Skip to main content

Home

 

Find us on

facebook youtube flickr twitter itunes u logo

Upcoming Events

Sal Stolfo

Salvatore J. Stolfo Columbia University
A Brief History of Symbiote DefenseTuesday, October 31st
Rockefeller 003
5:00 PM

 Fright Night Imge

Wanna See Something REALLY Scary?
ISTS Looks at the Dark Web on Halloween Night
Tuesday, October 31st
Sudikoff  045 Trust Lab (dungeon)
7:30 PM - RSVP
Space is Limited 

   

Recent Talks

Dan Wallach

STAR-Vote: A Secure, Transparent, Auditable and Reliable Voting System

Professor Dan Wallach
Rice University
Thursday April 27, 2017
Carson L01, 5:00 PM

Ben Miller Dragos

Pandora's Power Grid - What Can State Attacks Do and What Would be the Impact?

Ben Miller
Chief Threat Officer, Dragos, Inc.
Tuesday May 2, 2017
Kemeny 007, 4:30 PM
Brendan Nyhan

 

 

 

Factual Echo Chambers? Fact-checking and Fake News in Election 2016.

Professor Brendan Nyhan
Dartmouth College
Thursday May 4, 2017
Rocky 001, 5:00 PM

Dickie George

 

Espionage and Intelligence

Professor Dickie George
Johns Hopkins University
Thursday May 11, 2017
Rocky 001, 5:00 PM

Dan Wallach

A Nation Under Attack: Advanced Cyber-Attacks in Ukraine

Ukrainian Cybersecurity Researchers
Thursday April 6, 2017
Oopik Auditorium 5:30 PM

ISTS Information Pamphlet


2012BrochureCover

 

Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA
info.ists@dartmouth.edu

2007 Speakers

Reynol Junco is an Associate Professor in the Department of Academic Development and Counseling and Director of Disability Services at Lock Haven University of Pennsylvania. Dr. Junco is a graduate of the University of Florida with a B.S. in Psychology. He earned his Doctor of Education from the Pennsylvania State University in Counselor Education. Dr. Junco’s research interests include examining student development through the use of technology, online survey design, psychometric assessment, and using technology to enhance student success. Dr. Junco has presented extensively on the topic of Net Generation student culture, slang, technology use, and music preferences.

Dr. Junco’s publications have focused on college student technology use. Dr. Junco has recently written the “Wired Window” series for an upcoming revision of the Gardner, Jewler, and Barefoot textbook, Your College Experience: Strategies for success. He has also recently published a book entitled Connecting to the Net Generation: What higher education professionals need to know about today’s students. Dr. Junco has also published a chapter entitled “Technology and Today’s First Year Students” in the book, Challenging and Supporting the First Year Student: A Handbook for Improving the First Year of College by Upcraft, Gardner, Barefoot, and Associates.

Tracy Mitrano is the director of IT Policy and Computer Policy and Law Programs for the Office of Information Technologies at Cornell. Elected to the EDUCAUSE Board in 2006, she will take her seat as its Treasurer in January 2007. Mitrano is a 2002 graduate of the Frye Institute, and since then a member of its faculty, chair of Internet 2 InCommon Steering Committee and from 2004-2006 the co-chair of the Internet 2/EDUCAUSE Security Task Force, Law and Policy Team.

A member of the 2005 EDUCAUSE Program Committee, Mitrano is also faculty of the EDUCAUSE Leadership Institute and co-facilitator of the Seminars on Academic Computing. In 2003 the University of Iowa named her the Ada Stoflet Lecturer. In spring 2005, Mitrano taught an Internet Law class for the MiNE Program at the Universite Cattolica in Piacenza, Italy. At Cornell, Mitrano is an adjunct assistant professor in the Information Science Program where she teaches Information Science 515, "Culture, Law and Politics of the Internet."

Thomas Quinn is Vice President and Global Head Application Risk Assurance at Goldman Sachs. Tom has over 13 years experience in the areas of Technology, Systems Management, and Information Security in both the Defense sector and the Financial Services industry. He has been with Goldman Sachs since 1999 holding positions in systems engineering and application and infrastructure security.  In his current role he provides risk consulting services and guidance to Goldman Sachs' Application Development teams and the lines of business they support.

He actively works with the firm's Investment Research, Private Equity, Investment Banking, Prime Brokerage and Private Wealth Management teams as part of the Leveraging Technology Expertise (LTE) program.  Most recently Tom's focus has been on improving the use of metrics to drive broad adoption of technology controls as well as the challenges associated with the use of Enterprise Rights Management (ERM) in Financial services.

Robert J. Du Charme is a Security Training Manager in the Critical Infrastructure Assurance Group at Cisco Systems. His responsibilities are to create and deliver relevant, current, and high quality security education and training for higher education and Critical Infrastructure Program sector audiences utilizing available or new training materials and lab resources. He also provides technical and course development support as required. Mr. Du Charme joined Cisco in 1998, previously serving as Manager, Learning and Development for the VPN and Security Business Unit and as a technical trainer concentrating on network security technologies. Prior to Cisco, he served in a variety of network and help desk positions for the Administrative Office of the U.S. Federal Courts. He also held many network and system administrative jobs while serving 17 years in the U.S. Air Force.

