Skip to main content

Find us on

facebook youtube flickr twitter itunes u logo


Upcoming Events   

 Craig Shue



Managing User-Level Compromises in Enterprise Networks
Craig Shue
Worcester Polytechnic Institute
Tuesday March 31, 2015 @4:15pm
Carson L01

 Harold Thimbleby




The Best Way to Improve Healthcare is to Improve Computers
Harold Thimbleby
Swansea University
Thursday April 23, 2015 @4:15pm

Carson L01

Mary Ellen Zurko



User-Centered Security: From Grand Challenge to Technology Transfer
Mary Ellen Zurko
Tuesday May 12, 2015 @4:15pm
Carson L01

Scout Sinclair Brody



Open-Sourcing Usable Security
Scout Sinclair Brody D'13 Ph.D.
Simply Secure
Tuesday June 2, 2015 @4:15pm
Carson L01

Recent Talks  

Radu Sion

Computation Privacy and Regulatory Compliance Mechanisms for the Cloud
Radu Sion
Stony Brook University and Private Machines Inc.
May 28, 2013

mechael youtube

Keynote: Securing IT in Healthcare: Part III
Patty Mechael
mHealth Alliance
May 16, 2013



Feb news 2015


ISTS Information Pamphlet



Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA
HomeEvents >

JHU/APL Career Discussion: Opportunities in Information Security

Wednesday, February 13th from 3:30-4:30pm
Speakers: Dickie George '70 and Donna Gregg
Johns Hopkins University Applied Physics Laboratory
Location: Haldeman Center, Room 125


**Please R.S.V.P. to ISTS by 5pm on Tuesday, February 12th**

Dickie George '70
 apl logo


Donna Gregg leads the Cyber effort at the Johns Hopkins University Applied Physics Lab, and Dickie George '70 serves as one of her advisors. Together they will tell students about the wide variety of opportunities for research at the lab. Donna will discuss the broad missions that the lab takes on in support of the US government and will discuss permanent positions the Lab is seeking to fill (the Lab hopes to hire on the order of 400 technical people this year) and will discuss intern opportunities as well. Dickie will talk about life as a member of the Intelligence Community, the threat/adversary model, and will give some real life examples of espionage in the cold war.


Richard M. (Dickie) George joined the National Security Agency in 1970 as a mathematician, and remained at NSA until his retirement in 2011. While at NSA, he wrote more than 125 technical papers on cryptomathematical subjects, and served in a number of positions: analyst, and technical director at the division, office, group, and directorate level. He served as the Technical Director of the Information Assurance Directorate for eight years until his retirement. Mr. George remains active in the security arena; he is currently the Senior Advisor for Cyber Security at the Johns Hopkins University Applied Physics Laboratory where he works on a number of projects in support of the U.S. Government. He is also the APL representative to the I3P, a consortium of universities, national labs, and non-profit institutions dedicated to strengthening the cyber infrastructure of the United States.

Last Updated: 2/6/13