Skip to main content

Home

 

Find us on

facebook youtube flickr twitter itunes u logo

Upcoming Events

 ISTS logo

Securing the e-Campus 2017 - Exact time and dates TBD

Recent Talks

Dan Wallach

STAR-Vote: A Secure, Transparent, Auditable and Reliable Voting System

Professor Dan Wallach
Rice University
Thursday April 27, 2017
Carson L01, 5:00 PM

Ben Miller Dragos

Pandora's Power Grid - What Can State Attacks Do and What Would be the Impact?

Ben Miller
Chief Threat Officer, Dragos, Inc.
Tuesday May 2, 2017
Kemeny 007, 4:30 PM
Brendan Nyhan

 

 

 

Factual Echo Chambers? Fact-checking and Fake News in Election 2016.

Professor Brendan Nyhan
Dartmouth College
Thursday May 4, 2017
Rocky 001, 5:00 PM

Dickie George

 

Espionage and Intelligence

Professor Dickie George
Johns Hopkins University
Thursday May 11, 2017
Rocky 001, 5:00 PM

Dan Wallach

A Nation Under Attack: Advanced Cyber-Attacks in Ukraine

Ukrainian Cybersecurity Researchers
Thursday April 6, 2017
Oopik Auditorium 5:30 PM

RIOTS logo 

Professor Sean Smith, Director of the ISTS and Bill Nisen, Associate Director, spoke at the

School House residential cluster on the Internet of Risky Things  - February 21, 2017, 5:30 PM

Craig Smith

 

 

 

You Don't Own Your Car
Craig Smith
OpenGarages
Tuesday May 10, 2016 
Carson L02 @4:15

David Safford

 

Hardware Based Security for GE's Industrial Control Systems
David Safford
GE Global Research
Tuesday May 17, 2016
Carson L02 @4:15

 

DanTentler

"It's Fine," They Said. "Just Ship It," They Said.
Dan Tentler
The Phobos Group
Tuesday April 12, 2016 
Carson L02 @4:15

Harold Thimbleby

 

 

 

The Best Way to Improve Healthcare is to Improve Computers
Harold Thimbleby
Swansea University
April 23, 2015

Craig Shue

 

 

 

Managing User-Level Compromises in Enterprise Network
Craig Shue
Worcester Polytechnic Institute
March 31, 2015

 

Newsletter 

Oct news 2015

 

ISTS Information Pamphlet


2012BrochureCover

 

Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA
info.ists@dartmouth.edu

2009 Agenda

Monday, July 27

8:15 a.m.

Buses Leave Courtyard by Marriott for the Dartmouth Campus

8:30 a.m.

Conference Registration and Continental Breakfast
Alumni Hall, The Hopkins Center for the Arts

9:00 a.m.

Welcoming Remarks

Denise Anthony
Research Director, Institute for Security, Technology, and Society at Dartmouth College and
Associate Professor of Sociology, Dartmouth College

9:10 a.m.

Legal and Regulatory Developments for Privacy and Security (Abstract)

Rodney Petersen
Interim Head of the EDUCAUSE Washington Office and
the Coordinator of the EDUCAUSE/Internet2 Computer and Network Security Task Force

10:05 a.m.

"Crimeware" Threats (Abstract)

Peter Cassidy
Secretary General, Anti-Phishing Working Group (APWG)

11:00 a.m.

Break

11:15 a.m.

Hacker Trends and Motivations

Scott McGaunn
FBI Agent, Computer Crime Squad, Boston 

12:10 p.m.

Lunch

1:00 p.m.

Panel Discussion: Email Services for the Campus Community
Slides:Steve McAllister, Mary Corcoran, Adam Preset, Ellen Young

Participants: Mary Corcoran (Boston College), Adam Preset (University of Pennsylvania), and Ellen Young (Dartmouth College)
Moderator: Steve McAllister, Director of Digital Information Strategy, Dartmouth College

1:55 p.m.

