BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Center for Excellence in Government Cybersecurity Risk Management and Resilience - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Center for Excellence in Government Cybersecurity Risk Management and Resilience
X-ORIGINAL-URL:https://crc.gmu.edu
X-WR-CALDESC:Events for Center for Excellence in Government Cybersecurity Risk Management and Resilience
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241112T153000
DTEND;TZID=America/New_York:20241112T170000
DTSTAMP:20260510T201601
CREATED:20241020T001636Z
LAST-MODIFIED:20241020T002117Z
UID:433-1731425400-1731430800@crc.gmu.edu
SUMMARY:Digital Forensics of Deep Fakes: From Research to Practice
DESCRIPTION:Please join Jim Jones\, Associate Professor Department of Electrical and Computer Engineering and Bob Osgood\, Director of Digital Forensics\, George Mason University\, as they discuss current research into identification of deep fakes and deep fake ramifications for fraud\, intellectual property and likeness theft\, political promotion and advertising --- and how courts and law enforcement are considering deep fake ramifications for evidence. \nPlease RSVP for this event here  \n\nABOUT JIM\n\n	\nJim Jones has been a cyber security and digital forensics practitioner\, researcher\, and educator for over 30 years in industry\, government\, and academia. That experience drives his teaching\, which blends theory and practical applications\, and his research\, which focuses on the extraction\, analysis\, and manipulation of full and partial digital artifacts. Jim\, his colleagues\, and his students spend their days and nights examining digital systems of all types to understand how data persists and decays on these systems\, and how such behavior and data can be used\, manipulated\, and verified to find malware infections and compromised systems\, detect system and device misuse\, link disparate devices and entities\, effect and detect deception activities\, and recover lost data.Jim's research funding comes from industry and the US Government. Past and current funded research sponsors include the Defense Advanced Research Projects Agency (DARPA)\, the Intelligence Advanced Research Projects Activity (IARPA)\, the U.S. Department of Homeland Security (DHS)\, the National Science Foundation (NSF)\, and the United States Department of Defense (DoD). He has degrees in Industrial Engineering (Bachelor's)\, Mathematical Sciences (Master's)\, and Computational Sciences and Informatics (PhD). This formal education is complemented by work experience and extensive self-learning\, driven by an insatiable curiosity and a desire to know how things work\, how they break\, and what we can learn from both.\n\n\nABOUT BOB\n\n	\n\nMr. Osgood retired from 26 years as an FBI agent specializing in Computer Forensics\, Cyber-Crime\, Enterprise Criminal Organizations\, Espionage and Counter-Terrorism. In the course of his work\, he has performed computer forensics research and development and created unique new software tools for computer forensic law enforcement. He has also been employed as Project Director for ManTech Intl. Corp. working in the computer forensic intrusion analysis division. \nMr. Osgood formed the first FBI computer forensics squad in 2000 and was part of the team that executed the first court authorized digital computer intercept. In addition\, he is along with Prof. Jeremy Allnutt\, the original designers of the CFRS Masters program at George Mason University.
