Modern Technology Solutions, Inc.
University of Dayton
Our LinkedIn Group: OISF at LinkedIn
It is that time of the year again. Our annual conference is coming up on Sat. July 9th celebrating OISF's sweet 16!. The OISF Annual Conference will be held both in-person and online this year (details to follow). This year's conference will be hosted at a new venue, Holiday Inn Dayton/Fairborn I-675, 2800 Presidential Drive, Fairborn, OH 45324. The conference will begin at 8:30 AM with breakfast starting at 8:00 AM and will end around 4:30 PM.
When you register for the conference, you will be prompted to select whether you will be attending in-person or virtual. When selecting In-person you will also specify your boxed lunch add-on option. When registration is complete you will receive a confirmation email with instructions on how to pay for your ticket.
We are seeking donations that are tax-deductible to our Non-Profit 501(c)(3) Learning Charity to allow our organization to share knowledge and conduct training to local Dayton Cybersecurity Professionals. You can also make contributions through Amazon Smile by selecting Ohio Information Security Forum as your charity organization or directly via Paypal with the email address firstname.lastname@example.org.
|0845:||OISF President - Dr. Carls||Opening Remarks|
|0900:||Matt Scheurer||Becoming an IR Superstar|
|1000:||Scott Nusbaum||Ransomware Is NOT the problem|
|1100:||Dr. Phu Phung||Hybrid image-based approaches for modern malware classification|
|1245:||Dr. Carls||Remarks - Potential Titanium Sponsor|
|1300:||Micah Brown||How a 1993 CCG Prepared me for a Life in InfoSec|
|1400:||Jerod Brennon||Rethinking Cybersecurity in the Quantum Age|
|1500:||-||Cake Cutting Ceremony|
|1530:||Deral Heiland||Evaluating the Security of an Enterprise IoT Deployment - From Acquisition to Support|
|1630:||OISF President - Dr. Carls||Closing Remarks|
Are you an aspiring Incident Responder? Perhaps looking to advance from a career as a Security Operation Center (SOC) analyst? Or simply intrigued by the technical aspects of being an Incident Response (IR) professional? IR analysts and engineers conduct investigations to answer the classic “Who, What, When, Where, Why, and How” questions in responding to security alerts and incidents. Incident Responders utilize a working knowledge of Defensive Security, Offensive Security, and Digital Forensics to conduct their investigations. During this presentation, we cover the technical skills and baseline knowledge required on the roadmap to becoming an IR Superstar!
Matt Scheurer is a show host for the ThreatReel Podcast, and also works as an Assistant Vice President of Computer Security and Incident Response in a large enterprise environment. Matt has many years of hands-on technical experience, including Digital Forensics and Incident Response (DFIR). He volunteers as a "Hacking is NOT a Crime" Advocate and as a technical mentor for the Women's Security Alliance (WomSA). Matt is a 2019 comSpark “Rising Tech Stars Award” winner. Matt has presented on numerous Information Security topics at many technology meetup groups and prominent Information Security conferences across the country.
Challenging the commonly reported belief that Ransomware is the main problem effecting companies today. But, if you ask people what is ransomware, you will get various answers, and most of them are wrong. Let's discuss what Ransomware is and why is it just the scapegoat for a more serious issue, that the attacker already owns the environment. We will reverse engineer a ransomware sample to understand its basic functionality and how it differs from commodity malware, walkthrough common paths of a "Ransomware" attack, areas of a ransomware event that organizations forget, overlook, or outright ignore, and how security products fail to protect against ransomware.
Scott Nusbaum is a Principal Security Consultant at TrustedSec focusing on research and Incident Response. Scott has worked in IT for over 23 years ranging from Software Developer to Reverse Engineer. 17 of those years in various aspects of Security. Scott has a bachelor's in Computer Engineering and a master's in Computer Science with a focus on Cyber Informatics from the University of Cincinnati. Holds the GIAC Reverse Engineering Malware (GREM) and the Offensive Security Certified Expert (OSCE) certifications. Scott has always been fascinated with how exactly computers and software operate. Scott's passion for learning the inner workings of systems led to Reverse Engineering, Malware, exploitation development, and CTF.
We present multiple hybrid methods of analyzing different software categories for machine learning-based malware classification. In the first approach, we introduce a novel image transformation method using statistical, syntactic artifacts, and space-filling curves to convert binary software into color 3D images with semantic information. The second approach is to use static analysis to extract the Interprocedural Control Flow Graph and an additional set of features from a Java bytecode program to produce a grayscale image. We also extract an additional set of features from Java malware programs to improve the accuracy of the malware classification.
