Skip to main content



Find us on

facebook youtube flickr twitter itunes u logo

Upcoming Talks


Past Talks

Meredith Patterson

Meredith Patterson
Co-originator of the Language-theoretic Approach to Computer Security
Computational Linguistics & Computer Security
Tuesday, October 23, 2018
Kemeny Hall 108

Samantha Ravich

Samantha Ravich
Deputy Chair of the President's Intelligence Advisory Board
Cyber-Enabled Economic Warfare: Why America’s Private Sector is now on
the Front Lines of an Emerging Battlefield
Thursday, September 27, 2018
Haldeman 41 (Kreindler Conference Room)
Video of Dr. Ravich's presentation:

William Regli, Ph.D

William Regli, Ph.D.
Director of the Institute for Systems Research at the Clark School of Engineering, 
Professor of Computer Science at the 
University of Maryland at College Park
A New Type of Thinking
Friday, June 22, 2018
Life Sciences Center 105
11:00 AM

Tata Consulting Logo

Dr. Gautam Shroff
Vice President, Chief Scientist, and Head of Research at Tata Consultancy Services 
Enterprise AI for Business 4.0: from Automation to Amplification
Thursday, June 07, 2018
Haldeman 041 Kreindler Conference Room
3:30 PM

John Dickerson UMD

John P Dickerson
Assistant Professor, Department of Computer Science, University of Maryland
Using Optimization to Balance Fairness and Efficiency in Kidney Exchange
Monday,  May 21, 2018
Kemeny Hall 008
3:30 PM

Senator Jeanne Shaheen

Jeanne Shaheen
U.S. Senator from New Hampshire
Russian Interference in American Politics and Cyber Threats to Our Democracy
Tuesday, February 20, 2018
Alumni Hall (Hopkins Center)
11:00 AM

Lisa Monaco

Lisa Monaco
Former Homeland Security Advisor to President Obama
In Conversation: Lisa Monaco, Fmr Homeland Security Advisor to President Obama
Tuesday, February 13, 2018
Filene Auditorium (Moore Building)
5:00 PM
Sponsored by The Dickey Center for International Understanding

John Stewart EPRI

John Stewart
Sr. Technical Leader, Cyber Security, EPRI
Securing Grid Control Systems
Friday, January 12, 2018
Sudikoff L045 Trust Lab
12:00 Noon

M. Todd Henderson

M. Todd Henderson
Professor of Law, University of Chicago
Hacking Trust: How the Social Technology of Cooperation Will Revolutionize Government
Thursday, January 11, 2018
Room 003, Rockefeller Center
Sponsored by: Rockefeller Center

Dr. Liz Bowman

Dr. Elizabeth Bowman
U.S. Army Research Laboratory
Artificial Intelligence, Machine Learning and Information: Army Social Computing Research
Tuesday, December 5, 2017
Haldeman 041 Kreindler Conference Room
4:00 PM

Dr. Fabio Pierazzi

Dr. Fabio Pierazzi
Royal Holloway University of London
Network Security Analytics for Detection of Advanced Cyberattacks
Tuesday, November 28, 2017
Sudikoff Trust Lab (L045)
12:30 PM

V.S. Subrahmanian

V.S. Subrahmanian
Dartmouth Distinguished Professor in Cybersecurity, Technology, and Society
Bots, Socks, and Vandals
Tuesday, November 14, 2017
Carson L01
5:00 PM 

Rand Beers

Rand Beers ('64)
Big Data, the Internet, and Social Media:  The Road to the November 2016 Election
Wednesday, November 8, 2017
Haldeman 41 (Kreindler Conference Hall)
4:30 PM 

Fright Night Imge

Wanna See Something REALLY Scary?
ISTS Looks at the Dark Web on Halloween Night
Tuesday, October 31, 2017
udikoff  045 Trust Lab (dungeon)
7:30 PM - RSVP
Space is Limited 

Sal Stolfo

Salvatore J. Stolfo 
Columbia University
A Brief History of Symbiote Defense
Tuesday, October 31, 2017
Rockefeller 003
5:00 PM

Russian Bear

A Nation Under Attack: Advanced Cyber-Attacks in Ukraine
Thursday 6 April 2017, Oopik Auditorium 5:30 PM
Video of Roman's and Oleksii's presentations


