Skip to main content

Home

 

Find us on

facebook youtube flickr twitter itunes u logo

Upcoming Talks

Meredith Patterson



Meredith Patterson
Co-originator of the Language-theoretic Approach to Computer Security
Computational Linguistics & Computer Security
Tuesday, October 23rd, 2018
4:30pm-5:30pm
Kemeny Hall 108

Past Talks

Samantha Ravich

Samantha Ravich
Deputy Chair of the President's Intelligence Advisory Board
Cyber-Enabled Economic Warfare: Why America‚Äôs Private Sector is now on
the Front Lines of an Emerging Battlefield
Thursday, September 27, 2018
4:30pm-6:00pm
Haldeman 41 (Kreindler Conference 
Room)

William Regli, Ph.D

William Regli, Ph.D.
Director of the Institute for Systems Research at the Clark School of Engineering, 
Professor of Computer Science at the 
University of Maryland at College Park
A New Type of Thinking
Friday, June 22, 2018
Life Sciences Center 105
11:00 AM

Tata Consulting Logo

Dr. Gautam Shroff
Vice President, Chief Scientist, and Head of Research at Tata Consultancy Services 
Enterprise AI for Business 4.0: from Automation to Amplification
Thursday, June 07, 2018
Haldeman 041 Kreindler Conference Room
3:30 PM

John Dickerson UMD

John P Dickerson
Assistant Professor, Department of Computer Science, University of Maryland
Using Optimization to Balance Fairness and Efficiency in Kidney Exchange
Monday,  May 21st
Kemeny Hall 008
3:30 PM

Senator Jeanne Shaheen

Jeanne Shaheen
U.S. Senator from New Hampshire
Russian Interference in American Politics and Cyber Threats to Our Democracy
Tuesday, February 20, 2018
Alumni Hall (Hopkins Center)
11:00 AM

Lisa Monaco

Lisa Monaco
Former Homeland Security Advisor to President Obama
In Conversation: Lisa Monaco, Fmr Homeland Security Advisor to President Obama
Tuesday, February 13, 2018
Filene Auditorium (Moore Building)
5:00 PM
Sponsored by The Dickey Center for International Understanding

John Stewart EPRI

John Stewart
Sr. Technical Leader, Cyber Security, EPRI
Securing Grid Control Systems
Friday, January 12, 2018
Sudikoff L045 Trust Lab
12:00 Noon

M. Todd Henderson

M. Todd Henderson
Professor of Law, University of Chicago
Hacking Trust: How the Social Technology of Cooperation Will Revolutionize Government
Thursday, January 11, 2018
5:00pm-6:30pm 
Room 003, Rockefeller Center
Sponsored by: Rockefeller Center

Dr. Liz Bowman

Dr. Elizabeth Bowman
U.S. Army Research Laboratory
Artificial Intelligence, Machine Learning and Information: Army Social Computing Research
Tuesday, December 5th
Haldeman 041 Kreindler Conference Room
4:00 PM

Dr. Fabio Pierazzi

Dr. Fabio Pierazzi
Royal Holloway University of London
Network Security Analytics for Detection of Advanced Cyberattacks
Tuesday, November 28th
Sudikoff Trust Lab (L045)
12:30 PM

V.S. Subrahmanian

V.S. Subrahmanian
Dartmouth Distinguished Professor in Cybersecurity, Technology, and Society
Bots, Socks, and Vandals
Tuesday, November 14th
Carson L01
5:00 PM 

Rand Beers

Rand Beers ('64)
Big Data, the Internet, and Social Media:  The Road to the November 2016 Election
Wednesday, November 8th
Haldeman 41 (Kreindler Conference Hall)
4:30 PM 

Fright Night Imge

Wanna See Something REALLY Scary?
ISTS Looks at the Dark Web on Halloween Night
Tuesday, October 31st
S
udikoff  045 Trust Lab (dungeon)
7:30 PM - RSVP
Space is Limited 

Sal Stolfo

Salvatore J. Stolfo 
Columbia University
A Brief History of Symbiote Defense
Tuesday, October 31st
Rockefeller 003
5:00 PM

ISTS Information Pamphlet


2012BrochureCover

 

Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA
info.ists@dartmouth.edu
HomeEvents >

Cyber Operations and National Security: A Panel Discussion

Thursday, October 20th
Co-sponsored with the War and Peace Studies Program of the Dickey Center for International Understanding 

Abstract

cyberops panelOperation Shady RAT. Stuxnet. Conficker. International and National Strategies for Cybersecurity. Cyber Czars and Cyber Commands. Digital Pearl Harbors and Cyber Maginot Lines.

