Robert Morris University (RMU) has been designated as a National Center of Academic Excellence in Cyber Defense Education (CAE-CDE) by the U.S. National Security Agency and Department of Homeland Security (NSA/DHS). Dr. Ping Wang, Professor of Computer and Information Systems, is the official POC (Point of Contact) for RMU’s CAE-CDE designation.
April 23, 2019 (TUE) 2:00 PM
Speaker: David Daniels-Watanabe, special agent (FBI)
All are welcome. SET credit available.
Hosted by Prof. Don Seaton, Dept of Social Science
SA David Daniels-Watanabe is a Special Agent detailed the FBI’s Critical Incident Response Group’s and is a profiler at the Behavioral Analysis Unit (BAU), Cyber Behavioral Analysis Center (CBAC) where he supports the FBI’s cyber mission by providing behavioral insight into known and unknown cyber adversaries. This work ranges from examination of human behavior and motivations that impact national security or criminal computer intrusion investigations, as well as understanding the confluence of violent criminal behavior and the digital/cyber behavior related to the violent crime.
Prior to his time in the BAU CBAC, SA Daniels-Watanabe was detailed to the FBI’s Washington Field office. During this assignment he investigated complex and high-profile malicious digital attacks by actors motivated by financial or vindictive motives, “hacktivism”, or furtherance of the goals of a nation state.
SA Daniels-Watanabe is one of the “plank-holding” founding members of the National Cyber Investigative Joint Task Force as the Department of State’s representative to the multi-agency collaboration, where he participated in several global cyber investigative efforts and furthered international cooperation on cyber matters.
SA Daniels-Watanabe is a member of the Department of State’s Cyber Threat Analysis Division. Prior to this assignment, he spent 2 years at the New York Field office of the Bureau of Diplomatic Security.
Before becoming an agent, he was a computer forensic investigator for T-Mobile.
Brandi Wolfe and Wyatt Crawford, Cyber Security Specialists from Ethical Intruder will be holding a lecture on Wednesday, April 10th from 4:30 – 5:30 pm in the Wheatley Atrium.
This is a Top Secret Colonials sponsored event. Students will receive one (1) hour of SET credit for attending. Pizza and drinks will be provided. Please read below for information on the presentation and speakers.
Title: Ethical Hacking – Thinking Like a Penetration Tester
Overview: Hackers have an offensive mindset and approach security in a very different way. It begins by realizing that all hacks come from taking technology that is intended to work in a specific way and getting the technology to produce unintended results. The discussion will cover the mindset and process for performing a penetration test.
Ethical Intruder is a Pittsburgh, Pennsylvania-based Cyber Security firm. Ethical Intruder was formed with personnel from security, software engineering and product design backgrounds. They provide security evaluations to assess technical environments and help organizations to build Cyber Security roadmaps aligned with their business or compliance requirements. Their clients are across a broad range of industries including Health IT, Finance and Department of Defense.
FedEx will be conducting practice interviews for IT students in the Career Center on Friday April 5th, 2019.
Students should sign up on Handshake under the Jobs and On-Campus Interviews headings. Students will also need to have a resume uploaded on Handshake to apply and should do so as soon as possible or before the deadline of Wednesday April 3rd. Professional attire is requested.
Tracy Cassidy from the CERT Team at Carnegie Mellon University will be holding a lecture on Insider Threats on Thursday, March 21st from 4:30 – 5:30 pm in the Wheatley Atrium.
This is a Top Secret Colonials sponsored event. Students will receive one (1) hour of SET credit for attending. Pizza and drinks will be provided. Please read below for information on Tracy Cassidy.
Tracy Cassidy is an Insider Threat Researcher at the CERT Insider Threat Center, part of the Software Engineering Institute (FFRDC) at Carnegie Mellon University. Her work at CERT Insider Threat Center has focused on researching behavioral and socio-technical factors surrounding a variety of insider threats such as espionage, fraud, information technology sabotage, theft of intellectual property, workplace violence and terrorism. Prior to becoming a researcher, Cassidy was a practicing clinical psychotherapist. As a psychotherapist, she focused on clients with criminal backgrounds, substance abuse problems, and severe mental health issues. She was a long time contracted Federal Services Program Director for the U.S. Department of Justice’s Bureau of Prisons and U.S. Federal Probation and Pretrial Services which provided mental health and substance abuse services for hundreds of clients entering or exiting the federal criminal justice system in Northern California, Hawaii, and Guam. During her work at CERT, she has been continually looking at ways to bridge the technical-behavioral gap in addressing insider threat and cybersecurity challenges. Tracy has her B.A. in Psychology and her M.A. in Clinical Psychology. Cassidy is an active member of InfraGard as well as the Association of Threat Assessment Professionals (ATAP) community where she sits on the DC Chapter board and is the local Chapter Development Chair. She is one of the original founders of BSides Pittsburgh.
Organizations across all industry and government sectors face risks from insider threats. Insiders can use their authorized access to systems, facilities, and information to either maliciously or unintentionally harm their organization and this threat may not stop when the employee leaves the organization. Technology has made it easier to exfiltrate proprietary, sensitive, or classified information as seen in many recent cases. During this presentation, Tracy will discuss the types of insider threats, case examples, and the potential risk indicators that might be visible to give technical and behavioral clues that the insider is on the pathway to insider risk. Insider threat mitigation is about prevention, detection and response- all topics of discussion during this presentation.