Campus Life Online: Understanding Student Culture and Facebook (Abstract)

Ana Martínez Alemán
Associate Professor and Chair of Educational Administration and
Higher Education Administration Department at Boston College
Co-author of Online Social Networking on Campus: Understanding What Matters in Student Culture

and

Katherine Lynk Wartman
PhD, Higher Education, Boston College
Co-author of Online Social Networking on Campus: Understanding What Matters in Student Culture

2:50 p.m.

Break

3:05 p.m.

Government-related Activities in Education and Workforce Training for Information Security

Brenda Oldfield
Director, Cyber Education and Workforce Development
National Cyber Security Division, Department of Homeland Security

4:00 p.m.

Emerging Trends in Enterprise Security Metrics (Abstract)

Andrew Jaquith
Senior Research Analyst, Forrester Research and author of Security Metrics

4:55 p.m.

Wrap-up

David Bucciero
Director of Technical Services, Peter Kiewit Computing Services, Dartmouth College

5:30 p.m.

Social at the Hanover Inn, Hayward Lounge

7:00 p.m.

Free Time for Dinner

8:30 p.m.

Buses Return to Courtyard by Marriott

Tuesday, July 28

8:15 a.m.

Buses Leave Courtyard by Marriott for the Dartmouth Campus

8:30 a.m.

Continental Breakfast
Location: Haldeman Center, Russo Gallery

9:00 a.m.

Break-out Session 1

The Higher Education Bridge Certification Authority (HEBCA) and the Four Bridges Forum (4BF) (Abstract)
Slides: Higher Education PKI Initiatives and Why PKI & the 4BF
Scott Rea
Director, HEBCA|USHER Operating Authority
Dartmouth College Senior PKI Architect
Location: Haldeman Center, Room 046

Pleasant Skies, or a Gathering Storm: The Good and Evil of Security Services in the Cloud (Abstract)
Dartmouth College's Cyber Security Initiative (CSI)
Location: Haldeman Center, Room 125

The Phishing Education Landing Page (Abstract)
Peter Cassidy
Secretary General, Anti-Phishing Working Group (APWG)
Location: Haldeman Center, Room 031

10:10 a.m.

Break-out Session 2

The Higher Education Bridge Certification Authority (HEBCA) and the Four Bridges Forum (4BF) (Abstract)
Slides: Higher Education PKI Initiatives and Why PKI & the 4BF
Scott Rea
Director, HEBCA|USHER Operating Authority
Dartmouth College Senior PKI Architect
Location: Haldeman Center, Room 046

The Phishing Education Landing Page (Abstract)
Peter Cassidy
Secretary General, Anti-Phishing Working Group (APWG)
Location: Haldeman Center, Room 031

Anatomy of an RIAA File-sharing Lawsuit (Abstract)
Ashlyn Lembree
Professor, Intellectual Property and Transaction Clinic,
Franklin Pierce Law Center and
Sergey Bratus

Research Assistant Professor, Computer Science Department
and Research Fellow, Institute for Security, Technology, and Society at Dartmouth College
Location: Haldeman Center, Room 125

11:20 a.m.

Break-out Session 3

Pleasant Skies, or a Gathering Storm: The Good and Evil of Security Services in the Cloud (Abstract)
Dartmouth College's Cyber Security Initiative (CSI)
Location: Haldeman Center, Room 031

Anatomy of an RIAA File-sharing Lawsuit (Abstract)
Ashlyn Lembree
Professor, Intellectual Property and Transaction Clinic,
Franklin Pierce Law Center and
Sergey Bratus

Research Assistant Professor, Computer Science Department
and Research Fellow, Institute for Security, Technology, and Society at Dartmouth College
Location: Haldeman Center, Room 125

12:30 p.m.

Lunch
Location: Dartmouth Outing Club House on Occom Pond
Bus service will be provided from the Haldeman Center to the Dartmouth Outing Club House.

1:15 p.m.