We evaluate our approaches by leveraging machine learning algorithms, including shallow (XGBoost) and deep (Convolutional Neural Network) learning classifiers for the classification of various datasets of malware. Our experimental results demonstrate that the proposed methods outperformed related works and can detect both known and previously-unseen real-world malicious programs.
Dr. Phu H. Phung is an Associate Professor, and Director of the Intelligent Systems Security Lab in the Department of Computer Science, University of Dayton. He received his Ph.D. in Computer Science in 2011 from Chalmers University of Technology, Sweden. His research spans security solutions for intelligent Web, mobile, and IoT systems. He is also interested in malicious software detection. His works have been published in top security venues with 800+ citations. Dr. Phung has served as a reviewer for many top security journals and conferences, and on the program committee for over 20 international conferences. Dr. Phung is a senior member of IEEE and ACM.
Magic the Gathering (MTG) is one of the most iconic and popular customizable card games of all time. At its heart the game is all about resource management and strategic thinking. Since 1993 MTG has been able to build and maintain and communicate a constant vision of the game both internally to create new cards and externally to attract new and old players alike. Join me as I release an open-source documentation framework with downloadable demo VM. (This is about transforming your documentation into an easy to read / digest living document)
Micah K Brown is a member of the IT Security Engineering team at American Modern Insurance, part of the Munich RE Group. Over the past four years he has served as the lead Engineer on the DLP implementation for Data Loss Prevention for the Munich RE organizations located in North and South America. In this role Micah has learned the many intricacies of what works in a successful DLP project. In his free time, Micah serves on the Greater Cincinnati ISSA Chapter as Vice President. Micah graduated from the University of Cincinnati and holds an active CISSP.
Quantum computing has already shifted from the realm of science fiction to the realm of science fact, and practical applications for quantum computing are already finding their way into the workplace. And just as with any other emerging technology, the cybersecurity implications are taking a backseat to the business innovations. This puts cybersecurity teams at a disadvantage when it comes to protecting against threats that leverage this same technology. In this presentation, Jerod will provide you with a foundational understanding of quantum computing, and he’ll share insights into where quantum computing stands today, as well as insights into how cybersecurity professionals can better equip themselves and their teams to defend against new and emerging threats.
By day, Jerod Brennen (@slandail) is a strategic advisor, virtual CISO, public speaker, storyteller. By night, he’s a husband, father, writer, filmmaker, martial artist, musician, and gamer. It’s fair to say that he’s earned every gray hair in his beard, having spent his career serving as a cybersecurity leader in public utilities, retail, higher education, consulting, and technology. Jerod loves to share what he’s learned over the years every chance he gets: at local and regional professional meetings, at larger conferences, and online via blogs and podcasts. He has published multiple online information security courses with Pluralsight and LinkedIn Learning, and he also teaches courses in person, both domestically and internationally. He brings a unique combination of perspective and experience to the table when helping organizations improve their cybersecurity programs, focusing on the business value of an effective, efficient, forward-thinking cybersecurity program. At the end of the day, Jerod just wants to help folks get one step closer to doing what they want to do securely.
During this presentation I will be discussing a research partnership where I worked with a fortune 1000 company to evaluate their internally conceived, designed and deployed Internet of Things (IoT)-based business solution. The goal of this research project was to understand the security implications around a large-scale enterprise IoT project, and the associated processes related to following three key areas:
* Acquisition, implementation, and deployment
* Technology and functionality
* Management and support
Deral Heiland CISSP, serves as a Principal Security Researcher (IoT) for Rapid7. Deral has over 25 years of experience in the Information Technology field and has held multiple positions including: Senior Network Analyst, Network Administrator, Database Manager, Financial Systems Manager and Senior Information Security Analyst. Over the last 15+ years Deral’s career has focused on security research, security assessments, penetration testing, and consulting for corporations and government agencies. Deral also has conducted security research on numerous technical subjects, releasing white papers, Blogs, security advisories, and has presented the information at numerous national and international security conferences including Blackhat, Defcon, Shmoocon, DerbyCon, RSAC, Hack In Paris. Deral has been interviewed by and quoted by multiple media outlets and publications including ABC World News Tonight, Cheddar TV, BBC, Consumer Reports, MIT Technical Review, SC Magazine, Threat Post and The Register.