Skip to main content

Home

 

Find us on

facebook youtube flickr twitter itunes u logo

Upcoming Events

 ISTS logo

Securing the e-Campus 2017 - Exact time and dates TBD

Recent Talks

Dan Wallach

STAR-Vote: A Secure, Transparent, Auditable and Reliable Voting System

Professor Dan Wallach
Rice University
Thursday April 27, 2017
Carson L01, 5:00 PM

Ben Miller Dragos

Pandora's Power Grid - What Can State Attacks Do and What Would be the Impact?

Ben Miller
Chief Threat Officer, Dragos, Inc.
Tuesday May 2, 2017
Kemeny 007, 4:30 PM
Brendan Nyhan

 

 

 

Factual Echo Chambers? Fact-checking and Fake News in Election 2016.

Professor Brendan Nyhan
Dartmouth College
Thursday May 4, 2017
Rocky 001, 5:00 PM

Dickie George

 

Espionage and Intelligence

Professor Dickie George
Johns Hopkins University
Thursday May 11, 2017
Rocky 001, 5:00 PM

Dan Wallach

A Nation Under Attack: Advanced Cyber-Attacks in Ukraine

Ukrainian Cybersecurity Researchers
Thursday April 6, 2017
Oopik Auditorium 5:30 PM

RIOTS logo 

Professor Sean Smith, Director of the ISTS and Bill Nisen, Associate Director, spoke at the

School House residential cluster on the Internet of Risky Things  - February 21, 2017, 5:30 PM

Craig Smith

 

 

 

You Don't Own Your Car
Craig Smith
OpenGarages
Tuesday May 10, 2016 
Carson L02 @4:15

David Safford

 

Hardware Based Security for GE's Industrial Control Systems
David Safford
GE Global Research
Tuesday May 17, 2016
Carson L02 @4:15

 

DanTentler

"It's Fine," They Said. "Just Ship It," They Said.
Dan Tentler
The Phobos Group
Tuesday April 12, 2016 
Carson L02 @4:15

Harold Thimbleby

 

 

 

The Best Way to Improve Healthcare is to Improve Computers
Harold Thimbleby
Swansea University
April 23, 2015

Craig Shue

 

 

 

Managing User-Level Compromises in Enterprise Network
Craig Shue
Worcester Polytechnic Institute
March 31, 2015

 

Newsletter 

Oct news 2015

 

ISTS Information Pamphlet


2012BrochureCover

 

Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA
info.ists@dartmouth.edu

2008 Agenda

Tuesday, November 11

8:15 a.m.

Conference Registration and Continental Breakfast
Courtyard by Marriott

9:00 a.m.

Welcoming Remarks

Ellen Waite-Franzen
Vice President for Information Technology and Chief Information Officer, Dartmouth College

9:10 a.m.

The Net Generation: Balancing Freedom and Security in Their Digital World

Julie Little
Interim Director, EDUCAUSE Learning Initiative (ELI)

10:05 a.m.

Break

10:20 a.m.

Tech Security "Threatdown"

Jeffrey Young
Senior Writer, The Chronicle of Higher Education

11:15 a.m.

An Ongoing Conversation with the Boss about Security

Shirley Payne
Director for Security Coordination and Policy, University of Virginia

12:10 p.m.

Lunch

Update on EDUCAUSE Security Task Force Initiatives and Federal Policy Issues

Rodney Petersen
Government Relations Officer & Security Task Force Coordinator

1:30 p.m.

Panel Discussion: Developing an Information Security Awareness Program
Slides: Shirley Payne and Randy Marchany

Participants: Shirley Payne, Randy Marchany, Ellen Young
Moderated by: Susan Knapp

2:25 p.m.

Securing the Open Campus Network

Wendy Seltzer
Fellow, Berkman Center for Internet & Society, and
Visiting Practitioner in Residence, American University Washington College of Law

3:20 p.m.

Break

3:35 p.m.

Statistics, Nature, and the Future of Information Security

Dan Geer
Chief Information Security Officer, In-Q-Tel

4:30 p.m.

Wrap-up

Denise Anthony
Research Director, Institute for Security, Technology, and Society at Dartmouth College and
Associate Professor of Sociology, Dartmouth College

5:15 p.m.

Buses Leave for the Hanover Inn

5:30 p.m.

Social at the Hanover Inn, Wheelock Room

7:00 p.m.