Conference Wrap-Up
Location: Dartmouth Outing Club House on Occom Pond

Steve Nyman
Chief Information Security Officer, Dartmouth College

The Conference will conclude at 2:00 p.m. Bus service back to the Courtyard by Marriott will be provided at this time.

Talk Abstracts

Legal and Regulatory Developments for Privacy and Security
The politics of privacy and security have reached new heights as the Obama administration announces a comprehensive review of cybersecurity. While many in Washington are waiting to see what the White House proposes as the way forward, the Congress and federal agencies continue to craft legislation and regulations designed to combat concerns for identity theft, data protection, and safeguarding of our nation's critical infrastructure. This session will provide an update from Washington, focusing on recommendations from the administration and private sector groups that call for a comprehensive cybersecurity strategy.
Rodney Petersen

"Crimeware" Threats
Phishing has evolved from pure social engineering schemes to crimeware-based phishing systems using sophisticated technical subterfuge, sometimes blending both kinds of schemes in a single attack architecture. In this segment, Mr. Cassidy reviews genres of crimeware, the data they target and the mechanisms by which they propagate.
Peter Cassidy

Campus Life Online: Understanding Student Culture and Facebook
In this talk, the authors of Online Social Networking on Campus: Understanding What Matters in Student Culture (Routledge, 2009) will discuss the results of an empirical study of undergraduate college student use of the social networking site Facebook. They will pay particular attention to the meanings students make of their own use of this site, as well as implications for college administrators.
Ana Martínez Alemán and Katherine Lynk Wartman

 

Emerging Trends in Enterprise Security Metrics
Managers know that "you can't manage what you don't measure." Budget pressures and the need to demonstrate security effectiveness have led leading enterprises to embrace security metrics as a key discipline. In this talk, Forrester senior analyst and noted author Andrew Jaquith discusses prevailing trends in security metrics and measurement, identifies key best practices, and recommends areas for future research.
Andrew Jaquith

Break-out Session Abstracts

The Higher Education Bridge Certification Authority and the Four Bridges Forum (4BF)
Strong authentication of identity and thorough verification of devices is a mandatory requirement for critical cyber infrastructures. The use of Public Key Infrastructures (PKI) can provide stronger authentication of individuals and devices, and enable a host of security services based on the digital certificates they issue. This break-out session will include a discussion of the benefits of PKI on campus with information on the Higher Education Bridge Certification Authority (HEBCA) and Four Bridges Forum (4BF) which enable PKI certificates to be interoperable across major US federal agencies, US-based pharmaceutical companies, aerospace and defense contractors and colleges and universities.
Scott Rea

Pleasant Skies, or a Gathering Storm: The Good and Evil of Security Services in the Cloud
Staff and students participating with Dartmouth's Cyber Security Initiative (CSI) will discuss their research on performing security services in the cloud. The findings suggest that there are potential technical and cost benefits of using cloud services for a number of tasks including penetration testing, forensic analysis, security monitoring, honeypots, and various processor-intensive security procedures. However, those with malicious intentions could also reap these benefits and the team will address concerns such as anonymous use of cloud services, the risk of easy access to high-powered computing, and potential legal complications in dealing with attacks from the cloud.
Dartmouth's Cyber Security Initiative

The Phishing Education Landing Page
The primary motivation of the APWG/CMU CyLab Phishing Education Landing Page is to instruct credulous email users the moment they have placed themselves at risk: when they have clicked on a link in a phishing email. Why? Because that failure in judgment presents a "teachable moment" for someone who has almost fallen victim of a phishing attack - and is when training is most effective. Mr. Cassidy will introduce the landing page, explain its logistical architecture, and review some of the data about users who have been redirected to it developed by APWG's partners at CMU CyLab.
Peter Cassidy

Anatomy of an RIAA File-sharing Lawsuit
An attorney for a defendant in an RIAA file-sharing suit and the defense's expert witness dissect aspects of these lawsuits on matters of interest to university computer departments. Put on your latex gloves and bring your scalpel.
Ashlyn Lembree and Sergey Bratus

Last Updated: 10/7/15