Skip to main content

Home

 

Find us on

facebook youtube flickr twitter itunes u logo

Upcoming Talks

Meredith Patterson



Meredith Patterson
Co-originator of the Language-theoretic Approach to Computer Security
Computational Linguistics & Computer Security
Tuesday, October 23rd, 2018
4:30pm-5:30pm
Kemeny Hall 108

Past Talks

Samantha Ravich

Samantha Ravich
Deputy Chair of the President's Intelligence Advisory Board
Cyber-Enabled Economic Warfare: Why America’s Private Sector is now on
the Front Lines of an Emerging Battlefield
Thursday, September 27, 2018
4:30pm-6:00pm
Haldeman 41 (Kreindler Conference 
Room)

William Regli, Ph.D

William Regli, Ph.D.
Director of the Institute for Systems Research at the Clark School of Engineering, 
Professor of Computer Science at the 
University of Maryland at College Park
A New Type of Thinking
Friday, June 22, 2018
Life Sciences Center 105
11:00 AM

Tata Consulting Logo

Dr. Gautam Shroff
Vice President, Chief Scientist, and Head of Research at Tata Consultancy Services 
Enterprise AI for Business 4.0: from Automation to Amplification
Thursday, June 07, 2018
Haldeman 041 Kreindler Conference Room
3:30 PM

John Dickerson UMD

John P Dickerson
Assistant Professor, Department of Computer Science, University of Maryland
Using Optimization to Balance Fairness and Efficiency in Kidney Exchange
Monday,  May 21st
Kemeny Hall 008
3:30 PM

Senator Jeanne Shaheen

Jeanne Shaheen
U.S. Senator from New Hampshire
Russian Interference in American Politics and Cyber Threats to Our Democracy
Tuesday, February 20, 2018
Alumni Hall (Hopkins Center)
11:00 AM

Lisa Monaco

Lisa Monaco
Former Homeland Security Advisor to President Obama
In Conversation: Lisa Monaco, Fmr Homeland Security Advisor to President Obama
Tuesday, February 13, 2018
Filene Auditorium (Moore Building)
5:00 PM
Sponsored by The Dickey Center for International Understanding

John Stewart EPRI

John Stewart
Sr. Technical Leader, Cyber Security, EPRI
Securing Grid Control Systems
Friday, January 12, 2018
Sudikoff L045 Trust Lab
12:00 Noon

M. Todd Henderson

M. Todd Henderson
Professor of Law, University of Chicago
Hacking Trust: How the Social Technology of Cooperation Will Revolutionize Government
Thursday, January 11, 2018
5:00pm-6:30pm 
Room 003, Rockefeller Center
Sponsored by: Rockefeller Center

Dr. Liz Bowman

Dr. Elizabeth Bowman
U.S. Army Research Laboratory
Artificial Intelligence, Machine Learning and Information: Army Social Computing Research
Tuesday, December 5th
Haldeman 041 Kreindler Conference Room
4:00 PM

Dr. Fabio Pierazzi

Dr. Fabio Pierazzi
Royal Holloway University of London
Network Security Analytics for Detection of Advanced Cyberattacks
Tuesday, November 28th
Sudikoff Trust Lab (L045)
12:30 PM

V.S. Subrahmanian

V.S. Subrahmanian
Dartmouth Distinguished Professor in Cybersecurity, Technology, and Society
Bots, Socks, and Vandals
Tuesday, November 14th
Carson L01
5:00 PM 

Rand Beers

Rand Beers ('64)
Big Data, the Internet, and Social Media:  The Road to the November 2016 Election
Wednesday, November 8th
Haldeman 41 (Kreindler Conference Hall)
4:30 PM 

Fright Night Imge

Wanna See Something REALLY Scary?
ISTS Looks at the Dark Web on Halloween Night
Tuesday, October 31st
S
udikoff  045 Trust Lab (dungeon)
7:30 PM - RSVP
Space is Limited 

Sal Stolfo

Salvatore J. Stolfo 
Columbia University
A Brief History of Symbiote Defense
Tuesday, October 31st
Rockefeller 003
5:00 PM

ISTS Information Pamphlet


2012BrochureCover

 

Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA
info.ists@dartmouth.edu

2012 Agenda

Tuesday, July 17.  Presentations (Haldeman Center, Kreindler Auditorium, Room 041)

8:30 a.m.

