Skip to main content

Home

 

Find us on

facebook youtube flickr twitter itunes u logo

Upcoming Events

 ISTS logo

Securing the e-Campus 2017 - Exact time and dates TBD

Recent Talks

Dan Wallach

STAR-Vote: A Secure, Transparent, Auditable and Reliable Voting System

Professor Dan Wallach
Rice University
Thursday April 27, 2017
Carson L01, 5:00 PM

Ben Miller Dragos

Pandora's Power Grid - What Can State Attacks Do and What Would be the Impact?

Ben Miller
Chief Threat Officer, Dragos, Inc.
Tuesday May 2, 2017
Kemeny 007, 4:30 PM
Brendan Nyhan

 

 

 

Factual Echo Chambers? Fact-checking and Fake News in Election 2016.

Professor Brendan Nyhan
Dartmouth College
Thursday May 4, 2017
Rocky 001, 5:00 PM

Dickie George

 

Espionage and Intelligence

Professor Dickie George
Johns Hopkins University
Thursday May 11, 2017
Rocky 001, 5:00 PM

Dan Wallach

A Nation Under Attack: Advanced Cyber-Attacks in Ukraine

Ukrainian Cybersecurity Researchers
Thursday April 6, 2017
Oopik Auditorium 5:30 PM

RIOTS logo 

Professor Sean Smith, Director of the ISTS and Bill Nisen, Associate Director, spoke at the

School House residential cluster on the Internet of Risky Things  - February 21, 2017, 5:30 PM

Craig Smith

 

 

 

You Don't Own Your Car
Craig Smith
OpenGarages
Tuesday May 10, 2016 
Carson L02 @4:15

David Safford

 

Hardware Based Security for GE's Industrial Control Systems
David Safford
GE Global Research
Tuesday May 17, 2016
Carson L02 @4:15

 

DanTentler

"It's Fine," They Said. "Just Ship It," They Said.
Dan Tentler
The Phobos Group
Tuesday April 12, 2016 
Carson L02 @4:15

Harold Thimbleby

 

 

 

The Best Way to Improve Healthcare is to Improve Computers
Harold Thimbleby
Swansea University
April 23, 2015

Craig Shue

 

 

 

Managing User-Level Compromises in Enterprise Network
Craig Shue
Worcester Polytechnic Institute
March 31, 2015

 

Newsletter 

Oct news 2015

 

ISTS Information Pamphlet


2012BrochureCover

 

Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA
info.ists@dartmouth.edu

2012 Agenda

Tuesday, July 17.  Presentations (Haldeman Center, Kreindler Auditorium, Room 041)

8:30 a.m.

Conference Registration and Continental Breakfast
Location:
Haldeman Center, Russo Gallery

9:00 a.m.

Welcoming Remarks
Location:
Haldeman Center, Kreindler Auditorium, Room 041

Ellen Waite-Franzen
Vice President for Information Technology and Chief Information Officer, Dartmouth College 

9:10 a.m.

Espionage and Cyber Crime: Life as a Target

Dickie George
Senior Advisor for Cyber Security at Johns Hopkins Applied Physics Laboratory

10:05 a.m.

Websense Threat Report 2012

Joshua Rosenthol
Senior Federal Product Manager, Websense Security Labs

11:00 a.m.

Break

11:15 a.m.

Government Initiatives and their Impact on Identity, Privacy, and Security in Higher Education

Rodney Petersen
Managing Director of the Washington Office and Senior Government Relations Officer at EDUCAUSE 

12:10 p.m.

Lunch
Sponsored by Cisco and Presidio
Location:
Fahey Lounge
Birds of a Feather Topic Tables 

1:40 p.m.

SOPA, PIPA, and CISPA

Dan Kaminsky (via video)
Security Consultant

2:00 p.m.

Cyberethics, Discourse and Campus Community

Edward Pittman
Associate Dean for Campus Life and Diversity, Vassar College

3:00 p.m.

Break

3:20 p.m.

Building an Effective Cloud Security Program

Laura Posey
Senior Security Strategist at Microsoft and Volunteer Leadership with the Cloud Security Alliance

4:15 p.m.

Best Practices for Securing Sensitive Information

Jonathan Razo
Chief Security & Compliance Officer, IBM Research Division 

5:10 p.m.

Wrap-up

5:30 p.m.

Social Sponsored by Palo Alto Networks
Location:
Paganucci Lounge, Class of '53 Commons

7:00 p.m.

Free Time for Dinner

Wednesday, July 18.  Presentations and Interactive Sessions (Haldeman Center, Kreindler Auditorium, Room 041)

8:30 a.m.

Continental Breakfast
Location: Haldeman Center, Russo Gallery

9:00 a.m.

Mobile Networks: The New Enterprise Network
Scott Register
Director of Product Management at BreakingPoint

10:00 a.m.

Privacy and Technology
Denise Anthony
Director of ISTS and Associate Professor of Sociology, Dartmouth College

11:00 a.m.

Break

11:15 a.m.

