Event

Teaching Digital Natives Webinar

Join our Operation K12 team to explore Teaching Digital Natives.

In this webinar, we’ll explore the dynamic realm of Teaching Digital Natives. Join us to delve into a comprehensive cybersecurity program designed to equip educators with effective strategies, compelling content, and inspiration for both summer camps and middle school courses.

Teaching Digital Natives Webinar2024-09-20T10:25:43-04:00

Teaching Digital Natives

Join our Operation K12 team to explore Teaching Digital Natives.

In this webinar, we’ll explore the dynamic realm of Teaching Digital Natives. Join us to delve into a comprehensive cybersecurity program designed to equip educators with effective strategies, compelling content, and inspiration for both summer camps and middle school courses.

Teaching Digital Natives2024-04-23T14:06:05-04:00

PARTNER EVENT: CAE 2024 VIVID Cybersecurity Competition

CAE College and University Students – Register Your Teams for the VIVID 2024 Cybersecurity Competition!

The Virtual Internship and Varied Innovative Demonstrations (VIVID) Coalition, comprised of the University of Alabama in Huntsville, Augusta University, University of Arizona, and Florida International University, is excited to announce the 2024 VIVID Cyber Competition.

This competition is an opportunity for students at CAE institutions to strengthen their resumes and showcase their skills in front of U.S. government practitioners.

Teams of five will compete in the virtual cyber competition on March 11-14, 2024. The top 15 teams will be invited to the CAE Annual Colloquium for the top prize and title of “Overlord Champion”.

Important Dates
  • Team registration deadline: January 31, 2024 (accepted teams will be notified on this day)
  • Virtual competition: March 11-14, 2024
Competition phases
  • The top 15 teams from the virtual March event will proceed to the live event.
  • Live event at the CAE Annual Colloquium in October 2024.
Team Information
  • All 5 team members must be students from the same CAE school
  • Multiple teams from the same college or university are allowed
Cost
  • Free registration for all participating teams.
  • Travel stipends provided to offset live event travel costs.
Competition Details
Red Team

The hubris of mankind knows no end. How a group of academics think creating machine intelligence is a good thing is beyond belief. The danger of artificial intelligence is well known. Just look at the Forbes article[1] that tells us the risks or even Scientific American[2] which describes the menace of our digital overlords. They even had the audacity to call it “Overlord”; we must stop them!

Fortunately for us, a member of the AU research team that created this monstrosity sees the danger and has told us there is a hidden backdoor to their system that allows remote access. It’s great having an insider that shares our beliefs! Additionally, the creators were at least smart enough to build in an “off switch” but it is protected by an authentication system that needs a digital key. With this knowledge, we can enter the Overlord system and steal the key. Once we have it, we can shut down this monstrosity. Unfortunately, our inside person does not have the credentials to get to the key, so we must break into their system.

Our incident response tasks:

  • Find artifacts in the system indicating threat activity and indicators of compromise
  • Detect the threat actors
  • Respond to any malicious activity
  • Mitigate threats
  • Report what you find

Apex University (AU) announces their new artificial intelligence (AI) research system, Overlord! Professor Rosie Meebs, head of the project, declares “this is a new generation of AI that will reach heights never reached before. Our new code is faster and learns better than anything in existence. We project that in less than 8 months, Overlord will reach singularity and be a true intelligence. We expect once that happens, our AI will be able to solve any number of problems from creating fusion to solving the climate change crisis. Any negative comments are just jealousy, and we know there will be no problems once Overlord comes online. We will turn on Overlord on 1 March 2024 and change the world!”

Our tasks:

  • Recon the Apex University network
  • Identify the systems that hosts Overlord
  • Distract the security operations center analysts to cover your attack
  • Infiltrate the system
  • Gain access to the command & control computer
  • Find the digital key
  • Exfiltrate the key
Blue Team

You and your team are lucky enough to gain experience at Apex University’s (AU) Security Operations Center (SOC). For the last semester you’ve been working three days a week learning the job roles in SOC and expanding your cybersecurity knowledge. While today is usually not a workday, the SOC director called all of you to work and explained the university network was under attack and all the full-time analysts were swamped. The director needs you to work within the network and identify any artifacts in the system indicating threat activity and indicators of compromise.

PARTNER EVENT: CAE 2024 VIVID Cybersecurity Competition2024-07-26T15:58:39-04:00

CARE Lab 2024 Social Engineering Competition

The CARE Lab is hosting its 4th Social Engineering Competition virtually in April/May 2024!

SEC allows students to compete in a purely social engineering experience that is grounded in the social sciences. The competition offers a timely and unique platform for students to learn about social engineering in a hands-on, engaging, and ethical manner. The competition has a different theme each year to demonstrate the relevance of social engineering across various cybersecurity areas, and is open to high school, undergraduate, and graduate students.

This year’s theme, tax scams, is inspired by the IRS’ annual Dirty Dozen list of tax scams for 2023. According to IRS Commissioner Danny Werfel, scammers are “coming up with new ways all the time to try to steal information from taxpayers”. So, what exactly are these ways? Come find out how cybercriminals are using social engineering in employment and tax scams.