Conference Registration and Continental Breakfast
Location:
Haldeman Center, Russo Gallery

9:00 a.m.

Welcoming Remarks
Location:
Haldeman Center, Kreindler Auditorium, Room 041

Ellen Waite-Franzen
Vice President for Information Technology and Chief Information Officer, Dartmouth College 

9:10 a.m.

Espionage and Cyber Crime: Life as a Target

Dickie George
Senior Advisor for Cyber Security at Johns Hopkins Applied Physics Laboratory

10:05 a.m.

Websense Threat Report 2012

Joshua Rosenthol
Senior Federal Product Manager, Websense Security Labs

11:00 a.m.

Break

11:15 a.m.

Government Initiatives and their Impact on Identity, Privacy, and Security in Higher Education

Rodney Petersen
Managing Director of the Washington Office and Senior Government Relations Officer at EDUCAUSE 

12:10 p.m.

Lunch
Sponsored by Cisco and Presidio
Location:
Fahey Lounge
Birds of a Feather Topic Tables 

1:40 p.m.

SOPA, PIPA, and CISPA

Dan Kaminsky (via video)
Security Consultant

2:00 p.m.

Cyberethics, Discourse and Campus Community

Edward Pittman
Associate Dean for Campus Life and Diversity, Vassar College

3:00 p.m.

Break

3:20 p.m.

Building an Effective Cloud Security Program

Laura Posey
Senior Security Strategist at Microsoft and Volunteer Leadership with the Cloud Security Alliance

4:15 p.m.

Best Practices for Securing Sensitive Information

Jonathan Razo
Chief Security & Compliance Officer, IBM Research Division 

5:10 p.m.

Wrap-up

5:30 p.m.

Social Sponsored by Palo Alto Networks
Location:
Paganucci Lounge, Class of '53 Commons

7:00 p.m.

Free Time for Dinner

Wednesday, July 18.  Presentations and Interactive Sessions (Haldeman Center, Kreindler Auditorium, Room 041)

8:30 a.m.

Continental Breakfast
Location: Haldeman Center, Russo Gallery

9:00 a.m.

Mobile Networks: The New Enterprise Network
Scott Register
Director of Product Management at BreakingPoint

10:00 a.m.

Privacy and Technology
Denise Anthony
Director of ISTS and Associate Professor of Sociology, Dartmouth College

11:00 a.m.

Break

11:15 a.m.

Academic Dishonesty in Online Coursework
M.E. Kabay
Professor of Information Assurance & Statistics at Norwich University

12:30 p.m.

Lunch
Location: Fahey Lounge

1:15 p.m.

Conference Wrap-Up and "Five Minutes to Security"
Location:
Fahey Lounge

Steve Nyman
Chief Information Security Officer, Dartmouth College 

The Conference will conclude at 2:00 p.m.

Talk Abstracts

Espionage and Cyber Crime: Life as a Target

Dickie George spent 41 years working for the National Security Agency as a cryptographer. As a member of the Intelligence Community, you learn to live as a target. However the world has changed – communications systems, the internet, online life (banking, shopping, social life) – the set of targets, the type of information that is sought, and the adversary have all changed significantly. We'll discuss those changes, how they impact us all, and how today's cyber professionals need to address this threat to protect government, industry, and individuals.

Dickie George

Websense 2012 Threat Report

The Websense Security Labs team is responsible for scanning over 5 billion pieces of content a day in order to understand and communicate threats to our customers and partners to help protect them. This session looks at the trends of malicious attacks over the last year, how they have changed and what is still the same. The data and findings from this presentation are based on the Websense 2012 Threat Report, created by Websense Security Labs.

