Skip to main content



Find us on

facebook youtube flickr twitter itunes u logo

Upcoming Talks

Prof. Patrick McDaniel 

Dr. Patrick McDaniel
Director, Institute for Network and Security Research 
School of Electrical Engineering and Computer Science
The Pennsylvania State University
Machine Learning in Adversarial Settings
Wednesday, March 27, 2019
Haldeman Center 041
3:30 PM

Past Talks

Sarit Kraus

Dr. Sarit Kraus
Professor of Computer Science at Bar-Ilan University
Attention Based Fraud Detection of Online Banking Transactions
Thursday, February 14, 2019
Haldeman Center 041
4:00 PM

Amro Farid Professor Amro Farid
Associate Professor of Engineering, Thayer School of Engineering at Dartmouth
Hetero-functional Graph Theory for Interdependent Smart City Infrastructures
Wednesday, February 6, 2019
Life Sciences Center 201
5:00 PM
Meredith Patterson

Meredith Patterson
Co-originator of the Language-theoretic Approach to Computer Security
Computational Linguistics & Computer Security
Tuesday, October 23, 2018
Kemeny Hall 108

Samantha Ravich

Samantha Ravich
Deputy Chair of the President's Intelligence Advisory Board
Cyber-Enabled Economic Warfare: Why America‚Äôs Private Sector is now on
the Front Lines of an Emerging Battlefield
Thursday, September 27, 2018
Haldeman 41 (Kreindler Conference Room)
Video of Dr. Ravich's presentation:

William Regli, Ph.D

William Regli, Ph.D.
Director of the Institute for Systems Research at the Clark School of Engineering, 
Professor of Computer Science at the 
University of Maryland at College Park
A New Type of Thinking
Friday, June 22, 2018
Life Sciences Center 105
11:00 AM

Tata Consulting Logo

Dr. Gautam Shroff
Vice President, Chief Scientist, and Head of Research at Tata Consultancy Services 
Enterprise AI for Business 4.0: from Automation to Amplification
Thursday, June 07, 2018
Haldeman 041 Kreindler Conference Room
3:30 PM

John Dickerson UMD

John P Dickerson
Assistant Professor, Department of Computer Science, University of Maryland
Using Optimization to Balance Fairness and Efficiency in Kidney Exchange
Monday,  May 21, 2018
Kemeny Hall 008
3:30 PM

Senator Jeanne Shaheen

Jeanne Shaheen
U.S. Senator from New Hampshire
Russian Interference in American Politics and Cyber Threats to Our Democracy
Tuesday, February 20, 2018
Alumni Hall (Hopkins Center)
11:00 AM

Lisa Monaco

Lisa Monaco
Former Homeland Security Advisor to President Obama
In Conversation: Lisa Monaco, Fmr Homeland Security Advisor to President Obama
Tuesday, February 13, 2018
Filene Auditorium (Moore Building)
5:00 PM
Sponsored by The Dickey Center for International Understanding

John Stewart EPRI

John Stewart
Sr. Technical Leader, Cyber Security, EPRI
Securing Grid Control Systems
Friday, January 12, 2018
Sudikoff L045 Trust Lab
12:00 Noon

M. Todd Henderson

M. Todd Henderson
Professor of Law, University of Chicago
Hacking Trust: How the Social Technology of Cooperation Will Revolutionize Government
Thursday, January 11, 2018
Room 003, Rockefeller Center
Sponsored by: Rockefeller Center

Dr. Liz Bowman

Dr. Elizabeth Bowman
U.S. Army Research Laboratory
Artificial Intelligence, Machine Learning and Information: Army Social Computing Research
Tuesday, December 5, 2017
Haldeman 041 Kreindler Conference Room
4:00 PM

Dr. Fabio Pierazzi

Dr. Fabio Pierazzi
Royal Holloway University of London
Network Security Analytics for Detection of Advanced Cyberattacks
Tuesday, November 28, 2017
Sudikoff Trust Lab (L045)
12:30 PM

V.S. Subrahmanian

V.S. Subrahmanian
Dartmouth Distinguished Professor in Cybersecurity, Technology, and Society
Bots, Socks, and Vandals
Tuesday, November 14, 2017
Carson L01
5:00 PM 