URL:https://crc.gmu.edu/event/digital-forensics-of-deep-fakes-from-research-to-practice/
LOCATION:VIRTUAL (ONLINE)
CATEGORIES:Events
ATTACH;FMTTYPE=image/jpeg:https://crc.gmu.edu/wp-content/uploads/2024/10/Digital-Forensics-Combined-with-Incident-Response-A-significant-Trend-in-2023-GRCviewpoint.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241002T130000
DTEND;TZID=America/New_York:20241002T140000
DTSTAMP:20260510T201601
CREATED:20240918T133729Z
LAST-MODIFIED:20240918T134249Z
UID:418-1727874000-1727877600@crc.gmu.edu
SUMMARY:2024 Global Cybersecurity: Leadership Top Ten Challenges & Best Practices
DESCRIPTION:Please join Jim Jones\, Associate Professor Department of Electrical and Computer Engineering and Bob Osgood\, Director of Digital Forensics\, George Mason University\, as they discuss current research into identification of deep fakes and deep fake ramifications for fraud\, intellectual property and likeness theft\, political promotion and advertising --- and how courts and law enforcement are considering deep fake ramifications for evidence. \nPlease RSVP for this event here  \n\nABOUT JIM\n\n	\nJim Jones has been a cyber security and digital forensics practitioner\, researcher\, and educator for over 30 years in industry\, government\, and academia. That experience drives his teaching\, which blends theory and practical applications\, and his research\, which focuses on the extraction\, analysis\, and manipulation of full and partial digital artifacts. Jim\, his colleagues\, and his students spend their days and nights examining digital systems of all types to understand how data persists and decays on these systems\, and how such behavior and data can be used\, manipulated\, and verified to find malware infections and compromised systems\, detect system and device misuse\, link disparate devices and entities\, effect and detect deception activities\, and recover lost data.Jim's research funding comes from industry and the US Government. Past and current funded research sponsors include the Defense Advanced Research Projects Agency (DARPA)\, the Intelligence Advanced Research Projects Activity (IARPA)\, the U.S. Department of Homeland Security (DHS)\, the National Science Foundation (NSF)\, and the United States Department of Defense (DoD). He has degrees in Industrial Engineering (Bachelor's)\, Mathematical Sciences (Master's)\, and Computational Sciences and Informatics (PhD). This formal education is complemented by work experience and extensive self-learning\, driven by an insatiable curiosity and a desire to know how things work\, how they break\, and what we can learn from both.\n\n\nABOUT BOB\n\n	\n\nMr. Osgood retired from 26 years as an FBI agent specializing in Computer Forensics\, Cyber-Crime\, Enterprise Criminal Organizations\, Espionage and Counter-Terrorism. In the course of his work\, he has performed computer forensics research and development and created unique new software tools for computer forensic law enforcement. He has also been employed as Project Director for ManTech Intl. Corp. working in the computer forensic intrusion analysis division. \nMr. Osgood formed the first FBI computer forensics squad in 2000 and was part of the team that executed the first court authorized digital computer intercept. In addition\, he is along with Prof. Jeremy Allnutt\, the original designers of the CFRS Masters program at George Mason University.
URL:https://crc.gmu.edu/event/2024-global-cybersecurity-leadership-top-ten-challenges-best-practices/
LOCATION:VIRTUAL (ONLINE)
CATEGORIES:Events
ATTACH;FMTTYPE=image/jpeg:https://crc.gmu.edu/wp-content/uploads/2024/09/2827_Feature-Image.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240910T153000
DTEND;TZID=America/New_York:20240910T170000
DTSTAMP:20260510T201601
CREATED:20240611T235815Z
LAST-MODIFIED:20240909T211528Z
UID:371-1725982200-1725987600@crc.gmu.edu
SUMMARY:AI: Redefining the Power Grid
DESCRIPTION:Please join Jim Jones\, Associate Professor Department of Electrical and Computer Engineering and Bob Osgood\, Director of Digital Forensics\, George Mason University\, as they discuss current research into identification of deep fakes and deep fake ramifications for fraud\, intellectual property and likeness theft\, political promotion and advertising --- and how courts and law enforcement are considering deep fake ramifications for evidence. \nPlease RSVP for this event here  \n\nABOUT JIM\n\n	\nJim Jones has been a cyber security and digital forensics practitioner\, researcher\, and educator for over 30 years in industry\, government\, and academia. That experience drives his teaching\, which blends theory and practical applications\, and his research\, which focuses on the extraction\, analysis\, and manipulation of full and partial digital artifacts. Jim\, his colleagues\, and his students spend their days and nights examining digital systems of all types to understand how data persists and decays on these systems\, and how such behavior and data can be used\, manipulated\, and verified to find malware infections and compromised systems\, detect system and device misuse\, link disparate devices and entities\, effect and detect deception activities\, and recover lost data.Jim's research funding comes from industry and the US Government. Past and current funded research sponsors include the Defense Advanced Research Projects Agency (DARPA)\, the Intelligence Advanced Research Projects Activity (IARPA)\, the U.S. Department of Homeland Security (DHS)\, the National Science Foundation (NSF)\, and the United States Department of Defense (DoD). He has degrees in Industrial Engineering (Bachelor's)\, Mathematical Sciences (Master's)\, and Computational Sciences and Informatics (PhD). This formal education is complemented by work experience and extensive self-learning\, driven by an insatiable curiosity and a desire to know how things work\, how they break\, and what we can learn from both.\n\n\nABOUT BOB\n\n	\n\nMr. Osgood retired from 26 years as an FBI agent specializing in Computer Forensics\, Cyber-Crime\, Enterprise Criminal Organizations\, Espionage and Counter-Terrorism. In the course of his work\, he has performed computer forensics research and development and created unique new software tools for computer forensic law enforcement. He has also been employed as Project Director for ManTech Intl. Corp. working in the computer forensic intrusion analysis division. \nMr. Osgood formed the first FBI computer forensics squad in 2000 and was part of the team that executed the first court authorized digital computer intercept. In addition\, he is along with Prof. Jeremy Allnutt\, the original designers of the CFRS Masters program at George Mason University.
URL:https://crc.gmu.edu/event/ai-redefining-the-power-grid/
LOCATION:VIRTUAL (ONLINE)
CATEGORIES:Events
ATTACH;FMTTYPE=image/png:https://crc.gmu.edu/wp-content/uploads/2024/06/Revolutionizing-Power-Grids-with-AI.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240822T133000
DTEND;TZID=America/New_York:20240822T163000
DTSTAMP:20260510T201601
CREATED:20240812T224045Z
LAST-MODIFIED:20240812T224110Z
UID:409-1724333400-1724344200@crc.gmu.edu
SUMMARY:Energy\, Data Centers and Regulatory Sandboxes – Potential\, Possibilities and Challenges
DESCRIPTION:Please join Jim Jones\, Associate Professor Department of Electrical and Computer Engineering and Bob Osgood\, Director of Digital Forensics\, George Mason University\, as they discuss current research into identification of deep fakes and deep fake ramifications for fraud\, intellectual property and likeness theft\, political promotion and advertising --- and how courts and law enforcement are considering deep fake ramifications for evidence. \nPlease RSVP for this event here  \n\nABOUT JIM\n\n	\nJim Jones has been a cyber security and digital forensics practitioner\, researcher\, and educator for over 30 years in industry\, government\, and academia. That experience drives his teaching\, which blends theory and practical applications\, and his research\, which focuses on the extraction\, analysis\, and manipulation of full and partial digital artifacts. Jim\, his colleagues\, and his students spend their days and nights examining digital systems of all types to understand how data persists and decays on these systems\, and how such behavior and data can be used\, manipulated\, and verified to find malware infections and compromised systems\, detect system and device misuse\, link disparate devices and entities\, effect and detect deception activities\, and recover lost data.Jim's research funding comes from industry and the US Government. Past and current funded research sponsors include the Defense Advanced Research Projects Agency (DARPA)\, the Intelligence Advanced Research Projects Activity (IARPA)\, the U.S. Department of Homeland Security (DHS)\, the National Science Foundation (NSF)\, and the United States Department of Defense (DoD). He has degrees in Industrial Engineering (Bachelor's)\, Mathematical Sciences (Master's)\, and Computational Sciences and Informatics (PhD). This formal education is complemented by work experience and extensive self-learning\, driven by an insatiable curiosity and a desire to know how things work\, how they break\, and what we can learn from both.\n\n\nABOUT BOB\n\n	\n\nMr. Osgood retired from 26 years as an FBI agent specializing in Computer Forensics\, Cyber-Crime\, Enterprise Criminal Organizations\, Espionage and Counter-Terrorism. In the course of his work\, he has performed computer forensics research and development and created unique new software tools for computer forensic law enforcement. He has also been employed as Project Director for ManTech Intl. Corp. working in the computer forensic intrusion analysis division. \nMr. Osgood formed the first FBI computer forensics squad in 2000 and was part of the team that executed the first court authorized digital computer intercept. In addition\, he is along with Prof. Jeremy Allnutt\, the original designers of the CFRS Masters program at George Mason University.