Joshua Rosenthol

Government Initiatives and their Impact on Identity, Privacy, and Security in Higher Education

The Cyberspace Policy Review initiated by President Obama in his first few weeks in office spawned many new initiatives in the areas of identity management, privacy, and security.  Several of the recommendations resulted in concrete government actions in the form of strategies, legislative proposals, and executive directives.   Despite all the attention, it has been a very difficult journey with few results to show for the effort.  The impact of cyber policy on higher education has been minimal in the last four years, but the potential for additional change or progress could very well depend on the outcome of the national election.  This presentation will provide a policy and regulatory update from Washington, D.C., focusing on the implications for colleges and universities.

Rodney Petersen

Cyberethics, Discourse and Campus Community

The advent of social media and expansive internet has impacted the ways in which students, particularly, engage one another.  When it comes to  engagement of ideological, identity expression and other forms of discourse, the the stakes run high.  This presentation summarizes the steps that Vassar College has taken to consider cyberethics and apply a set of community standards.  The adopted statement, which draws upon existing computer regulations and principles of self and community responsibility, was drafted by a committee of administrators, faculty and students for approval by the Committee on College Life.  The presentation will also highlight campus community responses to cyber messages and behaviors that threaten or endangers individuals or the campus environment.

Edward Pittman

Building an Effective Cloud Security Program: Leveraging the guidance of Cloud Security Alliance Governance Risk & Compliance Stack

Outsourcing critical business functions into the Cloud can result in challenges of maintaining assurance and control over legal and regulatory obligations for data management and protection.  Achieving the governance, risk management and compliance goals to gain this assurance requires appropriate assessment criteria, relevant control objectives and timely access to necessary supporting data.  This session will provide guidance through the process for establishing an effective cloud security program leveraging the Cloud Security Alliance (CSA) Governance Risk & Compliance (GRC) Stack.

Laura Posey

Best Practices for Securing Sensitive Information

Organizations are being challenged implementing effective policies and security controls to protect their most sensitive and confidential information both internally and externally.  Challenges such as classifying and restricting information appropriately, emergence of collaborative technology such as social networks, ineffective policies, among other factors, amplifies this problem.  This presentation will highlight best practices that organizations need to consider when implementing a framework for the identification of sensitive information, including management sponsorship and ownership, baselines, and security controls. 


Jonathan Razo

Mobile Networks: The New Enterprise Network

Mobile traffic grew by 113% in 2011, more than doubling for the fourth consecutive year, according to Cisco's recent Global Mobile Data Traffic Forecast Update. The mobile network of today is the enterprise network of yesterday, and as mobile traffic continues to evolve and grow rapidly, so does the attack and threat landscape. The increasing chaos on mobile networks creates additional challenges when it comes to network security.

As mobile traffic grows, understanding these mobile networks and their implications on lawful intercept and threat detection solutions is no longer an option, but a requirement of enterprise and IT security staff.

This session will present the "Rosetta Stone" version of mobile networks—introducing attendees to the components and protocols that comprise mobile networks; how they relate to the traditional infrastructure; and the potential threats to network security, including BYOD, mobile malware, application stores, 3G to Wi-Fi handoffs, and emerging threats over bearer channels. By the end of the session, attendees will understand how mobile networks work and their impact on lawful intercept and threat detection solutions.

Dennis Cox

Academic Dishonesty in Online Coursework

How do we establish the identity of students who are registering for online courses? What prevents someone from paying an imposter to do all the work in a course and then later benefit from the degree or certification resulting from the imposter's submissions? How do we prevent this kind of imposture in online courses? What prevents the same phenomenon from occurring in brick-and-mortar schools?

This workshop introduces the issues and some of the technical solutions that have been proposed and then opens the period for vigorous discussion among participants.

M.E. Kabay

Last Updated: 3/14/13