Skip to main content

Home

 

Find us on

facebook youtube flickr twitter itunes u logo

Past Talks

Senator Jeanne Shaheen

Jeanne Shaheen
U.S. Senator from New Hampshire
Russian Interference in American Politics and Cyber Threats to Our Democracy
Tuesday, February 20, 2018
Alumni Hall (Hopkins Center)
11:00 AM

Lisa Monaco

Lisa Monaco
Former Homeland Security Advisor to President Obama
In Conversation: Lisa Monaco, Fmr Homeland Security Advisor to President Obama
Tuesday, February 13, 2018
Filene Auditorium (Moore Building)
5:00 PM
Sponsored by The Dickey Center for International Understanding

John Stewart EPRI

John Stewart
Sr. Technical Leader, Cyber Security, EPRI
Securing Grid Control Systems
Friday, January 12, 2018
Sudikoff L045 Trust Lab
12:00 Noon

M. Todd Henderson

M. Todd Henderson
Professor of Law, University of Chicago
Hacking Trust: How the Social Technology of Cooperation Will Revolutionize Government
Thursday, January 11, 2018
5:00pm-6:30pm 
Room 003, Rockefeller Center
Sponsored by: Rockefeller Center

Dr. Liz Bowman

Dr. Elizabeth Bowman
U.S. Army Research Laboratory
Artificial Intelligence, Machine Learning and Information: Army Social Computing Research
Tuesday, December 5th
Haldeman 041 Kreindler Conference Room
4:00 PM

Dr. Fabio Pierazzi

Dr. Fabio Pierazzi
Royal Holloway University of London
Network Security Analytics for Detection of Advanced Cyberattacks
Tuesday, November 28th
Sudikoff Trust Lab (L045)
12:30 PM

V.S. Subrahmanian

V.S. Subrahmanian
Dartmouth Distinguished Professor in Cybersecurity, Technology, and Society
Bots, Socks, and Vandals
Tuesday, November 14th
Carson L01
5:00 PM 

Rand Beers

Rand Beers ('64)
Big Data, the Internet, and Social Media:  The Road to the November 2016 Election
Wednesday, November 8th
Haldeman 41 (Kreindler Conference Hall)
4:30 PM 

Fright Night Imge

Wanna See Something REALLY Scary?
ISTS Looks at the Dark Web on Halloween Night
Tuesday, October 31st
S
udikoff  045 Trust Lab (dungeon)
7:30 PM - RSVP
Space is Limited 

Sal Stolfo

Salvatore J. Stolfo 
Columbia University
A Brief History of Symbiote Defense
Tuesday, October 31st
Rockefeller 003
5:00 PM

Dan Wallach

STAR-Vote: A Secure, Transparent, Auditable and Reliable Voting System

Professor Dan Wallach
Rice University
Thursday April 27, 2017
Carson L01, 5:00 PM

Ben Miller Dragos

Pandora's Power Grid - What Can State Attacks Do and What Would be the Impact?

Ben Miller
Chief Threat Officer, Dragos, Inc.
Tuesday May 2, 2017
Kemeny 007, 4:30 PM
Brendan Nyhan

 

 

 

Factual Echo Chambers? Fact-checking and Fake News in Election 2016.

Professor Brendan Nyhan
Dartmouth College
Thursday May 4, 2017
Rocky 001, 5:00 PM

Dickie George

 

Espionage and Intelligence

Professor Dickie George
Johns Hopkins University
Thursday May 11, 2017
Rocky 001, 5:00 PM

Dan Wallach

A Nation Under Attack: Advanced Cyber-Attacks in Ukraine

Ukrainian Cybersecurity Researchers
Thursday April 6, 2017
Oopik Auditorium 5:30 PM

ISTS Information Pamphlet


2012BrochureCover

 

Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA
info.ists@dartmouth.edu

2014 Presentations

Day One Presentations - July 15, 2014

Cybersecurity for the Research and Education Community: Collaboration and Shared Services 
Rodney Petersen - Executive Director, Research and Education Community Collaborative at EDUCAUSE

Colleges and universities continue to pursue aggressive strategies to secure their IT infrastructure and protect information, although with limited resources and often with frustrating results. Higher education is well known for its spirit of collaboration and a culture of sharing effective practices and solutions. There is no greater need for institutions to move from independence to interdependence than in the field of cybersecurity. As IT organizations look to options for sourcing IT services, including security, we need to critically evaluate the options for shared security services in higher education that leverages campus or system resources, association or consortium programs such as REN-ISAC or Internet2 NET+, or commercial solutions.

