Skip to main content

Home

 

Find us on

facebook youtube flickr twitter itunes u logo

Upcoming Events

Sal Stolfo

Salvatore J. Stolfo Columbia University
A Brief History of Symbiote DefenseTuesday, October 31st
Rockefeller 003
5:00 PM

 Fright Night Imge

Wanna See Something REALLY Scary?
ISTS Looks at the Dark Web on Halloween Night
Tuesday, October 31st
Sudikoff  045 Trust Lab (dungeon)
7:30 PM - RSVP
Space is Limited 

   

Recent Talks

Dan Wallach

STAR-Vote: A Secure, Transparent, Auditable and Reliable Voting System

Professor Dan Wallach
Rice University
Thursday April 27, 2017
Carson L01, 5:00 PM

Ben Miller Dragos

Pandora's Power Grid - What Can State Attacks Do and What Would be the Impact?

Ben Miller
Chief Threat Officer, Dragos, Inc.
Tuesday May 2, 2017
Kemeny 007, 4:30 PM
Brendan Nyhan

 

 

 

Factual Echo Chambers? Fact-checking and Fake News in Election 2016.

Professor Brendan Nyhan
Dartmouth College
Thursday May 4, 2017
Rocky 001, 5:00 PM

Dickie George

 

Espionage and Intelligence

Professor Dickie George
Johns Hopkins University
Thursday May 11, 2017
Rocky 001, 5:00 PM

Dan Wallach

A Nation Under Attack: Advanced Cyber-Attacks in Ukraine

Ukrainian Cybersecurity Researchers
Thursday April 6, 2017
Oopik Auditorium 5:30 PM

ISTS Information Pamphlet


2012BrochureCover

 

Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA
info.ists@dartmouth.edu

2014 Presentations

Day One Presentations - July 15, 2014

Cybersecurity for the Research and Education Community: Collaboration and Shared Services 
Rodney Petersen - Executive Director, Research and Education Community Collaborative at EDUCAUSE

Colleges and universities continue to pursue aggressive strategies to secure their IT infrastructure and protect information, although with limited resources and often with frustrating results. Higher education is well known for its spirit of collaboration and a culture of sharing effective practices and solutions. There is no greater need for institutions to move from independence to interdependence than in the field of cybersecurity. As IT organizations look to options for sourcing IT services, including security, we need to critically evaluate the options for shared security services in higher education that leverages campus or system resources, association or consortium programs such as REN-ISAC or Internet2 NET+, or commercial solutions.

Youth Perspectives on Tech in Schools
Paulina Haduong - Fellow, Berkman Center for Internet & Society

In order to understand the implications of cloud services for student privacy more holistically, it might be helpful to examine how technology that is already implemented in academic contexts is used by youth and to explore how students feel about current practices. Recent research by the Youth and Media project, as part of the work of the Student Privacy Initiative at the Berkman Center for Internet & Society, aims to make visible the youth perspective regarding the use of digital technology in the academic context, with focus on privacy-relevant youth practices, limitations on access to information, and youth's relation to educators in a high-tech environment.

Are geopolitics carving up the cloud?
Doug Madory - Senior Analyst at Renesys

How strong is the relationship between political stability and Internet development? How is the location of content changing to offer better performance and potentially comply with local storage requirements? Increasing resilience: submarine cable cuts not nearly as catastrophic as they once were.

  • Presentation

In the Aftermath of Disaster; Lessons Learned
Kris Rowley - Information Security Officer, State of Vermont

After hurricane Irene hit the State of Vermont, it became clear that there were lessons to be learned from such a catastrophic event. This presentation will discuss those lessons, from a local to more statewide perspective, and what has been implemented since to improve our disaster recovery stance and improve infrastructure from a physical as well as cyber perspective. The focus will be on the technology/cyber side and how we have moved forward with the implementation of new technologies.

Day Two Presentations - July 16, 2014

The Past, Present and Future of Advanced Attack Detection
Patrick Perry - Systems Engineer at FireEye

Threat intelligence and APT are popular buzzwords in today's security vernacular. What do they really mean? It is best understood by looking at the history of computer security, seeing how it has evolved to where it is today and then considering where it is going tomorrow.

  • Presentation

IT Security Case Study: IT systems and practice at an online, BYOD program for executives
Ano Lobb - Learning & Technology Manager, Masters of Health Care Delivery Science Program, Dartmouth College

Online, BYOD (bring your own device), and executive programs offer unique security challenges for college IT. Consumerization of IT has led to the BYOD expectation that multiple personal devices access secure environments, such as learning management systems, and co-mingle multiple email systems. Distance-based online courses require robust collaboration tools, which academic institutions may not yet provide. Projects and assignments may also require the use of multimedia authoring tools and social media. This need for collaboration platforms, and consumer expectation and preference for specific platforms and devices, has given rise to a culture of BYOC (bring your own collaboration), generally with cloud-based tools that are outside the control of academic IT administrators (such as G-drive, Skype, Dropbox), being accessed on multiple personal devices. Working adult professional students and executives may also work in firewalled IT environments such as healthcare or defense which reflexively block collaboration tools. Since the individual technologies in this cornucopia of IT do not always play well together, the tendency to seek workarounds presents its own concerns.

This presentation will discuss the IT tools, culture, practices and challenges used to deliver online courses at Dartmouth's Masters of Health Care Delivery Science program, a graduate level education program for leaders and emerging leaders in healthcare. In addition to delivering online courses, the MHCDS program is both BYOD and aimed at executives. It is also a one-to-one iPad program, utilizing a suite of Apple services such as iBooks and iTunesU. The goal of this presentation is to describe the IT environment, culture and practices that are used, and to allow those in attendance to consider the potential security concerns that emerge from such practices.

Keeping the Lights on and the Hackers Out: A Security Risk Assessment Process for Utilities and Building Automation Systems
Joseph Homza - Sr. Security Engineer, Cornell University

The Cornell IT Security Office is performing a risk assessment of campus utility and building control systems including its electric generation plant, steam plant, chilled water plant, and drinking water system, as well as an increasing number of "smart" building automation systems. The ITSO developed a new process for assessing these complex and diverse campus utilities environments. We will present the methodology of this new process, compare it to our previous process, and offer lessons learned from the project.

Important Outcomes for Participants to Gain:

1. Gain an understanding of the unique challenges involved with assessing risks for utilities and building control systems.
2. Share in knowledge gained from attempting to create a customized assessment process for utilities and building controls systems.
3. Gain an understanding of the value of performing this sort of risk assessment.

Hosted by

ISTS logo computing services

 

Sponsors

cisco logo presidio LancopeLogo WWPass

Lancope, Inc. is a leading provider of network visibility and security intelligence that helps organizations defend against today's top cyber security threats. By collecting and analyzing NetFlow, IPFIX and other types of flow data, Lancope enables organizations to quickly detect a wide range of attacks, malware and insider threats. Lancope makes up a key component of the Cisco Cyber Threat Defense Solution, designed to combat today's most stealthy, sophisticated cyber-attacks.

WWPass has developed the first unbreakable technology for user authentication and secure data storage. Our patented multi-factor authentication is impenetrable to hackers. User data is encrypted, fragmented and dispersed in the cloud, where it is no longer accessible to identity thieves. Along with that security comes convenience. Using a single PassKey, your faculty and administrators will be able to access private networks, web portals, email and applications without the need for separate username and password pairs.

With generous support from

nercomp

Last Updated: 7/22/14