The U.S. Department of Homeland Security (DHS) will be hosting the National Protection and Programs Directorate (NPPD) Cybersecurity Webinar. The event will take place from 4:00 p.m. – 5:00 p.m. on Thursday, March 29.
The webinar will be for college and university students and recent graduates interested in pursuing a cybersecurity career at NPPD. This webinar will feature a panel of NPPD employees who will share their experiences in cybersecurity and career paths at NPPD. In addition, human resource officials will explain the federal application process and highlight NPPD career pathways for students and recent graduates.
This event is free for participants. To register, click here. As space is limited, it is recommended you register soon.
February 27, 2018
Yorktown Hall – Moon
12:00 pm to 3:00 pm
For RMU students and alumni only!
Here is a list of employers that will be attending:
All Lines Technology
Allegheny County Airport Authority
Allegheny County Department of Human Services
Allegheny Intermediate Unit
Auto-Owners Insurance Company
Beaver County YMCA
BKD LLP: CPAs & Advisors
Black Knight Security
Champion Windows, Sun Rooms, and Home
City of Pittsburgh
Commonwealth of PA, Pennsylvania State Police
Community Living and Support Services (CLASS)
Creehan & Co.
Dedicated Nursing Associates, Inc. (DNA)
DiNuzzo Index Advisors, Inc.
Eat’n Park Hospitality Group
Elite Transit Solutions
Equipment & Controls, Inc.
Erie Insurance Group
Express Employment Professionals
Fairmont Hotels & Resorts
Farmers Insurance Group
First Commonwealth Bank
Foresters Financial Services, Inc.
Foundation of HOPE
Fraternal Order of Police Lodge #1 Pittsburgh
Glade Run Lutheran Services
Gordon Food Service
Greater Pittsburgh Community Food Bank
Heartland Restaurant Group
Huntington National Bank
In Vision Human Services
Kelly Educational Staffing
McConway & Torley, LLC
Metro Benefits, Inc.
Mondelez International (formerly Kraft Foods)
Northwestern Mutual – Pittsburgh
Office of the Comptroller of the Currency (OCC)
Ohio Valley Hospital
Pittsburgh Marriott City Center
Pittsburgh Mercy Health System
PNC Financial Services Group
Presbyterian Day School
Promise Camp by Family Guidance
RMU Center for Global Engagement
S&S Flooring (Stack & Stack Gym Flooring)
SingleSource Property Solutions
Southwestern Human Services
SunTec Business Solutions Private Limited
Tender Care Learning Centers
The Academy Schools
The Home Depot
Trinity School for Ministry
VA Pittsburgh Healthcare System
Waste Management of PA
WE-EF LIGHTING USA LLC
YMCA Sewickley Valley
The Top Secret Colonials will be sponsoring a presentation by bit-x-bit which will be held on Thursday, January 25th from 4:30 – 5:30 pm in the Wheatley Atrium. bit-x-bit will be discussing how to handle a digital forensic investigation from start to finish, including the intake of evidence and preparing forensic images.
bit-x-bit is a Digital Forensics and e-Discovery consulting company, finding evidence in internal investigations and in cases of data theft and security breaches. The legal and technical teams at bit-x-bit have successfully completed hundreds of forensic investigations and e-discovery projects, ranging in scope from investigating the metadata in one file to the collection, culling and analysis of millions of electronic documents. bit-x-bit has provided e-discovery and computer forensics training to the United States District Court, government agencies and major law firms.
There will be two presenters from bit-x-bit at this event:
Brett Creasy – President and Director of Digital Forensics. Brett has over ten years of IT and Digital Forensic experience with degrees from Pittsburgh Technical Institute, Villanova University and Capella University.
Caitlin Counihan – Digital Forensic Analyst. Caitlin has been with bit-x-bit for over a year and graduated from RMU in 2016.
Students will receive SET credit for attending this event, and pizza will be provided. For more information about this event, contact Dr. Paullet at email@example.com. For more information about bit-x-bit, click here.
Sadly, there are many soldiers overseas that will not be home for the holidays. The Top Secret Colonials are collecting stockings to send to the soldiers. If you would like to fill a stocking for a soldier, you can pick one up in Dr. Paullet’s office (Wheatley 229). The stockings must be returned to her office by December 5th to be shipped.
Below is a partial list of items that are needed:
– Oreos, Chips Ahoy, Nutter Butter Cookies
– Trail Mix
– Beef Jerky
– Granola Bars
– Breakfast Bars
– Slim Jims
– M&M’s (all flavors) – other chocolate will melt
– Pop Tarts
– Crossword Puzzles
– Caramel Popcorn
– Gummie Candy
– Hot Cocoa Mix, Lemonade packets, etc.