Free Time for Dinner

8:30 p.m.

Buses Return to Courtyard by Marriott

Wednesday, November 12

8:00 a.m.

Buses Leave Courtyard by Marriott for Dartmouth Campus

8:15 a.m.

Continental Breakfast
Russo Gallery, Haldeman Center

9:00 a.m.

Break-out Session 1

Building a Security Operations Center
Randy Marchany

Director of IT Security Lab
Virginia Polytechnic Institute and State University
Location: Haldeman 124

Digital Forensics: Everything Leaves a Trace in Cyberspace
Gary Kessler

Associate Professor of Computer & Digital Forensics (C&DF), director of the Champlain College Center for Digital Investigation (C3DI), and
Coordinator of Information Assurance Education and Research at Champlain College in Burlington, Vermont
Location: Haldeman 125

SISMAT: Secure Information Systems Mentoring and Training
Michael Locasto, Scout Sinclair, Douglas Madory, Adam Goldstein

George Mason University and Dartmouth College
Location: Haldeman 31

10:10 a.m.

Break-out Session 2

Building a Security Operations Center
Randy Marchany

Director of IT Security Lab
Virginia Polytechnic Institute and State University
Location: Haldeman 124

SISMAT: Secure Information Systems Mentoring and Training
Michael Locasto, Scout Sinclair, Douglas Madory, Adam Goldstein

George Mason University and Dartmouth College
Location: Haldeman 31

Authenticating the Remote Learner: On the Internet No One Knows You're a Dog
Slides: Mich Kabay, William Clements, Paul Thompson
Mich Kabay, William Clements, Paul Thompson
Chief Technical Officer and Program Director, Master of Science in Information Assurance, School of Graduate Studies;
Associate Professor of Information Assurance, School of Business and Management, Norwich University
Location: Haldeman 125

11:20 a.m.

Break-out Session 3

Digital Forensics: Everything Leaves a Trace in Cyberspace
Gary Kessler
Associate Professor of Computer & Digital Forensics (C&DF), director of the Champlain College Center for Digital Investigation (C3DI), and
Coordinator of Information Assurance Education and Research at Champlain College in Burlington, Vermont
Location: Haldeman 31

Authenticating the Remote Learner: On the Internet No One Knows You're a Dog
Slides: Mich Kabay, William Clements, Paul Thompson
Mich Kabay, William Clements, Paul Thompson
Chief Technical Officer and Program Director, Master of Science in Information Assurance, School of Graduate Studies;
Associate Professor of Information Assurance, School of Business and Management, Norwich University
Location: Haldeman 125

12:30 p.m.

Lunch in Alumni Hall, The Hopkins Center for the Arts

1:15 p.m.

Conference Wrap-Up
Alumni Hall, The Hopkins Center for the Arts

Steve Nyman
Chief Information Security Officer, Dartmouth College

The Conference will conclude at 2:00 p.m.  Bus service back to the Courtyard by Marriott will be provided at this time.

Talk Abstracts

The Net Generation: Balancing Freedom and Security in Their Digital World
P2P. Openness. Share anything. Tell all. I’ve never met most of my friends face-to-face. I make my own community! These are the operatives of a generation defined by immediate access to information and the freedom to create and share digital content without knowing code. We teach our children how to be safe crossing the neighborhood streets. Where do they learn safe practices for a vast and complex digital highway? And, how do we balance uncharted opportunities for teaching, learning, and collaboration with Web 2.0 and the need to protect identity and information at the individual and institutional level? Let’s explore.
Julie Little

Tech Security 'Threatdown'
A countdown of the top 10 threats to college networks, highlighting notable incidents from the past year and what colleges are doing to respond.
Jeffrey Young

An Ongoing Conversation With The Boss About Security
Rock-solid security architecture, effective policies and procedures, and well-trained workforces are critical security program components. Without executive support, however, attempts to implement and maintain these components can be exercises in futility. The ability to successfully present the case for security requires careful thought and an appreciation for the concerns and needs of top decision-makers in our institutions. This presentation will view security from the perspective of executives and provide practical advice for winning and keeping their backing.
Shirley Payne