No technical experience is required. High school and college students (aged 14+) from all disciplinary backgrounds are welcome!

Details

Applications for the 2024 Social Engineering Competition are being accepted from NOW till Monday, February 19th, 2024 at 12pm ET

Orientation date (virtual): Saturday, March 23, time TBD (this is not optional – please hold this date on your calendar)

Competition dates (virtual, these are not optional – please hold these dates on your calendar):

Graduate Level: April 5, 6, 7, times TBD
Undergraduate: April 19, 20, 21, times TBD
High school Level: May 3, 4, 5, times TBD

Closing ceremonies (virtual): Wednesday, May 8, time TBD (this is not optional – please hold this date on your calendar)

Why a ‘pure’ social engineering competition?

There are MANY cybersecurity competitions already in existence (PicoCTF, PlaidCTF, CSAW, UCSB iCTF, US Cyber Challenge, Panoply, CPTC, CCDC, CyberPatriot, Cyber Academy, to name a few). While these are all excellent sources of hands-on training, they are primarily technical in nature and have specific focus areas, such as reverse engineering, hacking, cryptography, and exploitation. They do not emphasize the relevance of the human-socio-psychological aspects of cyberattacks and cybersecurity.

Given that the human factor is increasingly being exploited by cybercriminals, a pure SE competition grounded in the social sciences offers a timely and unique platform for students to learn about this topic in a hands-on, engaging, and ethical manner.

Who can participate?

This event is open to high school, undergraduate, and graduate students. Teams are required (solo entries are not permitted). Team sizes can range from 2-4 members. Members can be from different institutions (schools/colleges), but must be at the same educational level (ex: purely high school students).

When and how can we put our application in?

*Registration deadline is Monday, February 19, 2024 at 12pm ET.

CARE Lab 2024 Social Engineering Competition2024-07-26T15:58:29-04:00

Network Noise Incident Response Workshop: Pasco County

Join Cyber Florida Senior Fellow Stacy Arruda, Founder and CEO of the Arruda Group and former FBI Supervisory Special Agent, for an eye-opening experience that will help you better understand how to prevent and recover from cyberattacks. The event starts with Network Noise, a three-hour tabletop exercise where real-world cyberattack scenarios illustrate the far-reaching effects a cyberattack can inflict on your organization. Bring your leadership team to learn how cyberattacks impact not only IT but also legal, finance, operations, human resources, public relations, and other departments.

Once you understand the threat, move on to preparation with a session on creating a comprehensive cyber incident response plan specific to your organization. You’ll leave equipped with a template and foundational plan you can take back to complete and test with your organization.

This workshop is presented in partnership with the Pasco Sheriff’s Office.

Register Now

Please register in advance for this event using the form below. The registration deadline is December 10, 2023.

Venue & Directions

Forensic Institute for Research, Security, and Tactics
Innovation Building Classroom
10370 Charles Bo Harrison Way, Land O’ Lakes, FL 34637

Network Noise Incident Response Workshop: Pasco County2023-12-19T14:14:54-05:00

USSOCOM Innovation Foundry (IF14) Event

SOFWERX, in collaboration with USSOCOM’s Directorate of Science and Technology (S&T) Futures, will host the fourteenth Innovation Foundry (IF14) Event in Tampa, FL, which intends to bring together Special Operations Forces (SOF), industry, academia, national labs, government, and futurists in an exploration, design thinking, facilitated event to assist USSOCOM in decomposing future scenarios and missions.

Political, social, and technological developments will have an increasing impact on the future of world societies. Organizations, militaries, governments, and entire economies rely on complex digital infrastructures for their operations. The safety and reliability of these information systems are of significant concern to organizations around the world, while malicious actors seek to exploit vulnerabilities to achieve their ends. Because of this, cyber security has been a focus of increasing attention and will be of critical importance in the future operational environment.

The theme of IF14 is SOF Aspects of Cyber Security in 2035. The event seeks to explore the nature of cyber security operations and infrastructure in 2035 and SOF’s role in this environment.

Specific areas of interest include the growth of digital infrastructure for civilian and military systems; the impact of artificial intelligence technologies in the design, implementation, exploitation, and securing of information systems; the impact of innovative communications, networking, and control systems on future cyber infrastructure; advancements of quantum computing and encryption tools; as well as offensive and defensive approaches including prevention, pre-emption, detection, isolation, defeat, and the exploitation of digital vulnerabilities.

The event will be a compelling opportunity for leading minds in industry, academia, labs, and government, as well as subject matter experts (SMEs) to collaborate and ideate with other experts.

