Find us on
Past Programs
![]() |
Keynote: Securing IT in Healthcare: Part III |
![]() |
Keynote: SITH3, Technology-Enabled Remote Monitoring and Support |
![]() |
Intersection of mHealth and Behavioral Health |
Newsletter
ISTS Information Pamphlet
Download eCampus 2011 presentations and complementing documents here.
Keeping the Human in the Loop
Shari Lawrence Pfleeger
The Evolution of Cyber Threats and Government Policy
Larry Clinton
Dumb Ideas in Computer Security
Chuck Pfleeger
Out of the Frying Pan and into the Fire: Protecting the Security of Research Data
Larry Conrad
Anatomy of an Attack
Adam Goldstein, Brendan Graham, Justin Kearns, and Luke Korth
Panel Discussion: Cyber Risk Insurance
Leslie Seabrook, Bob O'Shea, and Bob Wice
The Building Security in Maturity Model (BSIMM)
Jason Hills
OWASP Top Ten
Kuai Hinojosa