Skip to the content

Kansas State University

[an error occurred while processing this directive]
IT Help Desk
Kansas State University
214 Hale Library
Manhattan, KS 66506
785-532-7722
800-865-6143 (toll-free)
helpdesk@k-state.edu
Facebook Twitter
  1. K-State home >
  2. Information Technology Services >
  3. Security >
  4. Events and Training >
  5. October 2009 IT Security Training Event

October 2009 IT Security Training Event

This Fall K-State's Security Incident Response Team (SIRT) hosted a full day IT security training event at the K-State Union on Monday, October 5.

General sessions and breakout sessions were presented on a variety of non-technical and technical topics to teach attendees how to ensure their computers stay clean of creepy crawlies. You can find most of the presentations below in PDF format.

Program

Time Sessions
8:00-8:30am Registration - Donuts, Coffee, and free smiles will be provided!
Outside The Big 12 Room, K-State Student Union
8:30-9:30am

Keynote -- Securing the Nation's Critical Infrastructure & Key Resources
Presenter: Chuck Clanahan
Protective Security Officer, U.S. Department of Homeland Security
Location: Big 12 Room
Abstract: To provide a closer partnership with State governments, local communities, and businesses, the Department of Homeland Security (DHS) has placed a national presence, Protective Security Advisors (PSAs), in local communities throughout the country to assist with local efforts to protect critical assets. PSAs provide a Federal resource to communities and businesses to assist in the protection of our Nation's critical infrastructure and key resources (CIKR) and further State and local homeland security initiatives. CIKRís are what we deem most crucial in terms of national level public health and safety, governance, economic and national security, and public confidence consequences.

Handouts:

  1. DHS PSA Brochure
  2. DHS US-CERT Brochure
  3. Cyber-Security Awareness Month Fact Sheet
  4. Cyber-Security Awareness Month Tip Sheet
9:30-9:45amBreak -- More sweet Nectar of Life
9:45-10:45am
(select one of these concurrent sessions)
Less Technical More Technical

Infected: Dissection of a software vulnerability
Presenter: Dr. Xinming Ou
Assistant Professor, K-State Department of Computing and Information Sciences
and Dustin Seabourn
Location: Cottonwood Room
Abstract: Although most computer users these days know the danger of being "hacked" while browsing the web, not everyone understands how their computer can be taken over by an attacker. This presentation will show how a client-side vulnerability can be exploited and a computer compromised while browsing for a webpage or opening a music file.
Presentation slides


Out of Thin Air! Wireless security at home, on the road and on campus
Presenters: Daniel Van Meter, Systems Security Engineer; Kyle Crane, Network Security Engineer; and Sherry Callahan, Director of Information Security, University of Kansas Medical Center.
Location: Room 212
Abstract: There's nothing like the freedom of going wireless. But just when you think you're secure, the "bad guys" can grab your info right out of the air. This session will provide a live demonstration of how easy it is attack a wireless network and then focus on what you need to know to make your PC and home wireless network more secure.
Presentation slides

Firewalls: Building a better wall
Presenter: Harvard Townsend
Chief Information Security Officer, Kansas State University
Location: Big 12 Room
Abstract: Firewalls are a critical part of a layered IT security program, both at the host and network level. This session will explain basic firewall terminology, different functions and types of firewalls, and security design considerations. The firewall built into Trend Micro OfficeScan will be used to demonstrate how to configure a host-based firewall and interpret events in the log file.
Presentation slides


Malicious Software: A technical breakdown
Presenter: Josh McCune
Network Security Analyst, K-State Office of Information Security and Compliance
Location: Flint Hills Room
Abstract: Modern malware isn't just written for fun by teenagers in their parents' basement. Much of it is written by well organized criminals seeking to steal your identity and your money. In this session we'll discuss the different types of malware and why you should be concerned about them. We will look at some of the tools that the good guys use to analyze and understand the behavior of malware in order to combat it. Then we'll look at some specific examples of malware found on the K-State campus and talk about what you can do to prevent the spread of future infections.
Presentation slides

10:45-11:00amBreak -- buzz over to the next session
11:00am-12:00noon
(select one of these concurrent sessions)
Less Technical More Technical

Beyond WiFi: Securing your mobile devices
Presenter: Eric Dover
Manager, K-State Instructional Technology & Client Services
Location: 212
Abstract: Do you use a mobile device? Do you have email delivered to a mobile device? Do you keep sensitive work or personal information on your mobile device? Often an overlooked security leak, mobile devices can contain personal as well as business sensitive information. Come and learn some tips and tricks for how to keep all of the information stored on your mobile device more secure.
Presentation slides