Matthew Brill is a partner in the Washington, D.C. office of Latham & Perkins and a member of the Communications Practice.  Mr. Brill advises communications companies on a broad range of regulatory, transactional, and litigation matters, including issues involving emerging technologies as well as traditional telecommunications and media issues. He has represented a leading provider of cable telephony services, wireline and wireless carriers, Internet service providers, satellite carriers, and broadcast networks, among others, in proceedings before the Federal Communications Commission (FCC) and federal courts. Mr. Brill is also EDUCAUSE’s legal counsel on CALEA (Communications Assistance for Law Enforcement Act) issues.

Annie Antón is an Associate Professor of Software Engineering in the Computer Science Department of the College of Engineering at NC State University (NCSU), where she is a Senior Research Ethics Fellow for the period of 2006-08 and a member of the NCSU Cyber Defense Lab. Her research focuses on methods and tools to support the specification of complete, correct behavior of software systems used in environments that pose risks of loss as a consequence of failures and misuse. This includes Web-based and e-commerce systems in which the security of personal and private information is particularly vulnerable. To this end, she has developed a leadership role in research, education and outreach with her three current initiatives.

Antón is the founder and director of ThePrivacyPlace.org, a research group of students and faculty at NCSU, Georgia Tech, Purdue University (see our Collaborative NSF CyberTrust Project), and University of Lugano. She is leading this group in the development of technology to assist practitioners and policy makers in meeting the challenge of eliciting and expressing policies (a form of requirements). These tools help ensure that privacy policies are aligned with the software systems that they govern.

M. E. Kabay began programming computers in assembly language in 1965. In 1976, he received his PhD from Dartmouth College in applied statistics and invertebrate zoology and taught biology, statistics, and programming as a university professor in Canada and overseas. In 1979, he joined a compiler team for a new 4GL and RDBMS in the U.S., then joined Hewlett-Packard Canada in 1980 as an operating systems and database performance specialist, winning the Systems Engineer of the Year Award in 1982. He ran his own consulting firm, JINBU Corporation, from 1986 to 1998, specializing in operations management, facilities security, and corporate security policy development and implementation. He served as Director of Education for the National Computer Security Association (NCSA, later ICSA, then TruSecure) from 1990 to 1999, then worked with AtomicTangerine where he supported the International Institute for Information Integrity (I-4). He earned his CISSP designation in 1997.

Since 1986, he has published over 950 articles in operations management and security, written a college textbook on enterprise security (McGraw-Hill, 1996), and served as Technical Editor of the 4th Edition of the Computer Security Handbook (Wiley, 2002). He writes two security-management columns a week distributed by Network World, and is working on the 5th Edition of the Computer Security Handbook for release in Winter 2008. He has been a speaker at the United States War College, the Pentagon, NATO HQ, and at NATO Counterintelligence training in Germany. He was inducted into the ISSA Hall of Fame in December 2004 and earned his ISSMP designation from (ISC)2 in November 2005. Dr Kabay is the Program Director of the Master's Program in Information Assurance and is the CTO of the School of Graduate Studies at Norwich University, Northfield, VT 05663-1035 USA.

Dr. Peter Stephenson has over 40 years experience in information systems and security and is an internationally-known theoretical forensic computer scientist and teacher. A writer, consultant, and lecturer in information protection, cyber investigation, and information operations, he has lectured extensively on network planning, implementation, technology, and security over the past 25 years. He has written or co-authored 14 books (including many in foreign-language translations) and several hundred articles in major national and international trade publications, including his well-known monthly column for the Secure Computing (SC) Magazine. He holds a patent for the Forensic Analysis of Risks in Enterprise Systems.

He began his information security career as a U. S. Navy cryptographer in 1964 and has worked with computer and network communications since the early 1970s. He was the director of technology for the global security practice of Netigy Corporation and was, until July 2003, the worldwide director of technology and research coordinator for QinetiQ Trusted Information Management, Inc., a large international information security professional and managed services company. Prior to joining Netigy, he operated his own information security consulting practice for over 17 years. He holds a BS in electrical engineering, as well as the professional designations Certified Information Security Manager (CISM) and Fellow of the Institute for Communications, Arbitration, and Forensics (FICAF). He is a Certified Information Systems Security Professional (CISSP). He completed his PhD in 2004 at Oxford-Brookes University in Oxford, UK, where his doctoral thesis was entitled Structured Investigation of Digital Incidents in Complex Computing Environments. In June 2007, he received his Master of Arts in Diplomacy from Norwich University. Dr Stephenson is the Chief Information Security Officer of Norwich University and is a Visiting Professor in the School of Business and Management. He is Associate Program Director of the Master's Program in Information Assurance in the School of Graduate Studies at Norwich.

Last Updated: 12/23/09