Skip to main content



Find us on

facebook youtube flickr twitter itunes u logo

Past Talks

Dr. Liz Bowman

Dr. Elizabeth Bowman
U.S. Army Research Laboratory
Artificial Intelligence, Machine Learning and Information: Army Social Computing Research
Tuesday, December 5th
Haldeman 041 Kreindler Conference Room
4:00 PM

Dr. Fabio Pierazzi

Dr. Fabio Pierazzi
Royal Holloway University of London
Network Security Analytics for Detection of Advanced Cyberattacks
Tuesday, November 28th
Sudikoff Trust Lab (L045)
12:30 PM

V.S. Subrahmanian

V.S. Subrahmanian
Dartmouth Distinguished Professor in Cybersecurity, Technology, and Society
Bots, Socks, and Vandals
Tuesday, November 14th
Carson L01
5:00 PM 

Rand Beers

Rand Beers ('64)
Big Data, the Internet, and Social Media:  The Road to the November 2016 Election
Wednesday, November 8th
Haldeman 41 (Kreindler Conference Hall)
4:30 PM 

Fright Night Imge

Wanna See Something REALLY Scary?
ISTS Looks at the Dark Web on Halloween Night
Tuesday, October 31st
udikoff  045 Trust Lab (dungeon)
7:30 PM - RSVP
Space is Limited 

Sal Stolfo

Salvatore J. Stolfo 
Columbia University
A Brief History of Symbiote Defense
Tuesday, October 31st
Rockefeller 003
5:00 PM

Dan Wallach

STAR-Vote: A Secure, Transparent, Auditable and Reliable Voting System

Professor Dan Wallach
Rice University
Thursday April 27, 2017
Carson L01, 5:00 PM

Ben Miller Dragos

Pandora's Power Grid - What Can State Attacks Do and What Would be the Impact?

Ben Miller
Chief Threat Officer, Dragos, Inc.
Tuesday May 2, 2017
Kemeny 007, 4:30 PM
Brendan Nyhan




Factual Echo Chambers? Fact-checking and Fake News in Election 2016.

Professor Brendan Nyhan
Dartmouth College
Thursday May 4, 2017
Rocky 001, 5:00 PM

Dickie George


Espionage and Intelligence

Professor Dickie George
Johns Hopkins University
Thursday May 11, 2017
Rocky 001, 5:00 PM

Dan Wallach

A Nation Under Attack: Advanced Cyber-Attacks in Ukraine

Ukrainian Cybersecurity Researchers
Thursday April 6, 2017
Oopik Auditorium 5:30 PM

ISTS Information Pamphlet



Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA

2014 Agenda

Tuesday, July 15, 2014

Download the agenda.

8:30 a.m.

Conference Registration and Full Buffet Breakfast sponsored by Lancope

Location: The Hanover Inn, Hayward Room

9:00 a.m.

Welcoming Remarks

Ellen Waite-Franzen
Vice President for Information Technology and Chief Information Officer, Dartmouth College 

9:30 a.m.

Keynote Address

Nate Fick
CEO of Endgame, former CEO of the Center for a New American Security and former Marine Corps infantry officer

10:45 a.m.

Break - Conference moves to Haldeman Center Kreindler Auditorium, Room 041

11:15 a.m.

Cybersecurity for the Research and Education Community: Collaboration and
Shared Services

Rodney Petersen
Executive Director, Research and Education Community Collaborative at EDUCAUSE 

12:15 p.m.

Russo Gallery, Haldeman Center with eating space in Haldeman 031, 125 and patio

1:30 p.m.

Youth Perspectives on Tech in Schools

Paulina Haduong
Youth and Media Privacy Initiative at the Berkman Center

2:30 p.m.

Are geopolitics carving up the cloud?

Doug Madory
Senior Analyst at Renesys

3:30 p.m.

Snacks available in Russo Gallery

4:00 p.m.

In the Aftermath of Disaster; Lessons Learned

Kris Rowley
Information Security Officer, State of Vermont

5:00 p.m.


Adam Goldstein
IT Security Engineer, Dartmouth College Information Technology Services

5:30 p.m.

Sponsored by Cisco Systems and Presidio 

Location: Dartmouth Outing Club House on Occom Pond

7:00 p.m.

Free Time for Dinner

Wednesday, July 16, 2014  
Haldeman Center

8:30 a.m.

Continental Breakfast
Location: Haldeman Center, Russo Gallery

9:00 a.m.

Day 2 Kick-off
Location: Haldeman Center, Kreindler Auditorium, Room 041

9:15 a.m.

The Past, Present and Future of Advanced Attack Detection

Patrick Perry
Systems Engineer at FireEye

10:15 a.m.

IT Security Case Study: IT systems and practice at an online, BYOD program for executives

Ano Lobb
Learning& Technology Manager, Masters of Health Care Delivery Science Program, Dartmouth College

11:15 a.m.

