Anyone who is interested in learning about Cyber Security. No experience required.
Illinois Institute of Technology
Stuart Building
3300 S Federal St
Chicago, IL 60616
scroll down to lean more details about location
Up to 4 people. If you don't have a team and still would like to participate, please email us
Learn all about data encryption, cyber attack protocols, and computer science theories at our lightning talks. Bring a laptop to participate in our Hackathon coding competition
This event is free for anyone who signs up, thanks to our wonderful sponsors
For Maps directions click here
Location is Stuart Building Room 108. This is a computer lab that doubles as a CS classroom. Lunch will be available in West Lobby of Stuart Building. ACM-W volunteers can assist you with any questions you may have during the event.
bio
Ann-Marie Horcher is a creator of Get My Clue application. She will be giving a talk:" Key-bored to Tears: The Dangers of Distracted Walking while Authenticating Mobile Devices "
Walking into traffic, off the beaten path, or colliding with people – distracted walking is on the rise as people struggle with touchscreen interactions designed for workstation instead of mobile devices. The keyboard is a well-known mental model for soliciting input for authentication, which conserves the user effort of understanding the desired interaction. On the other hand, the reality of the actual cognitive effort is informally documented by the fact 52% of pedestrian accidents involve a smartphone. This presentation looks at measures of the effort required for smartphone authentication using human performance modelling and the design implications for security interfaces. Security design choices can dramatically impact usability, and modelling tools can save development time by providing evidence to question current common practices.
ITIL Certified and PMP Certified Senior Technology Consultant / Senior Project Manager / Program Manager in IT Infrastructure Management, Data Center Operations & Development, IT Security, IT Change Management, Application System Development and Technical Services Development (U.S. Citizen & U.S. Air Force Veteran) SUMMARY: Mr. Slater's career has been characterized by both professional excellence and high-quality work performance. He leads by example and is a results-oriented, people-oriented technical manager who can effectively build, lead, and motivate high-performance teams. He has a coaching-mentoring style of leadership. Mr. Slater has worked in some of the world’s most demanding IT environments; among these are JLL, British Petroleum, the Veterans Administration, Microsoft, Technisource, and the United States Air Force. Each of these environments presented unique, high-pressure, high-visibility challenges that not only required intelligence, skills, experience and integrity, but they were demanding in ways that required creativity, adaptability, and flexibility. Mr. Slater possesses exceptional technical and leadership skills and is a well-rounded IT professional who can quickly adapt to and add great value to any organization.
bio
Hajara Al Amodi is a seasoned consultant, with 13 years of experience working in the Technology consulting industry. She currently works in project and program management. Hajra Al Amodi specializes in active risk management and working with multi million dollar project budgets. She was the founder and CEO of a software services company named Waadi Corporation and grew it to multi-million dollars in revenue. She is an international board member at companies in the Technology and Real Estate industry and a private investor. Al Amodi is a steering committee member of 2020WOB and a member of the research committee at 30% club GCC chapter, where she works with a team of committed people who are trying to increase women representation on corporate boards, and in the C- suite . She also teaches Finance and Entrepreneurship to high school students and does project management seminars.
Professor Jung will join the Department of Computer Science and Engineering at the University of Notre Dame as a tenure-track assistant professor in Fall 2017. He received his Ph.D. degree in Computer Science at Illinois Institute of Technology under the supervision of Professor Xiang-Yang Li and Professor Peng-Jun Wan, and he received his B.E. degree in Computer Software in Tsinghua University. His research area includes privacy & security issues in data mining and provisioning in the big data ecosystem. His paper has won a best paper award (IEEE IPCCC 2014), and two of his papers were selected as best paper candidate (ACM MobiHoc 2014) and best paper award runner up (BigCom 2015) respectively. He has served many international conferences as a TPC member, including IEEE DCOSS, IEEE MSN, IEEE IPCCC, BigCom.
Manager, Deloitte & Touche LLP
Priyum Jyoti has over seven years of experience in security consulting, delivering solutions across multiple cyber domains. Priyum’s role has included setting strategy to support business and IT objectives, and then implementing that strategy in an optimized manner to achieve tangible results quickly. Priyum has worked with clients from multiple industries, including power & utilities, banking, non-profit, higher-education and insurance. Priyum has designed and implemented business policies and procedures relating to cyber security and compliance. She has worked with both local and global clients, including international experience in South Africa. Priyum Jyoti is a Certified Information Privacy Professional (CIPP) and received her Bachelors in Electrical Engineering from Purdue University
Manager, Deloitte & Touche LLP
Andrea is a Deloitte Advisory Manager within Cyber Rick Services. She has over ten years of experience in the Public sector assisting Federal and State Agencies with strategic, operational and tactical risk mitigation strategies. Andrea has expertise in risk analysis and curriculum development. She worked with clients within power and utilities and various States in creating and implementing smart practices for the sharing of information, identification of security gaps and corrective risk mitigation options while efficiently communications findings to stakeholders, private sector owners and operations, and first-responder personnel. Andrea demonstrates proven abilities in managing a state fusion center and supporting various emergency response entities in identifying, detecting and responding to man-made, natural and cyber incidents. Andrea encompasses analytical tradecraft and demonstrates consistent, repeatable and defensible methodologies pertaining to risk and the elements of threat, vulnerability, and consequence.