Presentation materials are available for download here
TJ OConnor named keynote speaker
We are featuring presentations and panels focusing on:
- Management & Policy
From speakers who include:
- Special Agent Eric Brelsford and RCFL Forensic Examiner Paul Rettig
FBI Cyber Squad, Regional Computer Forensics Laboratory (RCFL)
- Greg O'Reilly
Cook County Public Defender's Office
TJ OConnor is author of the recently published book, Violent Python. A highly regarded information security expert, TJ co-coached two winning teams at the National Security Agency's Cyber Defense Exercise and won the National Defense University's 1st Annual Cyber Challenge. TJ earned a B.S. in Computer Science from West Point, an M.S. in Computer Science from NC State, and an MS Degree in Information Security Engineering from the SANS Technology Institute. He holds several technical certifications, including the prestigious GIAC Security Expert (GSE) and Offensive Security Certified Expert (OSCE) certifications. He has presented and published technical research at USENIX workshops, ACM Conferences, ShmooCon, the SANS Reading Room, the Internet Storm Center, the Army Magazine, the Armed Forces Journal, and the US Army Communicator Magazine.
We will also be featuring a Malware Challenge during the afternoon of Day 2 of the conference. To participate in the Malware Challenge, we recommend participants bring a laptop with the following tools pre-installed in a Windows XP or Windows 7 Virtual Machine with networking disabled:
Wireshark, Network Miner, JD-GUI, PEiD, BinText, WinHex, 7Zip, PEview, md5deep and optionally the Static Analysis portion of IDA Free could be useful.
All challenge questions can be answered without running the malware and by solely using the Static Analysis tools above. However, it is highly recommended to do all analysis within the networking disabled Virtual Machine to prevent infection from accidental execution. The malware to be analyzed is from the wild and the URLs and IP addresses contained within are most likely still active.
Barrier1 Hacking Challenge:
We invite your participation as a sponsor/exhibitor, speaker, or attendee of the IT Forensics and Security Conference and Expo at Illinois Institute of Technology. This multi-track, technical conference attracts 200+ professionals for an intensive one- and a half-day schedule that includes discussion and debate over forensics, security, data/information governance, cyber crime and security, ethical hacking, eDiscovery, cloud forensics, steganography, policy and compliance, privacy, wireless security, cloud computing, and identity theft.
Illinois Institute of Technology's Rice Campus
School of Applied Technology
201 East Loop Road
Wheaton, IL 60189