Skip to main content

Home

 

Find us on

facebook youtube flickr twitter itunes u logo

Upcoming Talks

Meredith Patterson



Meredith Patterson
Co-originator of the Language-theoretic Approach to Computer Security
Computational Linguistics & Computer Security
Tuesday, October 23rd, 2018
4:30pm-5:30pm
Kemeny Hall 108

Past Talks

Samantha Ravich

Samantha Ravich
Deputy Chair of the President's Intelligence Advisory Board
Cyber-Enabled Economic Warfare: Why America’s Private Sector is now on
the Front Lines of an Emerging Battlefield
Thursday, September 27, 2018
4:30pm-6:00pm
Haldeman 41 (Kreindler Conference 
Room)

William Regli, Ph.D

William Regli, Ph.D.
Director of the Institute for Systems Research at the Clark School of Engineering, 
Professor of Computer Science at the 
University of Maryland at College Park
A New Type of Thinking
Friday, June 22, 2018
Life Sciences Center 105
11:00 AM

Tata Consulting Logo

Dr. Gautam Shroff
Vice President, Chief Scientist, and Head of Research at Tata Consultancy Services 
Enterprise AI for Business 4.0: from Automation to Amplification
Thursday, June 07, 2018
Haldeman 041 Kreindler Conference Room
3:30 PM

John Dickerson UMD

John P Dickerson
Assistant Professor, Department of Computer Science, University of Maryland
Using Optimization to Balance Fairness and Efficiency in Kidney Exchange
Monday,  May 21st
Kemeny Hall 008
3:30 PM

Senator Jeanne Shaheen

Jeanne Shaheen
U.S. Senator from New Hampshire
Russian Interference in American Politics and Cyber Threats to Our Democracy
Tuesday, February 20, 2018
Alumni Hall (Hopkins Center)
11:00 AM

Lisa Monaco

Lisa Monaco
Former Homeland Security Advisor to President Obama
In Conversation: Lisa Monaco, Fmr Homeland Security Advisor to President Obama
Tuesday, February 13, 2018
Filene Auditorium (Moore Building)
5:00 PM
Sponsored by The Dickey Center for International Understanding

John Stewart EPRI

John Stewart
Sr. Technical Leader, Cyber Security, EPRI
Securing Grid Control Systems
Friday, January 12, 2018
Sudikoff L045 Trust Lab
12:00 Noon

M. Todd Henderson

M. Todd Henderson
Professor of Law, University of Chicago
Hacking Trust: How the Social Technology of Cooperation Will Revolutionize Government
Thursday, January 11, 2018
5:00pm-6:30pm 
Room 003, Rockefeller Center
Sponsored by: Rockefeller Center

Dr. Liz Bowman

Dr. Elizabeth Bowman
U.S. Army Research Laboratory
Artificial Intelligence, Machine Learning and Information: Army Social Computing Research
Tuesday, December 5th
Haldeman 041 Kreindler Conference Room
4:00 PM

Dr. Fabio Pierazzi

Dr. Fabio Pierazzi
Royal Holloway University of London
Network Security Analytics for Detection of Advanced Cyberattacks
Tuesday, November 28th
Sudikoff Trust Lab (L045)
12:30 PM

V.S. Subrahmanian

V.S. Subrahmanian
Dartmouth Distinguished Professor in Cybersecurity, Technology, and Society
Bots, Socks, and Vandals
Tuesday, November 14th
Carson L01
5:00 PM 

Rand Beers

Rand Beers ('64)
Big Data, the Internet, and Social Media:  The Road to the November 2016 Election
Wednesday, November 8th
Haldeman 41 (Kreindler Conference Hall)
4:30 PM 

Fright Night Imge

Wanna See Something REALLY Scary?
ISTS Looks at the Dark Web on Halloween Night
Tuesday, October 31st
S
udikoff  045 Trust Lab (dungeon)
7:30 PM - RSVP
Space is Limited 

Sal Stolfo

Salvatore J. Stolfo 
Columbia University
A Brief History of Symbiote Defense
Tuesday, October 31st
Rockefeller 003
5:00 PM

ISTS Information Pamphlet


2012BrochureCover

 

Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA
info.ists@dartmouth.edu

2008 Agenda

Tuesday, November 11

8:15 a.m.

Conference Registration and Continental Breakfast
Courtyard by Marriott

9:00 a.m.

Welcoming Remarks

Ellen Waite-Franzen
Vice President for Information Technology and Chief Information Officer, Dartmouth College

9:10 a.m.

The Net Generation: Balancing Freedom and Security in Their Digital World

Julie Little
Interim Director, EDUCAUSE Learning Initiative (ELI)

10:05 a.m.

Break

10:20 a.m.

Tech Security "Threatdown"

Jeffrey Young
Senior Writer, The Chronicle of Higher Education

11:15 a.m.

An Ongoing Conversation with the Boss about Security

Shirley Payne
Director for Security Coordination and Policy, University of Virginia

12:10 p.m.