IT Security@K-State
Presenter: Neil Sindicich
Cyber-Security Analyst, K-State Office of Information Security and Compliance
Location: Cottonwood
Abstract: This overview of IT Security at K-State will cover everything you need to know to get started using IT Security resources available to you as a K-Stater. We'll talk about how to create strong eID passwords, where to find anti-virus software, how to spot an email scam, and more. If you're new to K-State, or if you just want a reminder of ways to keep your little piece of cyber-space more secure, this is the presentation for you!
Presentation slides

Accepting Payments Securely: Online and off
Presenter: Bryan Boutz
Systems Coordinator, K-State Controller's Office
Location: Flint Hills
Abstract: This will be an overview of requirements, best practices, and options available for the secure handling of credit cards and other methods of payment. There will be a brief overview of Payment Card Industry standards and what they mean for universities. Additionally, we will discuss best practices for online and in person payments. Examples of some systems used at K-State will be presented. There will be time for participants to discuss their own challenges and solutions.
Presentation slides


Human Factors of Information Assurance
Presenter: Phillip Pell
Chief Information Security Officer, Butler Community College
Location: Big 12
Abstract: Billions of dollars are spent each year on technologies designed to ensure information security and yet each year the number of information security incidents increases unabated. One factor consistently overlooked in the development of Information Security Programs is the human factor. This seminar will discuss and explore resistance to change and how to overcome it, "Shadow IT" and how to prevent it, stakeholder trust and how to build it, Information Security Policy and how to craft it and regulatory compliance and how to achieve it. You will learn what it means to be an Information Security Evangelist and how maintaining focus on helping your Stakeholders achieve their goals will make your job as an Information Security Practitioner easier.
Presentation slides

12:00noon-1:30pmLunch
Grand Ballroom
Grab your lunch at the K-State Student Union food court, subway, or salsaritas and bring it back up stairs.
You can use this chance to ask the presenters from this morning any questions you may have.
1:30pm-2:00pm
(select one of these concurrent sessions)
Less Technical More Technical

Prepare for Take-off: Travel safety tips for your PC
Presenter: Neil Sindicich
Cyber-Security Analyst, K-State Office of Information Security and Compliance
Location: Cottonwood
Abstract: This session will discuss things you can do to ensure that even while traveling the data on your PC (or Mac), and the computer itself, remains safe and secure. Topics covered include both physical and electronic security measures for using your computer on the road, from simply keeping a close eye on your laptop while it goes through the airport scranner, to using a VPN client when logging onto the K-State network when off campus.
Presentation slides


Don't Panic! Security incidents at K-State
Presenter: Harvard Townsend
Chief Information Security Officer, Kansas State University
Location: Big 12
Abstract: K-State is averaging nearly three security incidents per day thus far in 2009, up from two per day in 2008. This session will present incident statistics for the past two years (including over 200 different spear phishing scams targeting K-Staters in 2009 to date), compare them to national trends, and consider the implications for IT security defenses.
Presentation slides

Herding Cats: Security awareness training in Blackboard
Presenter: Cheryl O'Dell
Information Security Officer, Emporia State University
Location: Flint Hills
Abstract: Emporia State University has offered security awareness materials through email's, posters, face to face workshops and through stop and go offerings in the student union. Offering Security Awareness materials for online courses is a new tactic being taken at ESU. Come hear about some of the opportunities that exist and issues to watch out for when offering Security Awareness Courses online through Blackboard.
Presentation slides


Digital Certificates
Presenter: Will Baldwin
Information Technology Officer, K-State Biosecurity Research Institute
Location: 212
Abstract: This session will present several topics related to personal digital certificates such as an introduction to the technology; State and Federal PKI infrastructures; and a demonstration of practical applications within the university day to day business operations.

2:00pm-2:15pm Break -- Take in the sweet fall colors.
2:15pm-3:15pm

General Session 2 -- IT Staff vs. User: Steel Cage Match
Presenters:

System Administrators Computer Users
Don Crawford:
Information Systems Manager -- College of Architecture, Planning & Design
Eric Dover:
Manager -- Instructional Technology & Client Services, iTAC
Bob LeHew
Technology Coordinator -- Division of Biology
Dr. Betsy Cauble:
Department Head -- Sociology, Anthropology, and Social Work
Loleta Sump:
Manager -- Facilities Support Services
Matt Ebert:
Senior student -- Computer Engineering
Location: Big 12 Room
Abstract: What do the IT Staff do, "in the name of security," that drives users nuts?
What do users do, "in the name of ease," that drives the IT staff nuts?
Why don't we find out and talk about it. This will be a lively and active discussion where audience participation isn't just requested, its demanded! Come fire off your most grave complaints and see what the other side thinks. The focus of the session will be developing ideas on how the two groups can better work together toward the common goal of protecting information without making anyone's job more difficult. (Please note: There will be no actual steel cage.)