Category Archives: cybersecurity

Online Speaker on April 21st – Intelligence Analyst Felipe De Vega discusses Jumping the Air Gap

The Top Secret Colonials are holding their third online presentation on Tuesday, April 21st at 1:00 pm. Students will be able to earn 1 hour of SET credit. Below you will find a link to Google Hangouts. You will need to click the link to join.

Intelligence Analyst Felipe De Vega who is with the Department of Defense Special Access Program Cyber Threat Intelligence Cell will present on Jumping the Air Gap.

Presentation Topic: Jumping the Air Gap

Information system owners and information security personnel have viewed the air (physical) gap between information systems as an effective mitigation to protect data exfiltration. This can include disparate networks, or disconnected stand-alone information systems.

Intelligence Analyst Felipe De Vega’s Bio

Department of Defense Special Access Program Cyber Threat Intelligence Cell

Felipe de Vega is an intelligence analyst with ManTech International Corporation and a retired career naval intelligence officer. He is a 1998 graduate of the U.S. Naval Academy and an honors graduate of National University.

At sea, de Vega served as air intelligence officer for Electronic Attack Squadron 131 (VAQ-131) onboard USS Constellation (CV-64) during Operation Southern Watch. He also served as air wing intelligence officer for Tactical Support Wing / Carrier Air Wing Reserve 20 (CVWR-20).

Ashore, de Vega led instruction for satellite imagery analysis courses at Fleet Intelligence Training Center, Pacific in San Diego. He was the operations officer of Joint Reserve Intelligence Center, New Orleans and served as red team leader and Navy intelligence doctrine developer at Navy Warfare Development Command in Norfolk, VA. Additionally, he completed National Capital Region tours at the Office of Naval Intelligence and U.S. Cyber Command.

In his current position, he provides intelligence and supply chain risk management assessments that support the Office of the Secretary of Defense, Air Force, and Navy Special Access Program systems accreditation.

Google Hangouts Meeting Information

Meeting ID
meet.google.com/ryw-yksr-hur

Phone Numbers (US)
+1 904-580-9686
PIN: 572 123 798#

Online Speaker on April 14th – Dr. Gary King discusses the Cyber Kill Chain

The Top Secret Colonials are holding their second online presentation on Tuesday, April 14th at 1:00 pm. Students will be able to earn 1 hour of SET credit. Below you will find a link to Google Hangouts. You will need to click the link to join.

Special Agent Dr. Gary King from the AirForce Office of Special Investigations will hold a virtual presentation on the Cyber Kill Chain. Below you will find information on the presentation and Dr. King’s bio.

Presentation Topic: Cyber Kill Chain

Each step in the cyber kill chain presents an opportunity for an adversary to get closer to the target and establish long-term persistent access. However, each step is an opportunity for the network security staff to detect, react, and mitigate the threat to protect the confidentiality, integrity, and availability of data and information systems.

Special Agent Dr. Gary King’s Bio

Dr. Gary King is a federal investigator with the Air Force Office of Special Investigations (AFOSI) specializing in cyber crime and computer forensics. He has over 30 years of law enforcement and counterintelligence experience with more than 19 years of cyber crime and computer forensics experience.

Dr. King serves as the Chief, Cyber Security, AFOSI Special Projects, Joint Base Anacostia-Bolling, District of Columbia. During his AFOSI career, he has served as AFOSI’s cyber investigations and operations program manager, liaison officer to the National Cyber Investigations.

Google Hangouts Meeting Information

Meeting ID
meet.google.com/jqv-jzxg-qfp

Phone Numbers
(US)
+1 402-337-4224
PIN: 427 553 517#

Online Speaker on April 9th – Threat Actors and their Motivators

Dr. Al Wong from The MITRE Corporation, a government think tank, will be giving an online presentation on Threat Actors and their Motivators this Thursday, April 9th at 3:00 pm.  Students are able to earn 1 hour of SET credit.  This event is sponsored by the Top Secret Colonials (TSC).

Presentation Topic:  Risk Management – Threat Actors and their Motivators
It is not a matter of if but a matter of when an organization becomes the target of a cyber attack. As the cyber threat landscape evolves, the types of threat actors that attempt to undermine organizations’ cybersecurity grow increasingly diverse. Threat actors range from opportunistic hackers who are merely after bragging rights to highly skilled, nation-backed teams who launch sophisticated cyber attacks over prolonged periods of time. Effective risk mitigation thus relies heavily on identifying the types of threat actors that are likely to attack an organization’s information systems, as well as understanding the methods they are likely to use. This discussion introduces the various types of threat actors, as well as the sectors that are frequent targets.

Google Hangouts Meeting Information
Click the link below to attend the presentation on Thursday, April 9th at 3:00 pm.