Youth Perspectives on Tech in Schools
Paulina Haduong - Fellow, Berkman Center for Internet & Society

In order to understand the implications of cloud services for student privacy more holistically, it might be helpful to examine how technology that is already implemented in academic contexts is used by youth and to explore how students feel about current practices. Recent research by the Youth and Media project, as part of the work of the Student Privacy Initiative at the Berkman Center for Internet & Society, aims to make visible the youth perspective regarding the use of digital technology in the academic context, with focus on privacy-relevant youth practices, limitations on access to information, and youth's relation to educators in a high-tech environment.

Are geopolitics carving up the cloud?
Doug Madory - Senior Analyst at Renesys

How strong is the relationship between political stability and Internet development? How is the location of content changing to offer better performance and potentially comply with local storage requirements? Increasing resilience: submarine cable cuts not nearly as catastrophic as they once were.

  • Presentation

In the Aftermath of Disaster; Lessons Learned
Kris Rowley - Information Security Officer, State of Vermont

After hurricane Irene hit the State of Vermont, it became clear that there were lessons to be learned from such a catastrophic event. This presentation will discuss those lessons, from a local to more statewide perspective, and what has been implemented since to improve our disaster recovery stance and improve infrastructure from a physical as well as cyber perspective. The focus will be on the technology/cyber side and how we have moved forward with the implementation of new technologies.

Day Two Presentations - July 16, 2014

The Past, Present and Future of Advanced Attack Detection
Patrick Perry - Systems Engineer at FireEye

Threat intelligence and APT are popular buzzwords in today's security vernacular. What do they really mean? It is best understood by looking at the history of computer security, seeing how it has evolved to where it is today and then considering where it is going tomorrow.

  • Presentation

IT Security Case Study: IT systems and practice at an online, BYOD program for executives
Ano Lobb - Learning & Technology Manager, Masters of Health Care Delivery Science Program, Dartmouth College

Online, BYOD (bring your own device), and executive programs offer unique security challenges for college IT. Consumerization of IT has led to the BYOD expectation that multiple personal devices access secure environments, such as learning management systems, and co-mingle multiple email systems. Distance-based online courses require robust collaboration tools, which academic institutions may not yet provide. Projects and assignments may also require the use of multimedia authoring tools and social media. This need for collaboration platforms, and consumer expectation and preference for specific platforms and devices, has given rise to a culture of BYOC (bring your own collaboration), generally with cloud-based tools that are outside the control of academic IT administrators (such as G-drive, Skype, Dropbox), being accessed on multiple personal devices. Working adult professional students and executives may also work in firewalled IT environments such as healthcare or defense which reflexively block collaboration tools. Since the individual technologies in this cornucopia of IT do not always play well together, the tendency to seek workarounds presents its own concerns.

This presentation will discuss the IT tools, culture, practices and challenges used to deliver online courses at Dartmouth's Masters of Health Care Delivery Science program, a graduate level education program for leaders and emerging leaders in healthcare. In addition to delivering online courses, the MHCDS program is both BYOD and aimed at executives. It is also a one-to-one iPad program, utilizing a suite of Apple services such as iBooks and iTunesU. The goal of this presentation is to describe the IT environment, culture and practices that are used, and to allow those in attendance to consider the potential security concerns that emerge from such practices.

Keeping the Lights on and the Hackers Out: A Security Risk Assessment Process for Utilities and Building Automation Systems
Joseph Homza - Sr. Security Engineer, Cornell University

The Cornell IT Security Office is performing a risk assessment of campus utility and building control systems including its electric generation plant, steam plant, chilled water plant, and drinking water system, as well as an increasing number of "smart" building automation systems. The ITSO developed a new process for assessing these complex and diverse campus utilities environments. We will present the methodology of this new process, compare it to our previous process, and offer lessons learned from the project.

Important Outcomes for Participants to Gain:

1. Gain an understanding of the unique challenges involved with assessing risks for utilities and building control systems.
2. Share in knowledge gained from attempting to create a customized assessment process for utilities and building controls systems.
3. Gain an understanding of the value of performing this sort of risk assessment.

Hosted by

ISTS logo computing services

 

Sponsors

cisco logo presidio LancopeLogo WWPass

Lancope, Inc. is a leading provider of network visibility and security intelligence that helps organizations defend against today's top cyber security threats. By collecting and analyzing NetFlow, IPFIX and other types of flow data, Lancope enables organizations to quickly detect a wide range of attacks, malware and insider threats. Lancope makes up a key component of the Cisco Cyber Threat Defense Solution, designed to combat today's most stealthy, sophisticated cyber-attacks.

WWPass has developed the first unbreakable technology for user authentication and secure data storage. Our patented multi-factor authentication is impenetrable to hackers. User data is encrypted, fragmented and dispersed in the cloud, where it is no longer accessible to identity thieves. Along with that security comes convenience. Using a single PassKey, your faculty and administrators will be able to access private networks, web portals, email and applications without the need for separate username and password pairs.

With generous support from

nercomp

Last Updated: 7/22/14