Lunch

Update on EDUCAUSE Security Task Force Initiatives and Federal Policy Issues

Rodney Petersen
Government Relations Officer & Security Task Force Coordinator

1:30 p.m.

Panel Discussion: Developing an Information Security Awareness Program
Slides: Shirley Payne and Randy Marchany

Participants: Shirley Payne, Randy Marchany, Ellen Young
Moderated by: Susan Knapp

2:25 p.m.

Securing the Open Campus Network

Wendy Seltzer
Fellow, Berkman Center for Internet & Society, and
Visiting Practitioner in Residence, American University Washington College of Law

3:20 p.m.

Break

3:35 p.m.

Statistics, Nature, and the Future of Information Security

Dan Geer
Chief Information Security Officer, In-Q-Tel

4:30 p.m.

Wrap-up

Denise Anthony
Research Director, Institute for Security, Technology, and Society at Dartmouth College and
Associate Professor of Sociology, Dartmouth College

5:15 p.m.

Buses Leave for the Hanover Inn

5:30 p.m.

Social at the Hanover Inn, Wheelock Room

7:00 p.m.

Free Time for Dinner

8:30 p.m.

Buses Return to Courtyard by Marriott

Wednesday, November 12

8:00 a.m.

Buses Leave Courtyard by Marriott for Dartmouth Campus

8:15 a.m.

Continental Breakfast
Russo Gallery, Haldeman Center

9:00 a.m.

Break-out Session 1

Building a Security Operations Center
Randy Marchany

Director of IT Security Lab
Virginia Polytechnic Institute and State University
Location: Haldeman 124

Digital Forensics: Everything Leaves a Trace in Cyberspace
Gary Kessler

Associate Professor of Computer & Digital Forensics (C&DF), director of the Champlain College Center for Digital Investigation (C3DI), and
Coordinator of Information Assurance Education and Research at Champlain College in Burlington, Vermont
Location: Haldeman 125

SISMAT: Secure Information Systems Mentoring and Training
Michael Locasto, Scout Sinclair, Douglas Madory, Adam Goldstein

George Mason University and Dartmouth College
Location: Haldeman 31

10:10 a.m.

Break-out Session 2

Building a Security Operations Center
Randy Marchany

Director of IT Security Lab
Virginia Polytechnic Institute and State University
Location: Haldeman 124

SISMAT: Secure Information Systems Mentoring and Training
Michael Locasto, Scout Sinclair, Douglas Madory, Adam Goldstein

George Mason University and Dartmouth College
Location: Haldeman 31

Authenticating the Remote Learner: On the Internet No One Knows You're a Dog
Slides: Mich Kabay, William Clements, Paul Thompson
Mich Kabay, William Clements, Paul Thompson
Chief Technical Officer and Program Director, Master of Science in Information Assurance, School of Graduate Studies;
Associate Professor of Information Assurance, School of Business and Management, Norwich University
Location: Haldeman 125

11:20 a.m.

Break-out Session 3

Digital Forensics: Everything Leaves a Trace in Cyberspace
Gary Kessler
Associate Professor of Computer & Digital Forensics (C&DF), director of the Champlain College Center for Digital Investigation (C3DI), and
Coordinator of Information Assurance Education and Research at Champlain College in Burlington, Vermont
Location: Haldeman 31

Authenticating the Remote Learner: On the Internet No One Knows You're a Dog
Slides: Mich Kabay, William Clements, Paul Thompson
Mich Kabay, William Clements, Paul Thompson
Chief Technical Officer and Program Director, Master of Science in Information Assurance, School of Graduate Studies;
Associate Professor of Information Assurance, School of Business and Management, Norwich University
Location: Haldeman 125

12:30 p.m.

Lunch in Alumni Hall, The Hopkins Center for the Arts

1:15 p.m.

Conference Wrap-Up
Alumni Hall, The Hopkins Center for the Arts

Steve Nyman
Chief Information Security Officer, Dartmouth College

The Conference will conclude at 2:00 p.m.  Bus service back to the Courtyard by Marriott will be provided at this time.

Talk Abstracts

The Net Generation: Balancing Freedom and Security in Their Digital World
P2P. Openness. Share anything. Tell all. I’ve never met most of my friends face-to-face. I make my own community! These are the operatives of a generation defined by immediate access to information and the freedom to create and share digital content without knowing code. We teach our children how to be safe crossing the neighborhood streets. Where do they learn safe practices for a vast and complex digital highway? And, how do we balance uncharted opportunities for teaching, learning, and collaboration with Web 2.0 and the need to protect identity and information at the individual and institutional level? Let’s explore.
Julie Little

Tech Security 'Threatdown'
A countdown of the top 10 threats to college networks, highlighting notable incidents from the past year and what colleges are doing to respond.
Jeffrey Young