URL:https://crc.gmu.edu/event/energy-data-centers-and-regulatory-sandboxes-potential-possibilities-and-challenges/
LOCATION:VIRTUAL (ONLINE)
CATEGORIES:Events
ATTACH;FMTTYPE=image/jpeg:https://crc.gmu.edu/wp-content/uploads/2024/08/desk-hero-data-center-energy-efficiency.jpg
ORGANIZER;CN="Center for Assurance Research and Engineering (CARE)":MAILTO:care@gmu.edu
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240620T153000
DTEND;TZID=America/New_York:20240620T170000
DTSTAMP:20260510T201601
CREATED:20240120T004706Z
LAST-MODIFIED:20240724T171900Z
UID:237-1718897400-1718902800@crc.gmu.edu
SUMMARY:AI EXECUTIVE ORDER SERIES: Innovation\, Competition and International Considerations of the Executive Order on the Safe\, Secure\, and Trustworthy Development and Use of Artificial Intelligence
DESCRIPTION:Please join Jim Jones\, Associate Professor Department of Electrical and Computer Engineering and Bob Osgood\, Director of Digital Forensics\, George Mason University\, as they discuss current research into identification of deep fakes and deep fake ramifications for fraud\, intellectual property and likeness theft\, political promotion and advertising --- and how courts and law enforcement are considering deep fake ramifications for evidence. \nPlease RSVP for this event here  \n\nABOUT JIM\n\n	\nJim Jones has been a cyber security and digital forensics practitioner\, researcher\, and educator for over 30 years in industry\, government\, and academia. That experience drives his teaching\, which blends theory and practical applications\, and his research\, which focuses on the extraction\, analysis\, and manipulation of full and partial digital artifacts. Jim\, his colleagues\, and his students spend their days and nights examining digital systems of all types to understand how data persists and decays on these systems\, and how such behavior and data can be used\, manipulated\, and verified to find malware infections and compromised systems\, detect system and device misuse\, link disparate devices and entities\, effect and detect deception activities\, and recover lost data.Jim's research funding comes from industry and the US Government. Past and current funded research sponsors include the Defense Advanced Research Projects Agency (DARPA)\, the Intelligence Advanced Research Projects Activity (IARPA)\, the U.S. Department of Homeland Security (DHS)\, the National Science Foundation (NSF)\, and the United States Department of Defense (DoD). He has degrees in Industrial Engineering (Bachelor's)\, Mathematical Sciences (Master's)\, and Computational Sciences and Informatics (PhD). This formal education is complemented by work experience and extensive self-learning\, driven by an insatiable curiosity and a desire to know how things work\, how they break\, and what we can learn from both.\n\n\nABOUT BOB\n\n	\n\nMr. Osgood retired from 26 years as an FBI agent specializing in Computer Forensics\, Cyber-Crime\, Enterprise Criminal Organizations\, Espionage and Counter-Terrorism. In the course of his work\, he has performed computer forensics research and development and created unique new software tools for computer forensic law enforcement. He has also been employed as Project Director for ManTech Intl. Corp. working in the computer forensic intrusion analysis division. \nMr. Osgood formed the first FBI computer forensics squad in 2000 and was part of the team that executed the first court authorized digital computer intercept. In addition\, he is along with Prof. Jeremy Allnutt\, the original designers of the CFRS Masters program at George Mason University.
URL:https://crc.gmu.edu/event/innovation-competition-and-international-considerations-of-the-executive-order-on-the-safe-secure-and-trustworthy-development-and-use-of-artificial-intelligence/
LOCATION:VIRTUAL (ONLINE)
CATEGORIES:AI Executive Order Webinar Series,Events
ATTACH;FMTTYPE=image/png:https://crc.gmu.edu/wp-content/uploads/2023/09/bidensignsai-wide-v2.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240514T150000
DTEND;TZID=America/New_York:20240514T163000
DTSTAMP:20260510T201601
CREATED:20240417T005312Z
LAST-MODIFIED:20240724T172116Z
UID:272-1715698800-1715704200@crc.gmu.edu
SUMMARY:AI and Local Government
DESCRIPTION:Please join Jim Jones\, Associate Professor Department of Electrical and Computer Engineering and Bob Osgood\, Director of Digital Forensics\, George Mason University\, as they discuss current research into identification of deep fakes and deep fake ramifications for fraud\, intellectual property and likeness theft\, political promotion and advertising --- and how courts and law enforcement are considering deep fake ramifications for evidence. \nPlease RSVP for this event here  \n\nABOUT JIM\n\n	\nJim Jones has been a cyber security and digital forensics practitioner\, researcher\, and educator for over 30 years in industry\, government\, and academia. That experience drives his teaching\, which blends theory and practical applications\, and his research\, which focuses on the extraction\, analysis\, and manipulation of full and partial digital artifacts. Jim\, his colleagues\, and his students spend their days and nights examining digital systems of all types to understand how data persists and decays