Find us on
Past Programs
![]() |
Keynote: Securing IT in Healthcare: Part III |
![]() |
Keynote: SITH3, Technology-Enabled Remote Monitoring and Support |
![]() |
Intersection of mHealth and Behavioral Health |
Newsletter
ISTS Information Pamphlet
|
8:15 a.m. |
Conference Registration and Continental Breakfast |
|
9:00 a.m. |
Welcoming Remarks Ellen Waite-Franzen |
|
9:10 a.m. |
The Net Generation: Balancing Freedom and Security in Their Digital World Julie Little |
|
10:05 a.m. |
Break |
|
10:20 a.m. |
Jeffrey Young |
|
11:15 a.m. |
An Ongoing Conversation with the Boss about Security Shirley Payne |
|
12:10 p.m. |
Lunch Update on EDUCAUSE Security Task Force Initiatives and Federal Policy Issues Rodney Petersen |
|
1:30 p.m. |
Panel Discussion: Developing an Information Security Awareness Program Participants: Shirley Payne, Randy Marchany, Ellen Young |
|
2:25 p.m. |
Securing the Open Campus Network Wendy Seltzer |
|
3:20 p.m. |
Break |
|
3:35 p.m. |
Statistics, Nature, and the Future of Information Security Dan Geer |
|
4:30 p.m. |
Wrap-up Denise Anthony |
|
5:15 p.m. |
Buses Leave for the Hanover Inn |
|
5:30 p.m. |
Social at the Hanover Inn, Wheelock Room |
|
7:00 p.m. |
Free Time for Dinner |
|
8:30 p.m. |
Buses Return to Courtyard by Marriott |
|
8:00 a.m. |
Buses Leave Courtyard by Marriott for Dartmouth Campus |
|
8:15 a.m. |
Continental Breakfast |
|
9:00 a.m. |
Break-out Session 1 Building a Security Operations Center Digital Forensics: Everything Leaves a Trace in Cyberspace SISMAT: Secure Information Systems Mentoring and Training |
|
10:10 a.m. |
Break-out Session 2 Building a Security Operations Center SISMAT: Secure Information Systems Mentoring and Training Authenticating the Remote Learner: On the Internet No One Knows You're a Dog |
|
11:20 a.m. |
Break-out Session 3 Digital Forensics: Everything Leaves a Trace in Cyberspace Authenticating the Remote Learner: On the Internet No One Knows You're a Dog |
|
12:30 p.m. |
Lunch in Alumni Hall, The Hopkins Center for the Arts |
|
1:15 p.m. |
Conference Wrap-Up The Conference will conclude at 2:00 p.m. Bus service back to the Courtyard by Marriott will be provided at this time. |
The Net Generation: Balancing Freedom and Security in Their Digital World
P2P. Openness. Share anything. Tell all. I’ve never met most of my friends face-to-face. I make my own community! These are the operatives of a generation defined by immediate access to information and the freedom to create and share digital content without knowing code. We teach our children how to be safe crossing the neighborhood streets. Where do they learn safe practices for a vast and complex digital highway? And, how do we balance uncharted opportunities for teaching, learning, and collaboration with Web 2.0 and the need to protect identity and information at the individual and institutional level? Let’s explore.
Julie Little
Tech Security 'Threatdown'
A countdown of the top 10 threats to college networks, highlighting notable incidents from the past year and what colleges are doing to respond.
Jeffrey Young
An Ongoing Conversation With The Boss About Security
Rock-solid security architecture, effective policies and procedures, and well-trained workforces are critical security program components. Without executive support, however, attempts to implement and maintain these components can be exercises in futility. The ability to successfully present the case for security requires careful thought and an appreciation for the concerns and needs of top decision-makers in our institutions. This presentation will view security from the perspective of executives and provide practical advice for winning and keeping their backing.
Shirley Payne
Update on EDUCAUSE/Internet2 Security Task Force Initiatives and Federal Policy Issues
The EDUCAUSE/Internet2 Security Task Force works to improve information security and privacy across the higher education sector by actively developing and promoting effective practices and solutions for the protection of critical IT assets and infrastructures. This session will describe the task force's strategic goals, initiatives, and resources that are available to the community. Additionally, an update will be provided from Washington, D.C. regarding legislative, regulatory, and other policy developments.
Rodney Petersen
Securing the Open Campus Network
We wouldn't ban books from the shelves of the campus library, nor tell browsing students that their reading was strictly limited to research purposes. Yet when it comes to what may be our greatest library resource yet, the Internet, schools are being asked to restrict access, and doing so, in the name of copyright protection, safety, or security. While an open network promotes innovation by leaving room for the unanticipated, rigid closure of access to network resources threatens the educational mission. I will explore the values of openness as counterweight to the legal pressures demanding closure.
Wendy Seltzer
Statistics, Nature, and the Future of Security
Security is a means, not an end, and is thus always changing. We have two main ways to look at that change and use what we see to predict the (our) future: trend analysis of what we know how to measure, and adaptation of how Nature determines what works and what does not work. This talk will attempt to synthesize the two.
Dan Geer
Building a Security Operations Center
Virginia Tech is building a Security Operations Center that pulls together security related information from Snort Sensors, IPS, VT Dshield, Net Flows, Vulnerability scanners etc. This session will include a discussion of how it's being done.
Randy Marchany
Digital Forensics: Everything Leaves a Trace in Cyberspace
This talk will provide an overview of digital forensics and applications in real world scenarios. "Cyberforensics" will be defined with examples and a legal context will be provided regarding laws that impact searches and seizure. The process of computer and network forensics will then be described, along with some specific case studies and examples. Locard's Principle -- the observation that all contacts leave a trace -- is presented as the overriding theme about issues related to tracing movements and actions in the cyberworld. The session will culminate is a discussion and Q&A of how these issues relate specifically to the academic environment.
Gary Kessler
Authenticating Remote Learners: On the Internet, No One Knows You're a Dog
Recent changes in accreditation requirements for educational institutions are moving us towards authenticating the identity of remote-learning students. In this panel discussion, we'll review the nature of the problem and classes of solutions, look at the changes in accreditation regulations, discuss the applications of forensic methodologies to the question, and explore possible applications of semantic analysis to the question of who wrote written submissions.
Mich Kabay
Panel participants include:
SISMAT: Secure Information Systems Mentoring and Training
ISTS researchers and staff at Dartmouth recently developed SISMAT (Secure Information Systems Mentoring and Training), a program of education, training, and collaboration in information security. As researchers, educators, and computer scientists, we believe that programs like SISMAT are invaluable for helping fulfill the cyber-security educational and outreach missions of organizations like the National Science Foundation, the Department of Homeland Security, and the National Security Agency. This panel brings together four people involved in the conception, design, and execution of the SISMAT program. We hope that the panel offers a pattern for growing cyber-security education that other institutions can readily adopt. SISMAT is an ambitious information security education and training program for undergraduate students consisting of three major components. First, an intensive two-week seminar and laboratory course provides participants with a foundation in computer security.
Second, SISMAT personnel coordinate with industry, non-profit, and government organizations to help place participants in internships related to information security and assurance. Third, SISMAT personnel coordinate with participants' faculty mentors to identify and develop a suitable mentored research project for the SISMAT participant in the semester following the internship. In this way, SISMAT helps foster the growth of security curriculum derived from the advice and guidance of recognized industry and academic experts in information and computer security. We believe that these efforts will strengthen ties between recognized security experts and educators and students seeking to promulgate security topics within the Computer Science curriculum.
Michael Locasto
Panel participants include: