Skip to main content



Find us on

facebook youtube flickr twitter itunes u logo

Past Talks

John Stewart EPRI

John Stewart
Sr. Technical Leader, Cyber Security, EPRI
Securing Grid Control Systems
Friday, January 12, 2018
Sudikoff L045 Trust Lab
12:00 Noon

M. Todd Henderson

M. Todd Henderson
Professor of Law, University of Chicago
Hacking Trust: How the Social Technology of Cooperation Will Revolutionize Government
Thursday, January 11, 2018
Room 003, Rockefeller Center
Sponsored by: Rockefeller Center

Dr. Liz Bowman

Dr. Elizabeth Bowman
U.S. Army Research Laboratory
Artificial Intelligence, Machine Learning and Information: Army Social Computing Research
Tuesday, December 5th
Haldeman 041 Kreindler Conference Room
4:00 PM

Dr. Fabio Pierazzi

Dr. Fabio Pierazzi
Royal Holloway University of London
Network Security Analytics for Detection of Advanced Cyberattacks
Tuesday, November 28th
Sudikoff Trust Lab (L045)
12:30 PM

V.S. Subrahmanian

V.S. Subrahmanian
Dartmouth Distinguished Professor in Cybersecurity, Technology, and Society
Bots, Socks, and Vandals
Tuesday, November 14th
Carson L01
5:00 PM 

Rand Beers

Rand Beers ('64)
Big Data, the Internet, and Social Media:  The Road to the November 2016 Election
Wednesday, November 8th
Haldeman 41 (Kreindler Conference Hall)
4:30 PM 

Fright Night Imge

Wanna See Something REALLY Scary?
ISTS Looks at the Dark Web on Halloween Night
Tuesday, October 31st
udikoff  045 Trust Lab (dungeon)
7:30 PM - RSVP
Space is Limited 

Sal Stolfo

Salvatore J. Stolfo 
Columbia University
A Brief History of Symbiote Defense
Tuesday, October 31st
Rockefeller 003
5:00 PM

Dan Wallach

STAR-Vote: A Secure, Transparent, Auditable and Reliable Voting System

Professor Dan Wallach
Rice University
Thursday April 27, 2017
Carson L01, 5:00 PM

Ben Miller Dragos

Pandora's Power Grid - What Can State Attacks Do and What Would be the Impact?

Ben Miller
Chief Threat Officer, Dragos, Inc.
Tuesday May 2, 2017
Kemeny 007, 4:30 PM
Brendan Nyhan




Factual Echo Chambers? Fact-checking and Fake News in Election 2016.

Professor Brendan Nyhan
Dartmouth College
Thursday May 4, 2017
Rocky 001, 5:00 PM

Dickie George


Espionage and Intelligence

Professor Dickie George
Johns Hopkins University
Thursday May 11, 2017
Rocky 001, 5:00 PM

Dan Wallach

A Nation Under Attack: Advanced Cyber-Attacks in Ukraine

Ukrainian Cybersecurity Researchers
Thursday April 6, 2017
Oopik Auditorium 5:30 PM

ISTS Information Pamphlet



Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA

2012 Agenda

Tuesday, July 17.  Presentations (Haldeman Center, Kreindler Auditorium, Room 041)

8:30 a.m.

Conference Registration and Continental Breakfast
Haldeman Center, Russo Gallery

9:00 a.m.

Welcoming Remarks
Haldeman Center, Kreindler Auditorium, Room 041

Ellen Waite-Franzen
Vice President for Information Technology and Chief Information Officer, Dartmouth College 

9:10 a.m.

Espionage and Cyber Crime: Life as a Target

Dickie George
Senior Advisor for Cyber Security at Johns Hopkins Applied Physics Laboratory

10:05 a.m.

Websense Threat Report 2012

Joshua Rosenthol
Senior Federal Product Manager, Websense Security Labs

11:00 a.m.


11:15 a.m.

Government Initiatives and their Impact on Identity, Privacy, and Security in Higher Education

Rodney Petersen
Managing Director of the Washington Office and Senior Government Relations Officer at EDUCAUSE 

12:10 p.m.

Sponsored by Cisco and Presidio
Fahey Lounge
Birds of a Feather Topic Tables 

1:40 p.m.


Dan Kaminsky (via video)
Security Consultant

2:00 p.m.

Cyberethics, Discourse and Campus Community

Edward Pittman
Associate Dean for Campus Life and Diversity, Vassar College

3:00 p.m.


3:20 p.m.

Building an Effective Cloud Security Program

Laura Posey
Senior Security Strategist at Microsoft and Volunteer Leadership with the Cloud Security Alliance

4:15 p.m.

Best Practices for Securing Sensitive Information

Jonathan Razo
Chief Security & Compliance Officer, IBM Research Division 

5:10 p.m.


5:30 p.m.

Social Sponsored by Palo Alto Networks
Paganucci Lounge, Class of '53 Commons

7:00 p.m.

Free Time for Dinner

Wednesday, July 18.  Presentations and Interactive Sessions (Haldeman Center, Kreindler Auditorium, Room 041)

8:30 a.m.

Continental Breakfast
Location: Haldeman Center, Russo Gallery

9:00 a.m.