Academic Dishonesty in Online Coursework
M.E. Kabay
Professor of Information Assurance & Statistics at Norwich University

12:30 p.m.

Lunch
Location: Fahey Lounge

1:15 p.m.

Conference Wrap-Up and "Five Minutes to Security"
Location:
Fahey Lounge

Steve Nyman
Chief Information Security Officer, Dartmouth College 

The Conference will conclude at 2:00 p.m.

Talk Abstracts

Espionage and Cyber Crime: Life as a Target

Dickie George spent 41 years working for the National Security Agency as a cryptographer. As a member of the Intelligence Community, you learn to live as a target. However the world has changed – communications systems, the internet, online life (banking, shopping, social life) – the set of targets, the type of information that is sought, and the adversary have all changed significantly. We'll discuss those changes, how they impact us all, and how today's cyber professionals need to address this threat to protect government, industry, and individuals.

Dickie George

Websense 2012 Threat Report

The Websense Security Labs team is responsible for scanning over 5 billion pieces of content a day in order to understand and communicate threats to our customers and partners to help protect them. This session looks at the trends of malicious attacks over the last year, how they have changed and what is still the same. The data and findings from this presentation are based on the Websense 2012 Threat Report, created by Websense Security Labs.

Joshua Rosenthol

Government Initiatives and their Impact on Identity, Privacy, and Security in Higher Education

The Cyberspace Policy Review initiated by President Obama in his first few weeks in office spawned many new initiatives in the areas of identity management, privacy, and security.  Several of the recommendations resulted in concrete government actions in the form of strategies, legislative proposals, and executive directives.   Despite all the attention, it has been a very difficult journey with few results to show for the effort.  The impact of cyber policy on higher education has been minimal in the last four years, but the potential for additional change or progress could very well depend on the outcome of the national election.  This presentation will provide a policy and regulatory update from Washington, D.C., focusing on the implications for colleges and universities.

Rodney Petersen

Cyberethics, Discourse and Campus Community

The advent of social media and expansive internet has impacted the ways in which students, particularly, engage one another.  When it comes to  engagement of ideological, identity expression and other forms of discourse, the the stakes run high.  This presentation summarizes the steps that Vassar College has taken to consider cyberethics and apply a set of community standards.  The adopted statement, which draws upon existing computer regulations and principles of self and community responsibility, was drafted by a committee of administrators, faculty and students for approval by the Committee on College Life.  The presentation will also highlight campus community responses to cyber messages and behaviors that threaten or endangers individuals or the campus environment.

Edward Pittman

Building an Effective Cloud Security Program: Leveraging the guidance of Cloud Security Alliance Governance Risk & Compliance Stack

Outsourcing critical business functions into the Cloud can result in challenges of maintaining assurance and control over legal and regulatory obligations for data management and protection.  Achieving the governance, risk management and compliance goals to gain this assurance requires appropriate assessment criteria, relevant control objectives and timely access to necessary supporting data.  This session will provide guidance through the process for establishing an effective cloud security program leveraging the Cloud Security Alliance (CSA) Governance Risk & Compliance (GRC) Stack.

Laura Posey

Best Practices for Securing Sensitive Information

Organizations are being challenged implementing effective policies and security controls to protect their most sensitive and confidential information both internally and externally.  Challenges such as classifying and restricting information appropriately, emergence of collaborative technology such as social networks, ineffective policies, among other factors, amplifies this problem.  This presentation will highlight best practices that organizations need to consider when implementing a framework for the identification of sensitive information, including management sponsorship and ownership, baselines, and security controls. 


Jonathan Razo

Mobile Networks: The New Enterprise Network

Mobile traffic grew by 113% in 2011, more than doubling for the fourth consecutive year, according to Cisco's recent Global Mobile Data Traffic Forecast Update. The mobile network of today is the enterprise network of yesterday, and as mobile traffic continues to evolve and grow rapidly, so does the attack and threat landscape. The increasing chaos on mobile networks creates additional challenges when it comes to network security.

As mobile traffic grows, understanding these mobile networks and their implications on lawful intercept and threat detection solutions is no longer an option, but a requirement of enterprise and IT security staff.

This session will present the "Rosetta Stone" version of mobile networks—introducing attendees to the components and protocols that comprise mobile networks; how they relate to the traditional infrastructure; and the potential threats to network security, including BYOD, mobile malware, application stores, 3G to Wi-Fi handoffs, and emerging threats over bearer channels. By the end of the session, attendees will understand how mobile networks work and their impact on lawful intercept and threat detection solutions.

Dennis Cox

Academic Dishonesty in Online Coursework

How do we establish the identity of students who are registering for online courses? What prevents someone from paying an imposter to do all the work in a course and then later benefit from the degree or certification resulting from the imposter's submissions? How do we prevent this kind of imposture in online courses? What prevents the same phenomenon from occurring in brick-and-mortar schools?

This workshop introduces the issues and some of the technical solutions that have been proposed and then opens the period for vigorous discussion among participants.

M.E. Kabay

Last Updated: 3/14/13