Rand Beers

Rand Beers ('64)
Big Data, the Internet, and Social Media:  The Road to the November 2016 Election
Wednesday, November 8, 2017
Haldeman 41 (Kreindler Conference Hall)
4:30 PM 

Fright Night Imge

Wanna See Something REALLY Scary?
ISTS Looks at the Dark Web on Halloween Night
Tuesday, October 31, 2017
udikoff  045 Trust Lab (dungeon)
7:30 PM - RSVP
Space is Limited 

Sal Stolfo

Salvatore J. Stolfo 
Columbia University
A Brief History of Symbiote Defense
Tuesday, October 31, 2017
Rockefeller 003
5:00 PM

Russian Bear

A Nation Under Attack: Advanced Cyber-Attacks in Ukraine
Thursday 6 April 2017, Oopik Auditorium 5:30 PM
Video of Roman's and Oleksii's presentations


ISTS Information Pamphlet



Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA

2014 Agenda

Tuesday, July 15, 2014

Download the agenda.

8:30 a.m.

Conference Registration and Full Buffet Breakfast sponsored by Lancope

Location: The Hanover Inn, Hayward Room

9:00 a.m.

Welcoming Remarks

Ellen Waite-Franzen
Vice President for Information Technology and Chief Information Officer, Dartmouth College 

9:30 a.m.

Keynote Address

Nate Fick
CEO of Endgame, former CEO of the Center for a New American Security and former Marine Corps infantry officer

10:45 a.m.

Break - Conference moves to Haldeman Center Kreindler Auditorium, Room 041

11:15 a.m.

Cybersecurity for the Research and Education Community: Collaboration and
Shared Services

Rodney Petersen
Executive Director, Research and Education Community Collaborative at EDUCAUSE 

12:15 p.m.

Russo Gallery, Haldeman Center with eating space in Haldeman 031, 125 and patio

1:30 p.m.

Youth Perspectives on Tech in Schools

Paulina Haduong
Youth and Media Privacy Initiative at the Berkman Center

2:30 p.m.

Are geopolitics carving up the cloud?

Doug Madory
Senior Analyst at Renesys

3:30 p.m.

Snacks available in Russo Gallery

4:00 p.m.

In the Aftermath of Disaster; Lessons Learned

Kris Rowley
Information Security Officer, State of Vermont

5:00 p.m.


Adam Goldstein
IT Security Engineer, Dartmouth College Information Technology Services

5:30 p.m.

Sponsored by Cisco Systems and Presidio 

Location: Dartmouth Outing Club House on Occom Pond

7:00 p.m.

Free Time for Dinner

Wednesday, July 16, 2014  
Haldeman Center

8:30 a.m.

Continental Breakfast
Location: Haldeman Center, Russo Gallery

9:00 a.m.

Day 2 Kick-off
Location: Haldeman Center, Kreindler Auditorium, Room 041

9:15 a.m.

The Past, Present and Future of Advanced Attack Detection

Patrick Perry
Systems Engineer at FireEye

10:15 a.m.

IT Security Case Study: IT systems and practice at an online, BYOD program for executives

Ano Lobb
Learning& Technology Manager, Masters of Health Care Delivery Science Program, Dartmouth College

11:15 a.m.

Keeping the Lights on and the Hackers Out: A Security Risk Assessment Process for Utilities and Building Automation Systems

Joe Homza
Sr. Security Engineer, Cornell University

12:30 p.m.

Location: Dartmouth Outing Club House on Occom Pond

1:20 p.m.

Conference Wrap-Up
Location: Dartmouth Outing Club House on Occom Pond

Steve Nyman
Chief Information Security Officer, Dartmouth College 

The Conference will conclude at 2:00 p.m.