USSOCOM Innovation Foundry (IF14) Event2023-12-19T14:16:15-05:00

Red Dragon Rising: China in Cyberspace

As China seeks to advance its economic and military interests and challenge the US’s global leadership and influence, it increasingly turns to cyberspace to conduct malicious and disruptive activities against the US and its allies. China’s aggressive and sophisticated cyber operations include stealing sensitive data, intellectual property, and emerging technologies from various sectors, such as defense, health, education, and infrastructure. Now, China is positioning itself to disrupt or damage US critical infrastructure in the event of a geopolitical crisis or conflict. The government, military, private sector, and academia must cooperate to protect their networks and data from Chinese intrusion. This in-person summit will bring cybersecurity scholars, military and academic researchers, and senior military leaders together for a candid discussion of emerging Chinese threats and strategic response options in cyberspace.

Featuring keynote speaker Dr. Christopher Marsh from National Defense University’s College of International Security Affairs, the event will include two open-to-the-public panel discussions on different aspects of China’s maneuvers in cyberspace and conclude with a networking lunch.

This event is presented in partnership with the University of South Florida Global and National Security Institute as part of a new series titled, Fifth Domain: CYBR, to examine issues of modern cyberwarfare, bringing the work of academic scholars and researchers to the benefit of military leadership to help inform and guide strategic policymaking.

Note: Tickets must be purchased in advance.

VENUE + DIRECTIONS

Red Dragon Rising: China in Cyberspace2024-07-26T16:52:42-04:00

Cybercrime Investigation for Florida Law Enforcement

Cyber Florida invites state and local law enforcement personnel across the Sunshine State to attend this free, one-day workshop presenting the latest insights, methodologies, and updates related to cybercrime. Funded by a grant from the Federal Emergency Management Agency, this event offers an impressive lineup of experts in various domains of cyber investigations, providing a valuable knowledge-sharing platform for officers and officials keen on enhancing their investigative capabilities in an increasingly digital world.

Program Agenda

9:00 - 10:00 am: Open Source Intelligence (OSINT)

Dr. Jordan Howell dives into the world of publicly available data and how it can be harnessed to aid in cyber investigations. Dr. Howell will discuss key tools, techniques, and resources available in the realm of OSINT.

10:15 - 11:15 am: Cybercrime Legal Update

Assistant U.S. Attorney Greg Schiller will provide attendees with the latest updates in the legal landscape surrounding cybercrime, providing a clearer picture of the challenges and opportunities facing law enforcement.

11:45 am - 12:45 pm: Current Forensics Challenges

In this session, veteran criminal investigator Chris Gastardi will address the ongoing challenges forensic experts face in digital investigations and cutting-edge techniques to overcome them.

12:45 - 1:45 pm: Networking Lunch (lunch provided, value less than $50)

1:45 - 2:45 pm: Cryptocurrency Investigations and the Blockchain

Cryptocurrencies present unique challenges in the world of cyber investigations. Larry Nielson, CFE, CTCE, CRC, Financial Crimes Detective at the Palm Beach County Sheriff’s Office, will delve deep into the world of blockchain and shed light on techniques to trace, track, and investigate cryptocurrency-related crimes.

3:00 - 3:45 pm: Dark Web Investigations

The Dark Web remains a mystery to many. Jeff Burke, special agent with the Defense Criminal Investigative Service, will uncover the layers of the Dark Web, providing insights into how to navigate, investigate, and track criminal activities on this hidden part of the internet.

4:00 - 5:00 pm: Cyber Investigations

Retired FBI Supervisory Special Agent Chuck Esposito gives a comprehensive look into the realm of cyber investigations, discussing everything from current threats to mitigation strategies.

Cybercrime Investigation for Florida Law Enforcement2023-11-06T09:50:52-05:00

Network Sorcery: The Hunt

In today's world, almost all activities take place over the internet, such as banking, homework assignments, television programs, phone conversations, and more. While the internet has positively impacted the way we work, learn, and communicate, it is also used by those with malicious intentions.

During this hands-on webinar, experts from Stamus Networks will demonstrate what bad actors do, how malware operates, and how to detect and catch these intrusions. We will also walk through the basic principles of network threat hunting and will demonstrate how to uncover ransomware and Advanced Persistent Threats.

Attendees will learn how to:
  • Use Suricata as a monitoring tool
  • Chase APTs and malware actors, known and unknown
  • Hunt and investigate using open-source tools
  • Recognize types of malware, behaviors, and current trends
Agenda:
  • Introduction
  • Speaker introduction
  • Experience/feedback in malware IR/hunting/investigations
  • Goal of Network Forensics – purpose and how it’s collected & analyzed
  • Overview of Suricata as a monitoring tool
  • Pyramid of pain (chasing APTs and malware actors, knowns and unknowns)
  • Overview of Ransomware (types of malware, behaviors, current trends)
  • Case-study: walk through an example of APT case
  • Hunting and investigation: Easiest way to spin up a complete network monitoring distro
  • with Suricata for Hunting, teaching and investigations comprised of only open-source tools (docker-based, runs on Linux: Ubuntu/Debian etc)
  • Case-study (hands-on): live example of Ransomware malware network traffic
  • Free and OSS Resources for malware training , data and investigations
  • Q/A
Network Sorcery: The Hunt2023-10-02T14:46:17-04:00