An Ongoing Conversation With The Boss About Security
Rock-solid security architecture, effective policies and procedures, and well-trained workforces are critical security program components. Without executive support, however, attempts to implement and maintain these components can be exercises in futility. The ability to successfully present the case for security requires careful thought and an appreciation for the concerns and needs of top decision-makers in our institutions. This presentation will view security from the perspective of executives and provide practical advice for winning and keeping their backing.
Shirley Payne

Update on EDUCAUSE/Internet2 Security Task Force Initiatives and Federal Policy Issues
The EDUCAUSE/Internet2 Security Task Force works to improve information security and privacy across the higher education sector by actively developing and promoting effective practices and solutions for the protection of critical IT assets and infrastructures.  This session will describe the task force's strategic goals, initiatives, and resources that are available to the community.  Additionally, an update will be provided from Washington, D.C. regarding legislative, regulatory, and other policy developments.
Rodney Petersen

Securing the Open Campus Network
We wouldn't ban books from the shelves of the campus library, nor tell browsing students that their reading was strictly limited to research purposes. Yet when it comes to what may be our greatest library resource yet, the Internet, schools are being asked to restrict access, and doing so, in the name of copyright protection, safety, or security.  While an open network promotes innovation by leaving room for the unanticipated, rigid closure of access to network resources threatens the educational mission.  I will explore the values of openness as counterweight to the legal pressures demanding closure.
Wendy Seltzer

Statistics, Nature, and the Future of Security
Security is a means, not an end, and is thus always changing.  We have two main ways to look at that change and use what we see to predict the (our) future: trend analysis of what we know how to measure, and adaptation of how Nature determines what works and what does not work.  This talk will attempt to synthesize the two.
Dan Geer

Break-out Session Abstracts

Building a Security Operations Center
Virginia Tech is building a Security Operations Center that pulls together security related information from Snort Sensors, IPS, VT Dshield, Net Flows, Vulnerability scanners etc.  This session will include a discussion of how it's being done.
Randy Marchany

Digital Forensics: Everything Leaves a Trace in Cyberspace
This talk will provide an overview of digital forensics and applications in real world scenarios. "Cyberforensics" will be defined with examples and a legal context will be provided regarding laws that impact searches and seizure. The process of computer and network forensics will then be described, along with some specific case studies and examples. Locard's Principle -- the observation that all contacts leave a trace -- is presented as the overriding theme about issues related to tracing movements and actions in the cyberworld. The session will culminate is a discussion and Q&A of how these issues relate specifically to the academic environment.
Gary Kessler

Authenticating Remote Learners: On the Internet, No One Knows You're a Dog
Recent changes in accreditation requirements for educational institutions are moving us towards authenticating the identity of remote-learning students. In this panel discussion, we'll review the nature of the problem and classes of solutions, look at the changes in accreditation regulations, discuss the applications of forensic methodologies to the question, and explore possible applications of semantic analysis to the question of who wrote written submissions.
Mich Kabay
Panel participants include:

  • William Clements, PhD, Dean of the School of Graduate Studies, Norwich University, Northfield, VT
  • Peter Stephenson, PhD, CISM, CISSP, FICAF, Chair of the Department of Computing, School of Business and Management, Norwich University
  • Paul Thompson, PhD, Senior Research Associate, Computer Science Department, Dartmouth College & Adjunct Professor of Information Assurance, Norwich University

SISMAT: Secure Information Systems Mentoring and Training
ISTS researchers and staff at Dartmouth recently developed SISMAT (Secure Information Systems Mentoring and Training), a program of education, training, and collaboration in information security.  As researchers, educators, and computer scientists, we believe that programs like SISMAT are invaluable for helping fulfill the cyber-security educational and outreach missions of organizations like the National Science Foundation, the Department of Homeland Security, and the National Security Agency.  This panel brings together four people involved in the conception, design, and execution of the SISMAT program. We hope that the panel offers a pattern for growing cyber-security education that other institutions can readily adopt.  SISMAT is an ambitious information security education and training program for undergraduate students consisting of three major components.  First, an intensive two-week seminar and laboratory course provides participants with a foundation in computer security.

Second, SISMAT personnel coordinate with industry, non-profit, and government organizations to help place participants in internships related to information security and assurance.  Third, SISMAT personnel coordinate with participants' faculty mentors to identify and develop a suitable mentored research project for the SISMAT participant in the semester following the internship.  In this way, SISMAT helps foster the growth of security curriculum derived from the advice and guidance of recognized industry and academic experts in information and computer security. We believe that these efforts will strengthen ties between recognized security experts and educators and students seeking to promulgate security topics within the Computer Science curriculum.
Michael Locasto
Panel participants include:

  • Scout Sinclair, PhD student, Computer Science Department, Dartmouth College
  • Douglas Madory, MS, CISSP, Manager, Information Systems Security, Dartmouth-Hitchcock Medical Center
  • Adam Goldstein, Security Engineer, Peter Kiewit Computing Services, Dartmouth College

Last Updated: 9/6/12