Update on EDUCAUSE/Internet2 Security Task Force Initiatives and Federal Policy Issues
The EDUCAUSE/Internet2 Security Task Force works to improve information security and privacy across the higher education sector by actively developing and promoting effective practices and solutions for the protection of critical IT assets and infrastructures.  This session will describe the task force's strategic goals, initiatives, and resources that are available to the community.  Additionally, an update will be provided from Washington, D.C. regarding legislative, regulatory, and other policy developments.
Rodney Petersen

Securing the Open Campus Network
We wouldn't ban books from the shelves of the campus library, nor tell browsing students that their reading was strictly limited to research purposes. Yet when it comes to what may be our greatest library resource yet, the Internet, schools are being asked to restrict access, and doing so, in the name of copyright protection, safety, or security.  While an open network promotes innovation by leaving room for the unanticipated, rigid closure of access to network resources threatens the educational mission.  I will explore the values of openness as counterweight to the legal pressures demanding closure.
Wendy Seltzer

Statistics, Nature, and the Future of Security
Security is a means, not an end, and is thus always changing.  We have two main ways to look at that change and use what we see to predict the (our) future: trend analysis of what we know how to measure, and adaptation of how Nature determines what works and what does not work.  This talk will attempt to synthesize the two.
Dan Geer

Break-out Session Abstracts

Building a Security Operations Center
Virginia Tech is building a Security Operations Center that pulls together security related information from Snort Sensors, IPS, VT Dshield, Net Flows, Vulnerability scanners etc.  This session will include a discussion of how it's being done.
Randy Marchany

Digital Forensics: Everything Leaves a Trace in Cyberspace
This talk will provide an overview of digital forensics and applications in real world scenarios. "Cyberforensics" will be defined with examples and a legal context will be provided regarding laws that impact searches and seizure. The process of computer and network forensics will then be described, along with some specific case studies and examples. Locard's Principle -- the observation that all contacts leave a trace -- is presented as the overriding theme about issues related to tracing movements and actions in the cyberworld. The session will culminate is a discussion and Q&A of how these issues relate specifically to the academic environment.
Gary Kessler

Authenticating Remote Learners: On the Internet, No One Knows You're a Dog
Recent changes in accreditation requirements for educational institutions are moving us towards authenticating the identity of remote-learning students. In this panel discussion, we'll review the nature of the problem and classes of solutions, look at the changes in accreditation regulations, discuss the applications of forensic methodologies to the question, and explore possible applications of semantic analysis to the question of who wrote written submissions.
Mich Kabay
Panel participants include:

  • William Clements, PhD, Dean of the School of Graduate Studies, Norwich University, Northfield, VT
  • Peter Stephenson, PhD, CISM, CISSP, FICAF, Chair of the Department of Computing, School of Business and Management, Norwich University
  • Paul Thompson, PhD, Senior Research Associate, Computer Science Department, Dartmouth College & Adjunct Professor of Information Assurance, Norwich University

SISMAT: Secure Information Systems Mentoring and Training
ISTS researchers and staff at Dartmouth recently developed SISMAT (Secure Information Systems Mentoring and Training), a program of education, training, and collaboration in information security.  As researchers, educators, and computer scientists, we believe that programs like SISMAT are invaluable for helping fulfill the cyber-security educational and outreach missions of organizations like the National Science Foundation, the Department of Homeland Security, and the National Security Agency.  This panel brings together four people involved in the conception, design, and execution of the SISMAT program. We hope that the panel offers a pattern for growing cyber-security education that other institutions can readily adopt.  SISMAT is an ambitious information security education and training program for undergraduate students consisting of three major components.  First, an intensive two-week seminar and laboratory course provides participants with a foundation in computer security.

Second, SISMAT personnel coordinate with industry, non-profit, and government organizations to help place participants in internships related to information security and assurance.  Third, SISMAT personnel coordinate with participants' faculty mentors to identify and develop a suitable mentored research project for the SISMAT participant in the semester following the internship.  In this way, SISMAT helps foster the growth of security curriculum derived from the advice and guidance of recognized industry and academic experts in information and computer security. We believe that these efforts will strengthen ties between recognized security experts and educators and students seeking to promulgate security topics within the Computer Science curriculum.
Michael Locasto
Panel participants include:

  • Scout Sinclair, PhD student, Computer Science Department, Dartmouth College
  • Douglas Madory, MS, CISSP, Manager, Information Systems Security, Dartmouth-Hitchcock Medical Center
  • Adam Goldstein, Security Engineer, Peter Kiewit Computing Services, Dartmouth College

Last Updated: 9/6/12