For more information, contact Dr. Paullet at firstname.lastname@example.org
On Monday, November 13th, there will be a presentation by an employee from a major financial institution. He will discuss how the Cyber Security division of organizations operates along with detailing the varying arms of an organization’s Cyber Division to include cyber forensics, counterintelligence and insider threats. The presentation will take place in the Wheatley Atrium from 4:15pm to 5:30 pm.
One hour of SET credit can be earned. Refreshments will be served. This is a Top Secret Colonials event. For more information, contact Dr Paullet at email@example.com.
This event was held October 26th, and in case you missed it, here are some of the highlights to be taken away from the presentation. So, if you were in class and regretted now skipping class for this, we have got you covered!
- Searches – he discussed how when you use the search bar, it is important to understand its format:
- [general code] | [less general] | [continually more specific search]
- as you can tell, the idea is that there are commands that you use that are processed from left to write, and each command is separate by the |(pipe).
- Save searches! – with there being so many different ways to slice all of the network traffic that Splunk is managing, having different frequented searches saved is very convenient to insure more time searching network traffic, and not google for Splunk commands.
- Statistics – in order for anomaly detection to work, there needs to be an idea of what is normal. One person’s smile could be another person’s bad-day face. It is important to judge off of what is normal for the network traffic, much like judging someone’s behavior off of what is normal for that person. The statistics generated are what determines what falls within normal behavior for their network.
- Real-time Graphs & Charts – generating graphs and charts that will actually change and adjust in real time are super important. It allows an easy way to understand what is going on in the network – instantaneously. Wolfe stressed that bosses will love something so clean, visually appealing, and content-specific.
This presentation was about Splunk, the security event manager/log aggregation software. If you have had Paullet’s class and suffered through the wonderfully challenging Enron emails assignment, then you have had a small taste of this software’s capabilities. Splunk can be used for a wide variety of applications because of its ability to organize/index large sums of information with ease into databases, or indexes. James Wolfe focused on Splunk’s network security applications. James Wolfe is a security administrator for U.S. Steel, so his job requires him to focus on network traffic such as IPs, users, or anything that could potentially indicate a point of failure for their network. Wolfe explained that the beauty of Splunk is that you can start looking without needing to know exactly what it is that you are looking for – exactly how I described my use of Splunk when trying to find incriminating Enron emails. Because security is the importance of the job, he discussed the commands that would be useful for security. These things included:
- dedup – removes duplicates in your search.
- 4625 – this code indicates a failure to log in
A very basic example shown to us to show how the data was being used to detect anomalies was through the ratio or successful to unsuccessful log ins for users. By creating a baseline formula for the rate of successful logins for each user, the computer can flag any time there is a change in this rate that goes within 1-2 standard deviations. The data is all producing algorithms and equations based on what you – the user of the Splunk software – deems important.
- table_raw – views the raw informaiton that splunk pulled the information from for the databases/indexes
This raw information was very education in seeing how convenient the software is, because the raw version was pretty jumbled, messy, and difficult to understand.
- Deskside/IT support is a good career start – you learn to troubleshoot
- Ask as many questions as you can – be willing to do projects; this will make you valuable.
- CERTIFICATIONS: N+* – basic fundamentals of networking.
- Government – certifications are legally required
- CCNA – CISCO; mid-level
- Maintain a strong work ethic
- Log into a firewall – download free for home*
- 2 year schools like ITT tech allows hands on experience
- 4 year degree preferable, but less hands on – it proves that you are hardworking and willing to put in the time necessary; this ties in greatly with having a strong work ethic.
- Microsoft imagine account; dream spark; 2016 data center OS worth $3,000 [we get it for free at RMU, so utilize it!]
- All acronyms – know.
- Splunk: just saying that you have worked with Splunk automatically gives you an edge against the competition for any job in security.
- Google: useful; know that it really is alright to google what you do not understand when doing anything on the computer. There is so much to know, and as long as you accept that you will be learning throughout your entire career, you will be able to stay in demand with employers.
- Companies have filters on their employee’s computers preventing them from going on certain sites. Because you cannot access these through google, users will use Bing as their loophole to sites that they are not supposed to access.
- U.S. Steel, much like other companies, uses firewall redundancy to prevent any debilitating security errors.
- Splunk is free to download; free for developers license. All software is free all you need is to buy your own server with 16 gigs – plenty for an at home – of ram. Buy second NIC. Spin up VMs. Download licenses.