ISTS Information Pamphlet



Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA

2007 Speakers

Reynol Junco is an Associate Professor in the Department of Academic Development and Counseling and Director of Disability Services at Lock Haven University of Pennsylvania. Dr. Junco is a graduate of the University of Florida with a B.S. in Psychology. He earned his Doctor of Education from the Pennsylvania State University in Counselor Education. Dr. Junco’s research interests include examining student development through the use of technology, online survey design, psychometric assessment, and using technology to enhance student success. Dr. Junco has presented extensively on the topic of Net Generation student culture, slang, technology use, and music preferences.

Dr. Junco’s publications have focused on college student technology use. Dr. Junco has recently written the “Wired Window” series for an upcoming revision of the Gardner, Jewler, and Barefoot textbook, Your College Experience: Strategies for success. He has also recently published a book entitled Connecting to the Net Generation: What higher education professionals need to know about today’s students. Dr. Junco has also published a chapter entitled “Technology and Today’s First Year Students” in the book, Challenging and Supporting the First Year Student: A Handbook for Improving the First Year of College by Upcraft, Gardner, Barefoot, and Associates.

Tracy Mitrano is the director of IT Policy and Computer Policy and Law Programs for the Office of Information Technologies at Cornell. Elected to the EDUCAUSE Board in 2006, she will take her seat as its Treasurer in January 2007. Mitrano is a 2002 graduate of the Frye Institute, and since then a member of its faculty, chair of Internet 2 InCommon Steering Committee and from 2004-2006 the co-chair of the Internet 2/EDUCAUSE Security Task Force, Law and Policy Team.

A member of the 2005 EDUCAUSE Program Committee, Mitrano is also faculty of the EDUCAUSE Leadership Institute and co-facilitator of the Seminars on Academic Computing. In 2003 the University of Iowa named her the Ada Stoflet Lecturer. In spring 2005, Mitrano taught an Internet Law class for the MiNE Program at the Universite Cattolica in Piacenza, Italy. At Cornell, Mitrano is an adjunct assistant professor in the Information Science Program where she teaches Information Science 515, "Culture, Law and Politics of the Internet."

Thomas Quinn is Vice President and Global Head Application Risk Assurance at Goldman Sachs. Tom has over 13 years experience in the areas of Technology, Systems Management, and Information Security in both the Defense sector and the Financial Services industry. He has been with Goldman Sachs since 1999 holding positions in systems engineering and application and infrastructure security.  In his current role he provides risk consulting services and guidance to Goldman Sachs' Application Development teams and the lines of business they support.

He actively works with the firm's Investment Research, Private Equity, Investment Banking, Prime Brokerage and Private Wealth Management teams as part of the Leveraging Technology Expertise (LTE) program.  Most recently Tom's focus has been on improving the use of metrics to drive broad adoption of technology controls as well as the challenges associated with the use of Enterprise Rights Management (ERM) in Financial services.

Robert J. Du Charme is a Security Training Manager in the Critical Infrastructure Assurance Group at Cisco Systems. His responsibilities are to create and deliver relevant, current, and high quality security education and training for higher education and Critical Infrastructure Program sector audiences utilizing available or new training materials and lab resources. He also provides technical and course development support as required. Mr. Du Charme joined Cisco in 1998, previously serving as Manager, Learning and Development for the VPN and Security Business Unit and as a technical trainer concentrating on network security technologies. Prior to Cisco, he served in a variety of network and help desk positions for the Administrative Office of the U.S. Federal Courts. He also held many network and system administrative jobs while serving 17 years in the U.S. Air Force.

Matthew Brill is a partner in the Washington, D.C. office of Latham & Perkins and a member of the Communications Practice.  Mr. Brill advises communications companies on a broad range of regulatory, transactional, and litigation matters, including issues involving emerging technologies as well as traditional telecommunications and media issues. He has represented a leading provider of cable telephony services, wireline and wireless carriers, Internet service providers, satellite carriers, and broadcast networks, among others, in proceedings before the Federal Communications Commission (FCC) and federal courts. Mr. Brill is also EDUCAUSE’s legal counsel on CALEA (Communications Assistance for Law Enforcement Act) issues.