on these systems\, and how such behavior and data can be used\, manipulated\, and verified to find malware infections and compromised systems\, detect system and device misuse\, link disparate devices and entities\, effect and detect deception activities\, and recover lost data.Jim's research funding comes from industry and the US Government. Past and current funded research sponsors include the Defense Advanced Research Projects Agency (DARPA)\, the Intelligence Advanced Research Projects Activity (IARPA)\, the U.S. Department of Homeland Security (DHS)\, the National Science Foundation (NSF)\, and the United States Department of Defense (DoD). He has degrees in Industrial Engineering (Bachelor's)\, Mathematical Sciences (Master's)\, and Computational Sciences and Informatics (PhD). This formal education is complemented by work experience and extensive self-learning\, driven by an insatiable curiosity and a desire to know how things work\, how they break\, and what we can learn from both.\n\n\nABOUT BOB\n\n	\n\nMr. Osgood retired from 26 years as an FBI agent specializing in Computer Forensics\, Cyber-Crime\, Enterprise Criminal Organizations\, Espionage and Counter-Terrorism. In the course of his work\, he has performed computer forensics research and development and created unique new software tools for computer forensic law enforcement. He has also been employed as Project Director for ManTech Intl. Corp. working in the computer forensic intrusion analysis division. \nMr. Osgood formed the first FBI computer forensics squad in 2000 and was part of the team that executed the first court authorized digital computer intercept. In addition\, he is along with Prof. Jeremy Allnutt\, the original designers of the CFRS Masters program at George Mason University.
URL:https://crc.gmu.edu/event/ai-and-local-government/
LOCATION:VIRTUAL (ONLINE)
CATEGORIES:Events
ATTACH;FMTTYPE=image/png:https://crc.gmu.edu/wp-content/uploads/2024/04/jeffcrume_alanshark.png
ORGANIZER;CN="Center for Assurance Research and Engineering (CARE)":MAILTO:care@gmu.edu
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240306T153000
DTEND;TZID=America/New_York:20240306T170000
DTSTAMP:20260510T201601
CREATED:20230921T175027Z
LAST-MODIFIED:20240724T172158Z
UID:74-1709739000-1709744400@crc.gmu.edu
SUMMARY:AI EXECUTIVE ORDER SERIES: Artificial Intelligence and “The Big Three” Intellectual Property Rights: Trade Secrets\, Copyrights\, and Patents
DESCRIPTION:Please join Jim Jones\, Associate Professor Department of Electrical and Computer Engineering and Bob Osgood\, Director of Digital Forensics\, George Mason University\, as they discuss current research into identification of deep fakes and deep fake ramifications for fraud\, intellectual property and likeness theft\, political promotion and advertising --- and how courts and law enforcement are considering deep fake ramifications for evidence. \nPlease RSVP for this event here  \n\nABOUT JIM\n\n	\nJim Jones has been a cyber security and digital forensics practitioner\, researcher\, and educator for over 30 years in industry\, government\, and academia. That experience drives his teaching\, which blends theory and practical applications\, and his research\, which focuses on the extraction\, analysis\, and manipulation of full and partial digital artifacts. Jim\, his colleagues\, and his students spend their days and nights examining digital systems of all types to understand how data persists and decays on these systems\, and how such behavior and data can be used\, manipulated\, and verified to find malware infections and compromised systems\, detect system and device misuse\, link disparate devices and entities\, effect and detect deception activities\, and recover lost data.Jim's research funding comes from industry and the US Government. Past and current funded research sponsors include the Defense Advanced Research Projects Agency (DARPA)\, the Intelligence Advanced Research Projects Activity (IARPA)\, the U.S. Department of Homeland Security (DHS)\, the National Science Foundation (NSF)\, and the United States Department of Defense (DoD). He has degrees in Industrial Engineering (Bachelor's)\, Mathematical Sciences (Master's)\, and Computational Sciences and Informatics (PhD). This formal education is complemented by work experience and extensive self-learning\, driven by an insatiable curiosity and a desire to know how things work\, how they break\, and what we can learn from both.\n\n\nABOUT BOB\n\n	\n\nMr. Osgood retired from 26 years as an FBI agent specializing in Computer Forensics\, Cyber-Crime\, Enterprise Criminal Organizations\, Espionage and Counter-Terrorism. In the course of his work\, he has performed computer forensics research and development and created unique new software tools for computer forensic law enforcement. He has also been employed as Project Director for ManTech Intl. Corp. working in the computer forensic intrusion analysis division. \nMr. Osgood formed the first FBI computer forensics squad in 2000 and was part of the team that executed the first court authorized digital computer intercept. In addition\, he is along with Prof. Jeremy Allnutt\, the original designers of the CFRS Masters program at George Mason University.