Keeping the Lights on and the Hackers Out: A Security Risk Assessment Process for Utilities and Building Automation Systems

Joe Homza
Sr. Security Engineer, Cornell University

12:30 p.m.

Location: Dartmouth Outing Club House on Occom Pond

1:20 p.m.

Conference Wrap-Up
Location: Dartmouth Outing Club House on Occom Pond

Steve Nyman
Chief Information Security Officer, Dartmouth College 

The Conference will conclude at 2:00 p.m.

Talk Abstracts

Cybersecurity for the Research and Education Community: Collaboration and Shared Services - Rodney Petersen

Colleges and universities continue to pursue aggressive strategies to secure their IT infrastructure and protect information, although with limited resources and often with frustrating results. Higher education is well known for its spirit of collaboration and a culture of sharing effective practices and solutions. There is no greater need for institutions to move from independence to interdependence than in the field of cybersecurity. As IT organizations look to options for sourcing IT services, including security, we need to critically evaluate the options for shared security services in higher education that leverages campus or system resources, association or consortium programs such as REN-ISAC or Internet2 NET+, or commercial solutions.

Are geopolitics carving up the cloud? - Doug Madory

How strong is the relationship between political stability and Internet development? How is the location of content changing to offer better performance and potentially comply with local storage requirements? Increasing resilience: submarine cable cuts not nearly as catastrophic as they once were.

Youth Perspectives on Tech in Schools - Paulina Haduong

In order to understand the implications of cloud services for student privacy more holistically, it might be helpful to examine how technology that is already implemented in academic contexts is used by youth and to explore how students feel about current practices. Recent research by the Youth and Media project, as part of the work of the Student Privacy Initiative at the Berkman Center for Internet & Society, aims to make visible the youth perspective regarding the use of digital technology in the academic context, with focus on privacy-relevant youth practices, limitations on access to information, and youth's relation to educators in a high-tech environment.

In the Aftermath of Disaster; Lessons Learned - Kris Rowley

After hurricane Irene hit the State of Vermont, it became clear that there were lessons to be learned from such a catastrophic event. This presentation will discuss those lessons, from a local to more statewide perspective, and what has been implemented since to improve our disaster recovery stance and improve infrastructure from a physical as well as cyber perspective. The focus will be on the technology/cyber side and how we have moved forward with the implementation of new technologies.

The Past, Present and Future of Advanced Attack Detection - Patrick Perry

Threat intelligence and APT are popular buzzwords in today's security vernacular. What do they really mean? It is best understood by looking at the history of computer security, seeing how it has evolved to where it is today and then considering where it is going tomorrow.

IT Security Case Study: IT systems and practice at an online, BYOD program for executives - Ano Lobb

Online, BYOD (bring your own device), and executive programs offer unique security challenges for college IT. Consumerization of IT has led to the BYOD expectation that multiple personal devices access secure environments, such as learning management systems, and co-mingle multiple email systems. Distance-based online courses require robust collaboration tools, which academic institutions may not yet provide. Projects and assignments may also require the use of multimedia authoring tools and social media. This need for collaboration platforms, and consumer expectation and preference for specific platforms and devices, has given rise to a culture of BYOC (bring your own collaboration), generally with cloud-based tools that are outside the control of academic IT administrators (such as G-drive, Skype, Dropbox), being accessed on multiple personal devices. Working adult professional students and executives may also work in firewalled IT environments such as healthcare or defense which reflexively block collaboration tools. Since the individual technologies in this cornucopia of IT do not always play well together, the tendency to seek workarounds presents its own concerns.

This presentation will discuss the IT tools, culture, practices and challenges used to deliver online courses at Dartmouth's Masters of Health Care Delivery Science program, a graduate level education program for leaders and emerging leaders in healthcare. In addition to delivering online courses, the MHCDS program is both BYOD and aimed at executives. It is also a one-to-one iPad program, utilizing a suite of Apple services such as iBooks and iTunesU. The goal of this presentation is to describe the IT environment, culture and practices that are used, and to allow those in attendance to consider the potential security concerns that emerge from such practices.

Keeping the Lights on and the Hackers Out: A Security Risk Assessment Process for Utilities and Building Automation Systems - Joseph Homza

The Cornell IT Security Office is performing a risk assessment of campus utility and building control systems including its electric generation plant, steam plant, chilled water plant, and drinking water system, as well as an increasing number of "smart" building automation systems. The ITSO developed a new process for assessing these complex and diverse campus utilities environments. We will present the methodology of this new process, compare it to our previous process, and offer lessons learned from the project.

Important Outcomes for Participants to Gain:

1. Gain an understanding of the unique challenges involved with assessing risks for utilities and building control systems.
2. Share in knowledge gained from attempting to create a customized assessment process for utilities and building controls systems.
3. Gain an understanding of the value of performing this sort of risk assessment.

Last Updated: 6/8/15