Annie Antón is an Associate Professor of Software Engineering in the Computer Science Department of the College of Engineering at NC State University (NCSU), where she is a Senior Research Ethics Fellow for the period of 2006-08 and a member of the NCSU Cyber Defense Lab. Her research focuses on methods and tools to support the specification of complete, correct behavior of software systems used in environments that pose risks of loss as a consequence of failures and misuse. This includes Web-based and e-commerce systems in which the security of personal and private information is particularly vulnerable. To this end, she has developed a leadership role in research, education and outreach with her three current initiatives.

Antón is the founder and director of, a research group of students and faculty at NCSU, Georgia Tech, Purdue University (see our Collaborative NSF CyberTrust Project), and University of Lugano. She is leading this group in the development of technology to assist practitioners and policy makers in meeting the challenge of eliciting and expressing policies (a form of requirements). These tools help ensure that privacy policies are aligned with the software systems that they govern.

M. E. Kabay began programming computers in assembly language in 1965. In 1976, he received his PhD from Dartmouth College in applied statistics and invertebrate zoology and taught biology, statistics, and programming as a university professor in Canada and overseas. In 1979, he joined a compiler team for a new 4GL and RDBMS in the U.S., then joined Hewlett-Packard Canada in 1980 as an operating systems and database performance specialist, winning the Systems Engineer of the Year Award in 1982. He ran his own consulting firm, JINBU Corporation, from 1986 to 1998, specializing in operations management, facilities security, and corporate security policy development and implementation. He served as Director of Education for the National Computer Security Association (NCSA, later ICSA, then TruSecure) from 1990 to 1999, then worked with AtomicTangerine where he supported the International Institute for Information Integrity (I-4). He earned his CISSP designation in 1997.

Since 1986, he has published over 950 articles in operations management and security, written a college textbook on enterprise security (McGraw-Hill, 1996), and served as Technical Editor of the 4th Edition of the Computer Security Handbook (Wiley, 2002). He writes two security-management columns a week distributed by Network World, and is working on the 5th Edition of the Computer Security Handbook for release in Winter 2008. He has been a speaker at the United States War College, the Pentagon, NATO HQ, and at NATO Counterintelligence training in Germany. He was inducted into the ISSA Hall of Fame in December 2004 and earned his ISSMP designation from (ISC)2 in November 2005. Dr Kabay is the Program Director of the Master's Program in Information Assurance and is the CTO of the School of Graduate Studies at Norwich University, Northfield, VT 05663-1035 USA.

Dr. Peter Stephenson has over 40 years experience in information systems and security and is an internationally-known theoretical forensic computer scientist and teacher. A writer, consultant, and lecturer in information protection, cyber investigation, and information operations, he has lectured extensively on network planning, implementation, technology, and security over the past 25 years. He has written or co-authored 14 books (including many in foreign-language translations) and several hundred articles in major national and international trade publications, including his well-known monthly column for the Secure Computing (SC) Magazine. He holds a patent for the Forensic Analysis of Risks in Enterprise Systems.

He began his information security career as a U. S. Navy cryptographer in 1964 and has worked with computer and network communications since the early 1970s. He was the director of technology for the global security practice of Netigy Corporation and was, until July 2003, the worldwide director of technology and research coordinator for QinetiQ Trusted Information Management, Inc., a large international information security professional and managed services company. Prior to joining Netigy, he operated his own information security consulting practice for over 17 years. He holds a BS in electrical engineering, as well as the professional designations Certified Information Security Manager (CISM) and Fellow of the Institute for Communications, Arbitration, and Forensics (FICAF). He is a Certified Information Systems Security Professional (CISSP). He completed his PhD in 2004 at Oxford-Brookes University in Oxford, UK, where his doctoral thesis was entitled Structured Investigation of Digital Incidents in Complex Computing Environments. In June 2007, he received his Master of Arts in Diplomacy from Norwich University. Dr Stephenson is the Chief Information Security Officer of Norwich University and is a Visiting Professor in the School of Business and Management. He is Associate Program Director of the Master's Program in Information Assurance in the School of Graduate Studies at Norwich.

Last Updated: 12/23/09