Mark your calendars and come join your friends in the CAE community for a Tech Talk. CAE Tech Talks are free and conducted live in real-time over the internet, so no travel is required. Capitol Technology University hosts the presentations using Zoom, which employs slides, VOIP, and chat for live interaction. Just log in as "Guest" and enjoy the presentation.

CAE Forum presentations are normally held on the first Wednesday of each month during the fall and spring semesters.

Topic: Secure Container for Data Protection in Transit and at Rest with Leakage Detection

Date:September 17, 2020

Time:1:00-1:50 p.m. ET

Location:Zoom Meeting
Just log in as "Guest" and enter your name. No password required.

Audience:Students, professors, government

Presenter(s):Denis Ulybyshev, Tennessee Tech

Description:To provide data protection in transit and at rest in decentralized environments, we developed a Microsoft Office-compatible data container, which guarantees data confidentiality and integrity and supports different data formats, including text and images. It provides role-based and attribute-based access control in decentralized environments with limited Internet connectivity, which is important at times of disease pandemics or natural disasters. Our solution is able to detect several types of data leakages that can be made by authorized insiders. The container can be used to securely store and transfer different types of documents, including tax forms, bank statements and Electronic Health Records. This solution can potentially allow healthcare providers to email protected clinical and administrative data to patients without using a HIPAA-compliant email server.

Topic: Reverse Engineering Malware (REM)

Date:September 17, 2020

Time:2:00-2:50 p.m. ET

Location:Zoom Meeting
Just log in as "Guest" and enter your name. No password required.

Audience:Students, professors, government

Presenter(s):Dr. Marwan Omar, Saint Leo University

Description:Knowing how to analyze malware can bring an element of control into an otherwise chaotic environment that exists around a security incident. It's also a critical aspect of modern forensic analysis actions, because it's all too frequent for investigators to discover malware on the compromised systems

CAE Tech Talks are recorded;view them here.

Contact us at CAETechTalk@nsa.gov.

IUP Institute for Cyber Security