Members of the press will be thoroughly checked before allowed entry

Jan 9, 2012 10:34 GMT  ·  By

From January 9 through 12, 2012, Fordham’s Lincoln Center campus hosts the third annual International Conference on Cyber Security (ICCS 2012), an event where the Federal Bureau of Investigation (FBI) and the Fordham University unite global experts of the industry to discuss matters such as cybercrime and cyber terrorism.

One of the main topics debated at the conference is the existence and the effects of the infamous ZeuS Trojan that’s estimated to cause financial losses of around $60 million (42 million EUR).

One of the speakers, Rich Baich, Deloitte & Touch LLP principal, is presenting details about the 26 known variants of ZeuS, but he also shares some insight on the way the piece of malware can change its signature to avoid detection by current anti-virus solutions.

Other experts presenting at ICCS include, Howard A. Schmidt, special assistant to the president and cybersecurity coordinator, General Keith B. Alexander, commander, U.S. Cyber Command, director, National Security Agency/Central Security Service, and Thomas Ryan, co-founder and managing partner, Provide Security, who is speaking about the protection of online identities.

Giovanni DiCrescenzo, from Telcordia Technologies, is talking about the actual privacy degree of private information.

Smart and mobile devices in foreign wars is a topic handled by Angelos Stavrou, professor of computer science at George Mason University.

Journalists who wish to participate in the conference are required to submit a valid government ID and proof of employment from their news outlets.

Because all the audio, video and photographic equipment they use is thoroughly checked before they’re allowed entrance, members of the press are advised to arrive 15 minutes in advance of the session they want to attend.

The event is a great opportunity for the 500 independent, company, and state-funded experts to share precious knowledge and information on the latest threats from the cybersecurity landscape.