How can the US prevent a major cyber attack, and how should it respond to one? Are there policy models from other realms that we can draw upon to develop a strategy for cyber defense, cyber deterrence, or cyber offensives? And how important is cyber defense for national security in the 21st Century? Is cyber war likely to be a means of decisive conflict in the coming decades, or simply one of the many tools of influence and statecraft in international politics? When historians write about conflict in the 21st Century, will cyber operations be a headline or a footnote?

Join us to listen to experts in cyber security and defense policy as they discuss one of the major emerging security challenges of the new century.

Panelists

libicki

Martin Libicki has been a senior management scientist at RAND since 1998, focusing on the impacts of information technology on national and domestic security. Most recently, he authored Cyberdeterrence and Cyberwar, and co-authored What Should be Classified?  Other work was on the subjects of international demographics, multi-factor authentication, organizing the Air Force for cyberwar, exploiting cell phones in counter-insurgency, how insurgencies end, DARPA's Terrorism Information Awareness program, and the FBI's information security program. Prior employment includes 12 years at the National Defense University, three years on the Navy Staff as program sponsor for industrial preparedness, and three years as a policy analyst for the GAO.

lin

Dr. Herbert Lin is chief scientist at the Computer Science and Telecommunications Board, National Research Council of the National Academies, where he has been study director of major projects on public policy and information technology. These studies include a 1996 study on national cryptography policy (Cryptography's Role in Securing the Information Society), a 1999 study of Defense Department systems for command, control, communications, computing, and intelligence (Realizing the Potential of C4I: Fundamental Challenges), a 2007 study on cybersecurity research (Toward a Safer and More Secure Cyberspace), a 2009 study on offensive information warfare (Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities), and a 2010 study on cyber deterrence (Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy).  Prior to his NRC service, he was a professional staff member and staff scientist for the House Armed Services Committee (1986-1990), where his portfolio included defense policy and arms control issues. He received his doctorate in physics from MIT.

lindsayJon Lindsay hails from San Diego, where he is a postdoctoral scholar at the University of California Institute on Global Conflict and Cooperation. He holds a Ph.D. in political science (security studies) from the Massachusetts Institute of Technology and an M.S. in computer science from Stanford University. His research examines the effects of emerging information technology on bureaucratic behavior and military power, the strategic use of cyberspace, and the conduct of irregular warfare. He has served as a U.S. naval intelligence officer with air targeting and special operations units in Europe, Latin America, and Iraq.

Moderator

pressDaryl G. Press is Associate Professor in the Department of Government, Dartmouth College. He received a Ph.D. in Political Science from the Massachusetts Institute of Technology, and a B.A. from the University of Chicago.

Professor Press is the author of Calculating Credibility: How Leaders Assess Military Threats, a book on decision-making during crises (Cornell University Press, 2005). He has published scholarly articles in International Security, Security Studies, and China Security, as well as articles for a wider audience in Foreign Affairs, the Atlantic Monthly, and the New York Times. Professor Press has worked as a consultant for the RAND Corporation and the U.S. Department of Defense, and is a research affiliate at the Security Studies Program at MIT. He also serves as an Associate Editor at the Journal International Security. Professor Press is currently writing a book (with Keir Lieber, Georgetown University) on nuclear deterrence - during the Cold War and the future - as well as a series of articles (with Eugene Gholz, UT Austin) on energy and security. 

Video and Slides from the Panel Discussion

Herb Lin's Slides

Last Updated: 7/29/13