cart

Members

Join Login

Membership and collaboration facilitated by Member 365.

Members

Join Login

Membership and collaboration facilitated by Member 365.

Industry News

  • News

(3CS) Pre-summit Job Fair 2018 on August 2nd

Looking for a cybersecurity job can be stressful, but you can alleviate some of that headache by attending a pre-summit job fair preceding the Community College Cyber Summit (3CS). Many industries and businesses will be at the fair on Thursday, Aug. 2, 8:30 to 11:30 AM, at Mt. Hood Community College in Gresham, Oregon.

Student stipends available for a Job Fair in PORTLAND!

If you are enrolled in an information security, computer science, and information technology degree program, you now have a fantastic opportunity to talk with representatives from a range of IT and cybersecurity businesses and industries that have job openings.

You can apply to receive financial support to cover your job fair and 3CS registration, travel costs, lodging, and per diem stipend, based on the distance from your home to Mt. Hood Community College, as described below:

  • Local Students (living within 60 miles of Mt. Hood) – qualify for the coverage of their registration ($25) and reimbursement of round-trip travel at the rate of 54.5 cents per mile.
  • Regional Students (living between 60 and 175 miles from Mt. Hood) – qualify for the coverage of their registration ($25), reimbursement of round-trip travel at the rate of 54.5 cents per mile, one (1) night’s lodging ($209 - room must be shared by 2 students), and a stipend of $138.
  • National Students (living over 175 miles from Mt. Hood) – qualify for the coverage of their registration ($25), reimbursement for transportation (airplane/bus/train) or mileage reimbursement not to exceed $500, two (2) nights lodging ($209 - room must be shared by 2 students), and a stipend of $138 to cover other trip incidentals.

To be considered for financial travel support, the online request form must be filled out and submitted by midnight, June 8. Recipients will be notified of travel awards by June 18.

Learn more about the Pre-Summit Job Fair HERE.

Go HERE to fill out travel stipend application.

Read more...

Call for Applications - CCC Leadership in Embedded Security Workshop

The Cybersecurity Taskforce of the Computing Community Consortium (CCC) will host a leadership workshop to envision the future of embedded security research on August 13th in Baltimore, Maryland.

The workshop, co-chaired by Wayne Burleson (UMass Amherst), Kevin Fu (CCC Cybersecurity Taskforce Chair, University of Michigan), and Farinaz Koushanfar (UC San Diego), will be co-located with the 27th USENIX Security Symposium. It will begin with a reception on the evening of August 12th and conclude by 5 PM on the 13th.

The workshop will focus on embedded security - the study of physical properties, computational properties, and human factors to protect embedded systems, such as pacemakers, autonomous vehicles, and the Internet of Things, from attack. This workshop is by invitation only – the CCC is seeking short position papers to both assist us in organizing the workshop and in selecting attendees to invite. Participants will consist of invited faculty members, industrial researchers, and government agency program managers.

The event will consist of deep dive group discussions as well as short visionary talks by several international speakers to lend perspectives on successful strategies for funding embedded security research overseas.

Confirmed panelists include

How to Apply

The workshop participants will be selected from among the responses to a call for 1-page position papers that address:

  • a grand challenge,
  • at a time-scale of 5-10 years out,
  • requiring multiple experts or subdisciplines,
  • identifying gaps in research,
  • and presenting compelling opportunities for embedded security research and education.

The following list suggests some possible topics for the position papers, but any embedded security topic is welcome. This list is not exhaustive, but represents the broad definition of embedded security.

  • Threat Models in Embedded Security
    • Side channels: Passive and Active
    • Sensors and Actuators
    • Physical attacks and defenses
    • Counterfeiting, trojans
    • Reverse engineering
    • IP theft
    • Tampering
    • Third party IP integration
  • Defenses
    • Anti-counterfeit, anti-tamper, obfuscation
    • Embedded crypto: Symmetric and asymmetric, secure hashing, TRNG
    • Energy-constrained security
    • IP protection and tracing
    • Verification
  • Embedded Security Design Patterns
    • Computer architecture
    • HW-SW co-design
  • Applications
    • Industrial controls
    • Autonomous vehicles
    • Aviation
    • Medical devices
    • Power-grid
    • Smart homes
    • IoT
    • Operational Technology
  • Cyberphysical security
  • Human factors in Embedded Systems: Psychology, Sociology, Economics, Policy
  • Post-Quantum Cryptography in Embedded Systems
  • Security Economics
  • Protecting Legacy Systems

If you are interested in attending the workshop, please complete the application and submit the requested materials, including a one-page position paper, here by June 1st. The workshop organizers will notify the selected attendees by June 15th. The CCC will offer domestic travel reimbursement for participants who desire it. For more information about the workshop, check out the workshop webpage.

If you have any questions feel free to contact Khari Douglas at kdouglas@cra.org.


Khari Douglas
Program Associate, Computing Community Consortium
Computing Research Association
kdouglas@cra.org

Read more...

Call for Papers - Hawaii International Conference on System Sciences 52

Minitrack: Innovative Behavioral IS Security and Privacy Research. This minitrack provides a venue for innovative research that rigorously addresses the risks to information system security and privacy, with a specific focus on individual behaviors within this nomological net. Domains include work related to detecting, mitigating, and preventing both internal and external human threats to organizational security.

Read more...

The Colloquium recognizes that the protection of information and infrastructures that are used to create, store, process, and communicate information is vital to business continuity and security. The Colloquium's goal is to work together to define current and emerging requirements for information assurance education and to influence and encourage the development and expansion of information assurance curricula, especially at the graduate and undergraduate levels.


giving

Save money and support the Colloquium for Information Systems Security Education.


Recent Posts