Meeting ID
meet.google.com/nss-sohh-kty

Phone Numbers (US)
+1 484-854-3144
PIN: 712 788 397#

Dr. Al Wong’s Bio
Dr. Wong is a principle systems engineer with the The MITRE Corporation’s McLean Virginia headquarters where he secures and manages sensitive but unsecure (SBU) labs. He has 15+ years of experience in developing security architectures and security operations centers for the United States Federal Government as well as for private industry.

Mr. Wong is a Harvard University-trained cybersecurity analyst in managing risks in the information age. He holds a Doctorate degree in Information Systems and Communications, a Master’s degree in Information Management, and a Bachelor’s degree in Internetworking Technologies.

Summer and Full-Time Opportunities available at BNY Mellon

BNY Mellon is looking to identify new and emerging talent for a range of technology roles including:

  • Developer
  • Infrastructure Engineer
  • Cybersecurity Analyst
  • Business Intelligence Analyst

Technology Campus Program

During this 18-month program, participants will work within the Client Technology Solutions department and experience:

  • Robust technical software development training
  • The opportunity to develop technical, professional, interpersonal and leadership skills
  • Networking support from a host of corporate leaders including mentors, executive sponsors and a dedicated program manager

Apply to this full time opportunity for December 2019 – May 2020 graduates at bnymellon.com/careersSearch 1910946

Summer Analyst Program

This 10-week internship offers new analysts:

  • Global corporate experience
  • Challenging real-world projects that help grow leadership abilities
  • Professional network to help launch a technology career

Apply to this internship opportunity for December 2020 – May 2021 graduates at bnymellon.com/careersSearch 1906793

BNY Mellon is committed to fostering an inclusive workplace that attracts the best talent and empowers their people to reach their full potential.

See attached flyer for further detail:

BNY Mellon Tech Campus

RMU Named in Best Masters’ in Internet Security Programs for 2020

masters_internet_securityIntelligent.com, a trusted resource for online degree rankings and higher education planning, announced their Top 30 Master’s in Internet Security Degree Programs for 2020.  Robert Morris University made the list for our Master’s in Cyber Security and Information Assurance.  This ranking was based on an assessment of 191 accredited colleges and universities in the nation. Each program was evaluated based on curriculum quality, graduation rate, reputation, and post-graduate employment.

RMU Students win TRISS Scholarships

TRISS Picture
Congratulations to Brandon Nelson, Christopher Cullen, and Kaden Mahsoob, who each won a $1,000 scholarship, awarded by the Three Rivers Information Security Symposium (TRISS) planning committee. Thanks to Professor Karen Paullet for her recommendation. Professor Paullet and the Top Secret Colonials have been active supporters of the TRISS the symposium and the TRISS Scholarship Program.

Cybersecurity Scholarships

Students in cybersecurity degrees should consider the following federal scholarship opportunities:

CyberCorps Scholarship For Service from the US Office of Personnel Management
DoD Cyber Scholarship program from the US Department of Defense

Wi-Fi Workshop on Wednesday, November 13th

Rick Farina will speak on Wednesday, November 13th at 4:30 pm in the Wheatley Atrium. “Have you ever heard of WPA3 and Enhanced Open?  Come learn about the new additions to the WiFi standard and how they can help secure you today.”  If you are interested in learning the dangers of Wi-Fi, you will want to attend this presentation.

One hour of professional development SET credit will be awarded. Refreshments will be served. This is a TSC sponsored event.

Below you will find Rick’s bio:

Rick Farina is a well-known wireless expert who is a frequent speaker at a
variety of security conferences including DEF CON. With multiple
colleagues he runs RF Hackers Sanctuary, a not for profit dedicated to
education.  RFHS runs the Wireless Capture the Flag at numerous
conventions. Farina enjoys talking to people about wireless hacking
and teaching anyone with an interest in wireless security.  

UPMC Presentation on Phishing, Security Operations, and Jobs

Join TSC as they present Sarah Pfabe, TSC alumni and an information security analyst at UPMC to speak about the dangers of phishing and what organizations do to protect against it on Tuesday, November 5th at 4:30 pm in the Wheatley Atrium.  She will go through everything from what makes a phishing email, to the tools analysts use to examine and detonate malware.  An overview of working in a Security Operations Center and job opportunities at UPMC will also be a part of this presentation.  

Information about phishing: Phishing is one of the ways hackers attempt to gain access to your personal information via your computer or smartphone. These attacks often rely on the same basic strategy: to trick you into providing sensitive information such as usernames, passwords, and credit card details by making you think the request is coming from a trusted source such as your bank, credit card company, a colleague, or friend. No organization, large or small, is immune to the dangers that phishing emails present.

Students will receive 1 hour of SET credit. Pizza will be provided.