URL:https://crc.gmu.edu/event/ai-leadership-and-governance-and-a-discussion-on-the-new-white-house-executive-order-on-safe-secure-and-trustworthy-artificial-intelligence/
LOCATION:VIRTUAL (ONLINE)
CATEGORIES:AI Executive Order Webinar Series,Events
ATTACH;FMTTYPE=image/png:https://crc.gmu.edu/wp-content/uploads/2023/09/bidensignsai-wide-v2.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231108T083000
DTEND;TZID=America/New_York:20231108T190000
DTSTAMP:20260510T201601
CREATED:20230921T174946Z
LAST-MODIFIED:20240724T172359Z
UID:73-1699432200-1699470000@crc.gmu.edu
SUMMARY:Securing the Nation’s Cyberinfrastructure: Launching the Center for Excellence in Government Cybersecurity Risk Management and Resilience
DESCRIPTION:Please join Jim Jones\, Associate Professor Department of Electrical and Computer Engineering and Bob Osgood\, Director of Digital Forensics\, George Mason University\, as they discuss current research into identification of deep fakes and deep fake ramifications for fraud\, intellectual property and likeness theft\, political promotion and advertising --- and how courts and law enforcement are considering deep fake ramifications for evidence. \nPlease RSVP for this event here  \n\nABOUT JIM\n\n	\nJim Jones has been a cyber security and digital forensics practitioner\, researcher\, and educator for over 30 years in industry\, government\, and academia. That experience drives his teaching\, which blends theory and practical applications\, and his research\, which focuses on the extraction\, analysis\, and manipulation of full and partial digital artifacts. Jim\, his colleagues\, and his students spend their days and nights examining digital systems of all types to understand how data persists and decays on these systems\, and how such behavior and data can be used\, manipulated\, and verified to find malware infections and compromised systems\, detect system and device misuse\, link disparate devices and entities\, effect and detect deception activities\, and recover lost data.Jim's research funding comes from industry and the US Government. Past and current funded research sponsors include the Defense Advanced Research Projects Agency (DARPA)\, the Intelligence Advanced Research Projects Activity (IARPA)\, the U.S. Department of Homeland Security (DHS)\, the National Science Foundation (NSF)\, and the United States Department of Defense (DoD). He has degrees in Industrial Engineering (Bachelor's)\, Mathematical Sciences (Master's)\, and Computational Sciences and Informatics (PhD). This formal education is complemented by work experience and extensive self-learning\, driven by an insatiable curiosity and a desire to know how things work\, how they break\, and what we can learn from both.\n\n\nABOUT BOB\n\n	\n\nMr. Osgood retired from 26 years as an FBI agent specializing in Computer Forensics\, Cyber-Crime\, Enterprise Criminal Organizations\, Espionage and Counter-Terrorism. In the course of his work\, he has performed computer forensics research and development and created unique new software tools for computer forensic law enforcement. He has also been employed as Project Director for ManTech Intl. Corp. working in the computer forensic intrusion analysis division. \nMr. Osgood formed the first FBI computer forensics squad in 2000 and was part of the team that executed the first court authorized digital computer intercept. In addition\, he is along with Prof. Jeremy Allnutt\, the original designers of the CFRS Masters program at George Mason University.
URL:https://crc.gmu.edu/event/1-securing-the-nations-cyberinfrastructure-launching-the-center-for-excellence-in-government-cybersecurity-risk-management-and-resilience/
LOCATION:Great Room\, Krasnow Building\, 4461 Rockfish Creek Lane\, Fairfax\, VA\, 22030\, United States
CATEGORIES:Events
ATTACH;FMTTYPE=image/jpeg:https://crc.gmu.edu/wp-content/uploads/2023/09/securingthenationsinfrastructure.jpg
END:VEVENT
END:VCALENDAR