Talk Abstracts

Cybersecurity for the Research and Education Community: Collaboration and Shared Services - Rodney Petersen

Colleges and universities continue to pursue aggressive strategies to secure their IT infrastructure and protect information, although with limited resources and often with frustrating results. Higher education is well known for its spirit of collaboration and a culture of sharing effective practices and solutions. There is no greater need for institutions to move from independence to interdependence than in the field of cybersecurity. As IT organizations look to options for sourcing IT services, including security, we need to critically evaluate the options for shared security services in higher education that leverages campus or system resources, association or consortium programs such as REN-ISAC or Internet2 NET+, or commercial solutions.

Are geopolitics carving up the cloud? - Doug Madory

How strong is the relationship between political stability and Internet development? How is the location of content changing to offer better performance and potentially comply with local storage requirements? Increasing resilience: submarine cable cuts not nearly as catastrophic as they once were.

Youth Perspectives on Tech in Schools - Paulina Haduong

In order to understand the implications of cloud services for student privacy more holistically, it might be helpful to examine how technology that is already implemented in academic contexts is used by youth and to explore how students feel about current practices. Recent research by the Youth and Media project, as part of the work of the Student Privacy Initiative at the Berkman Center for Internet & Society, aims to make visible the youth perspective regarding the use of digital technology in the academic context, with focus on privacy-relevant youth practices, limitations on access to information, and youth's relation to educators in a high-tech environment.

In the Aftermath of Disaster; Lessons Learned - Kris Rowley

After hurricane Irene hit the State of Vermont, it became clear that there were lessons to be learned from such a catastrophic event. This presentation will discuss those lessons, from a local to more statewide perspective, and what has been implemented since to improve our disaster recovery stance and improve infrastructure from a physical as well as cyber perspective. The focus will be on the technology/cyber side and how we have moved forward with the implementation of new technologies.

The Past, Present and Future of Advanced Attack Detection - Patrick Perry

Threat intelligence and APT are popular buzzwords in today's security vernacular. What do they really mean? It is best understood by looking at the history of computer security, seeing how it has evolved to where it is today and then considering where it is going tomorrow.

IT Security Case Study: IT systems and practice at an online, BYOD program for executives - Ano Lobb

Online, BYOD (bring your own device), and executive programs offer unique security challenges for college IT. Consumerization of IT has led to the BYOD expectation that multiple personal devices access secure environments, such as learning management systems, and co-mingle multiple email systems. Distance-based online courses require robust collaboration tools, which academic institutions may not yet provide. Projects and assignments may also require the use of multimedia authoring tools and social media. This need for collaboration platforms, and consumer expectation and preference for specific platforms and devices, has given rise to a culture of BYOC (bring your own collaboration), generally with cloud-based tools that are outside the control of academic IT administrators (such as G-drive, Skype, Dropbox), being accessed on multiple personal devices. Working adult professional students and executives may also work in firewalled IT environments such as healthcare or defense which reflexively block collaboration tools. Since the individual technologies in this cornucopia of IT do not always play well together, the tendency to seek workarounds presents its own concerns.

This presentation will discuss the IT tools, culture, practices and challenges used to deliver online courses at Dartmouth's Masters of Health Care Delivery Science program, a graduate level education program for leaders and emerging leaders in healthcare. In addition to delivering online courses, the MHCDS program is both BYOD and aimed at executives. It is also a one-to-one iPad program, utilizing a suite of Apple services such as iBooks and iTunesU. The goal of this presentation is to describe the IT environment, culture and practices that are used, and to allow those in attendance to consider the potential security concerns that emerge from such practices.

Keeping the Lights on and the Hackers Out: A Security Risk Assessment Process for Utilities and Building Automation Systems - Joseph Homza

The Cornell IT Security Office is performing a risk assessment of campus utility and building control systems including its electric generation plant, steam plant, chilled water plant, and drinking water system, as well as an increasing number of "smart" building automation systems. The ITSO developed a new process for assessing these complex and diverse campus utilities environments. We will present the methodology of this new process, compare it to our previous process, and offer lessons learned from the project.

Important Outcomes for Participants to Gain:

1. Gain an understanding of the unique challenges involved with assessing risks for utilities and building control systems.
2. Share in knowledge gained from attempting to create a customized assessment process for utilities and building controls systems.
3. Gain an understanding of the value of performing this sort of risk assessment.

Last Updated: 6/8/15