Archive Graphic

Please Note: The content on this page is not maintained after the colloquium event is completed.  As such, some links may no longer be functional.

Download Adobe PDF Reader

James "Jim" LitchkoJames "Jim" Litchko
Identity Theft and Social Engineering - Whose Problems Are These? 
Tuesday, November 30, 2004
Building 8 Auditorium - 3:00 PM
(Refreshments at 2:30 PM)

Mr. James Litchko, will talk about Identity Theft and Social Engineering - Whose Problems Are These? They are your problems, because both attacks are very personal in nature. Social engineering is an attack that takes advantage of your personal social character and identity theft is an attack on your personal image and assets. You do not want to be the target of either.

During this presentation, you will learn what each attack consists of and how to protect yourself from them. Jim will present the information using real-world stories to which everyone can relate and offer multiple tips to prevent becoming a victim of these attacks.

This presentation is necessary for all employees who are interested in protecting their assets and personal reputations at home and at work.

James P. Litchko is a senior information systems security author, and strategic advisor. He has over twenty-five years experience assessing and developing information technology (IT) security solutions. He has held senior executive positions and advised executive at several of the largest commercial IT security companies.

During his twenty-year Naval career, as a surface warfare and cryptographic officer, he spent twelve years supporting operations in the Atlantic, Pacific, European, and Middle Eastern theaters. His last five years in the Navy were in staff and technical positions at the National Security Agency (NSA) and the National Computer Security Center (NCSC), where he was Staff Chief for the Director.

Since 1988, he has been an instructor for computer and network security at Johns Hopkins University, the MIS Training Institute, and the National Cryptologic School. He has been a keynote speaker, presenter, and facilitator at over 30 events a year and a professional member of the National Speakers' Association. He has provided IT security presentations to Congressional staffs, Gartner Group, Conference Board, Canadian Embassy and Communications Security Establishment, Price Waterhouse, Merck, Exxon, Freddie Mac, Cambridge University, University of Mexico, SANS Institute, Computer Security Institute, Defense Intelligence University, and National Defense University. He has served on several government-sponsored, IT security working groups and was the past Chair of the ASIS International IT Security Council. A student of Ken Blanchard, Ph.D., author of The One-Minute Manager�, he holds a Masters degree in Information Systems from John Hopkins University and a Bachelors degree in Industrial Technology from Ohio University. He has authored or co-authored the following books: KNOW Your Life, KNOW IT Security, and KNOW Cyber Risk. Additionally, he provides management, business development, and strategic planning support for high-tech start-up companies.

IS&T Colloquium Committee Host: Paul Hunter