Taeho Jungclose

Professor Jung will join the Department of Computer Science and Engineering at the University of Notre Dame as a tenure-track assistant professor in Fall 2017. He received his Ph.D. degree in Computer Science at Illinois Institute of Technology under the supervision of Professor Xiang-Yang Li and Professor Peng-Jun Wan, and he received his B.E. degree in Computer Software in Tsinghua University. His research area includes privacy & security issues in data mining and provisioning in the big data ecosystem. His paper has won a best paper award (IEEE IPCCC 2014), and two of his papers were selected as best paper candidate (ACM MobiHoc 2014) and best paper award runner up (BigCom 2015) respectively. He has served many international conferences as a TPC member, including IEEE DCOSS, IEEE MSN, IEEE IPCCC, BigCom.

Priyum Jyotimore_vert

Manager, Deloitte & Touche LLP

Priyum Jyoticlose

Priyum Jyoti has over seven years of experience in security consulting, delivering solutions across multiple cyber domains. Priyum’s role has included setting strategy to support business and IT objectives, and then implementing that strategy in an optimized manner to achieve tangible results quickly. Priyum has worked with clients from multiple industries, including power & utilities, banking, non-profit, higher-education and insurance. Priyum has designed and implemented business policies and procedures relating to cyber security and compliance. She has worked with both local and global clients, including international experience in South Africa. Priyum Jyoti is a Certified Information Privacy Professional (CIPP) and received her Bachelors in Electrical Engineering from Purdue University

Andrea LeStargemore_vert

Manager, Deloitte & Touche LLP

Andrea Lestargeclose

Andrea is a Deloitte Advisory Manager within Cyber Rick Services. She has over ten years of experience in the Public sector assisting Federal and State Agencies with strategic, operational and tactical risk mitigation strategies. Andrea has expertise in risk analysis and curriculum development. She worked with clients within power and utilities and various States in creating and implementing smart practices for the sharing of information, identification of security gaps and corrective risk mitigation options while efficiently communications findings to stakeholders, private sector owners and operations, and first-responder personnel. Andrea demonstrates proven abilities in managing a state fusion center and supporting various emergency response entities in identifying, detecting and responding to man-made, natural and cyber incidents. Andrea encompasses analytical tradecraft and demonstrates consistent, repeatable and defensible methodologies pertaining to risk and the elements of threat, vulnerability, and consequence.

Sponsors

acmw-logo
Unsplashed background img 3