Mobile Networks: The New Enterprise Network
Scott Register
Director of Product Management at BreakingPoint

10:00 a.m.

Privacy and Technology
Denise Anthony
Director of ISTS and Associate Professor of Sociology, Dartmouth College

11:00 a.m.


11:15 a.m.

Academic Dishonesty in Online Coursework
M.E. Kabay
Professor of Information Assurance & Statistics at Norwich University

12:30 p.m.

Location: Fahey Lounge

1:15 p.m.

Conference Wrap-Up and "Five Minutes to Security"
Fahey Lounge

Steve Nyman
Chief Information Security Officer, Dartmouth College 

The Conference will conclude at 2:00 p.m.

Talk Abstracts

Espionage and Cyber Crime: Life as a Target

Dickie George spent 41 years working for the National Security Agency as a cryptographer. As a member of the Intelligence Community, you learn to live as a target. However the world has changed – communications systems, the internet, online life (banking, shopping, social life) – the set of targets, the type of information that is sought, and the adversary have all changed significantly. We'll discuss those changes, how they impact us all, and how today's cyber professionals need to address this threat to protect government, industry, and individuals.

Dickie George

Websense 2012 Threat Report

The Websense Security Labs team is responsible for scanning over 5 billion pieces of content a day in order to understand and communicate threats to our customers and partners to help protect them. This session looks at the trends of malicious attacks over the last year, how they have changed and what is still the same. The data and findings from this presentation are based on the Websense 2012 Threat Report, created by Websense Security Labs.

Joshua Rosenthol

Government Initiatives and their Impact on Identity, Privacy, and Security in Higher Education

The Cyberspace Policy Review initiated by President Obama in his first few weeks in office spawned many new initiatives in the areas of identity management, privacy, and security.  Several of the recommendations resulted in concrete government actions in the form of strategies, legislative proposals, and executive directives.   Despite all the attention, it has been a very difficult journey with few results to show for the effort.  The impact of cyber policy on higher education has been minimal in the last four years, but the potential for additional change or progress could very well depend on the outcome of the national election.  This presentation will provide a policy and regulatory update from Washington, D.C., focusing on the implications for colleges and universities.

Rodney Petersen

Cyberethics, Discourse and Campus Community

The advent of social media and expansive internet has impacted the ways in which students, particularly, engage one another.  When it comes to  engagement of ideological, identity expression and other forms of discourse, the the stakes run high.  This presentation summarizes the steps that Vassar College has taken to consider cyberethics and apply a set of community standards.  The adopted statement, which draws upon existing computer regulations and principles of self and community responsibility, was drafted by a committee of administrators, faculty and students for approval by the Committee on College Life.  The presentation will also highlight campus community responses to cyber messages and behaviors that threaten or endangers individuals or the campus environment.

Edward Pittman

Building an Effective Cloud Security Program: Leveraging the guidance of Cloud Security Alliance Governance Risk & Compliance Stack

Outsourcing critical business functions into the Cloud can result in challenges of maintaining assurance and control over legal and regulatory obligations for data management and protection.  Achieving the governance, risk management and compliance goals to gain this assurance requires appropriate assessment criteria, relevant control objectives and timely access to necessary supporting data.  This session will provide guidance through the process for establishing an effective cloud security program leveraging the Cloud Security Alliance (CSA) Governance Risk & Compliance (GRC) Stack.

Laura Posey

Best Practices for Securing Sensitive Information

Organizations are being challenged implementing effective policies and security controls to protect their most sensitive and confidential information both internally and externally.  Challenges such as classifying and restricting information appropriately, emergence of collaborative technology such as social networks, ineffective policies, among other factors, amplifies this problem.  This presentation will highlight best practices that organizations need to consider when implementing a framework for the identification of sensitive information, including management sponsorship and ownership, baselines, and security controls. 

Jonathan Razo

Mobile Networks: The New Enterprise Network

Mobile traffic grew by 113% in 2011, more than doubling for the fourth consecutive year, according to Cisco's recent Global Mobile Data Traffic Forecast Update. The mobile network of today is the enterprise network of yesterday, and as mobile traffic continues to evolve and grow rapidly, so does the attack and threat landscape. The increasing chaos on mobile networks creates additional challenges when it comes to network security.

As mobile traffic grows, understanding these mobile networks and their implications on lawful intercept and threat detection solutions is no longer an option, but a requirement of enterprise and IT security staff.

This session will present the "Rosetta Stone" version of mobile networks—introducing attendees to the components and protocols that comprise mobile networks; how they relate to the traditional infrastructure; and the potential threats to network security, including BYOD, mobile malware, application stores, 3G to Wi-Fi handoffs, and emerging threats over bearer channels. By the end of the session, attendees will understand how mobile networks work and their impact on lawful intercept and threat detection solutions.

Dennis Cox

Academic Dishonesty in Online Coursework

How do we establish the identity of students who are registering for online courses? What prevents someone from paying an imposter to do all the work in a course and then later benefit from the degree or certification resulting from the imposter's submissions? How do we prevent this kind of imposture in online courses? What prevents the same phenomenon from occurring in brick-and-mortar schools?

This workshop introduces the issues and some of the technical solutions that have been proposed and then opens the period for vigorous discussion among participants.

M.E. Kabay

Last Updated: 3/14/13