Tag: Technical

NCI Podcast

The Data Breach Planning & Business Continuity webinar examined the costs of a data breach occurring, continuity planning, and an action plan for cyber attack response before, during, and after an incident. This webinar was the seventh in a series of eight webinars discussing the fundamentals of cybersecurity (Cybersecurity 101). WHEN Tuesday, August 16, 2016 …

NCI Podcast

On July 19, 2016 the National Cybersecurity Institute (NCI) hosted a webinar entitled “Mobile & Wireless Security”. Mobile devices are uniquely susceptible to security risks since they are always on and accessible. They also provide several means of communication and connectivity through text and multimedia messaging, voice, cellular networks, and wireless connectivity using Bluetooth and Wi-Fi …

NCI Podcast

Through its partner relationship with the DC Deputy Mayor for Planning and Economic Development and St. Elizabeth’s East, Excelsior College and its National Cybersecurity Institute propose a series of free webinars to be offered at R.I.S.E. to the general public and government employees. The programs will be offered monthly and include live streaming Q and …

On November 16, 2015, the National Cybersecurity Institute (NCI) hosted a webinar entitled “Buffer Overflows-Wreaking Havoc with Stack Corruption ”. This webinar explained in detail how a buffer overflow vulnerability is exploited through manipulation of the run-time stack that is used to support program execution. The webinar was presented by James Antonakos who is a …

File System Forensics

On August 3, 2015, the National Cybersecurity Institute (NCI) hosted a webinar entitled “File System Forensics”. In this webinar, the characteristics of several different file systems and their host operating systems were presented and examined. The webinar was presented by James Antonakos who is a State University of New York Distinguished Teaching Professor of Computer …

On May 27, 2015, the National Cybersecurity Institute (NCI) hosted a webinar entitled “Introduction to Cybersecurity: Mobile & Wireless Security”. Mobile devices are uniquely susceptible to security risks since they are always on and accessible. They also provide several means of communication and connectivity through text and multimedia messaging, voice, cellular networks, and wireless connectivity …

On April 13, 2015, the National Cybersecurity Institute (NCI) hosted a webinar entitled “Introduction to Cybersecurity: Network Security.” Network attacks put the confidentiality, integrity, and availability of data, systems, and services at risk. Network security is based on three elements: people, processes, and technology. We have to assure securing all these together to provide optimal …

On April 6, 2015, the National Cybersecurity Institute (NCI) hosted a webinar entitled “Cyber Forensics”. During the webinar, attendees explored the different topic areas associated with this important field. Techniques and procedures for collecting, preserving, and transporting digital evidence, performing a forensic analysis of digital evidence, and preparing a forensic report of the analysis findings …