Skip to main content

Home

 

Find us on

facebook youtube flickr twitter itunes u logo

Upcoming Talks

Meredith Patterson



Meredith Patterson
Co-originator of the Language-theoretic Approach to Computer Security
Computational Linguistics & Computer Security
Tuesday, October 23rd, 2018
4:30pm-5:30pm
Kemeny Hall 108

Past Talks

Samantha Ravich

Samantha Ravich
Deputy Chair of the President's Intelligence Advisory Board
Cyber-Enabled Economic Warfare: Why America’s Private Sector is now on
the Front Lines of an Emerging Battlefield
Thursday, September 27, 2018
4:30pm-6:00pm
Haldeman 41 (Kreindler Conference 
Room)

William Regli, Ph.D

William Regli, Ph.D.
Director of the Institute for Systems Research at the Clark School of Engineering, 
Professor of Computer Science at the 
University of Maryland at College Park
A New Type of Thinking
Friday, June 22, 2018
Life Sciences Center 105
11:00 AM

Tata Consulting Logo

Dr. Gautam Shroff
Vice President, Chief Scientist, and Head of Research at Tata Consultancy Services 
Enterprise AI for Business 4.0: from Automation to Amplification
Thursday, June 07, 2018
Haldeman 041 Kreindler Conference Room
3:30 PM

John Dickerson UMD

John P Dickerson
Assistant Professor, Department of Computer Science, University of Maryland
Using Optimization to Balance Fairness and Efficiency in Kidney Exchange
Monday,  May 21st
Kemeny Hall 008
3:30 PM

Senator Jeanne Shaheen

Jeanne Shaheen
U.S. Senator from New Hampshire
Russian Interference in American Politics and Cyber Threats to Our Democracy
Tuesday, February 20, 2018
Alumni Hall (Hopkins Center)
11:00 AM

Lisa Monaco

Lisa Monaco
Former Homeland Security Advisor to President Obama
In Conversation: Lisa Monaco, Fmr Homeland Security Advisor to President Obama
Tuesday, February 13, 2018
Filene Auditorium (Moore Building)
5:00 PM
Sponsored by The Dickey Center for International Understanding

John Stewart EPRI

John Stewart
Sr. Technical Leader, Cyber Security, EPRI
Securing Grid Control Systems
Friday, January 12, 2018
Sudikoff L045 Trust Lab
12:00 Noon

M. Todd Henderson

M. Todd Henderson
Professor of Law, University of Chicago
Hacking Trust: How the Social Technology of Cooperation Will Revolutionize Government
Thursday, January 11, 2018
5:00pm-6:30pm 
Room 003, Rockefeller Center
Sponsored by: Rockefeller Center

Dr. Liz Bowman

Dr. Elizabeth Bowman
U.S. Army Research Laboratory
Artificial Intelligence, Machine Learning and Information: Army Social Computing Research
Tuesday, December 5th
Haldeman 041 Kreindler Conference Room
4:00 PM

Dr. Fabio Pierazzi

Dr. Fabio Pierazzi
Royal Holloway University of London
Network Security Analytics for Detection of Advanced Cyberattacks
Tuesday, November 28th
Sudikoff Trust Lab (L045)
12:30 PM

V.S. Subrahmanian

V.S. Subrahmanian
Dartmouth Distinguished Professor in Cybersecurity, Technology, and Society
Bots, Socks, and Vandals
Tuesday, November 14th
Carson L01
5:00 PM 

Rand Beers

Rand Beers ('64)
Big Data, the Internet, and Social Media:  The Road to the November 2016 Election
Wednesday, November 8th
Haldeman 41 (Kreindler Conference Hall)
4:30 PM 

Fright Night Imge

Wanna See Something REALLY Scary?
ISTS Looks at the Dark Web on Halloween Night
Tuesday, October 31st
S
udikoff  045 Trust Lab (dungeon)
7:30 PM - RSVP
Space is Limited 

Sal Stolfo

Salvatore J. Stolfo 
Columbia University
A Brief History of Symbiote Defense
Tuesday, October 31st
Rockefeller 003
5:00 PM

ISTS Information Pamphlet


2012BrochureCover

 

Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA
info.ists@dartmouth.edu

2015 Presentations

Day One Presentations - July 14, 2015

Keynote Address: Data Privacy and Security on the Digital Campus

Devon Chaffee - Executive Director of the ACLU of New Hampshire

What is this, a school for ants? In Search of a Better Model for Information Security in Higher Ed

Joshua Beeman - Information Security Officer, University of Pennsylvania

Despite decades of concerted effort, we continue to see 0-days, bugs, and breaches worldwide.  Some security practitioners have come to the discouraging conclusion that we are not much better off than when we started, and that success may be unobtainable.  This session proposes that the way we frame Information Security shapes not only our professional outlook, but how successful we will be at affecting change across the many layers of our organization.  Mental models such as "cyberwar" and “cybercrime” will be discussed, as will the fictional character Derek Zoolander, and a suggestion for a "really, really, ridiculously good" mental model for information security in higher education.

Future of IDS: Considerations for Keeping Up with Increasing Network Growth

Harry Hoffman - Director, Security and Resilience, Massachusetts Institute of Technology

Campus networks are now planning 40G and 100G upgrades. This talk will focus on various strategies, both architectural and hardware based, to keep up with the growth in these networks. We'll look at several popular solutions that exist and what the future might hold.

Using DNS to Protect Clients from Malicious Domains

Melissa Muth - Senior Information Security Analyst, University of Pennsylvania

Protecting against security threats is especially difficult on large University networks without centralized network security controls. Antivirus software and patching aren't enough to protect clients from zero-day threats, polymorphic malware, and malicious third-party ads hosted on otherwise legitimate websites. A DNS sinkhole is a lightweight method that the University of Pennsylvania is using to protect against these threats, leading to a 97% reduction in compromises. This talk will describe the architecture and lessons learned when going from pilot to production.

Day Two Presentations - July 15, 2015

Prioritizing Web Application Vulnerabilities – A Hacker’s Perspective 

Nick Silver - Principal Solutions Architect at Veracode

The best application risk models not only capture technical risk factors, but also the business context in which an asset lives. Traditionally, this is done by auditing application owners on an array of questions in order to properly classify the asset and its data – but that takes time which could be better spent elsewhere. We interviewed dozens of hackers and asked them which vulnerabilities they would look for first depending on the type of attack they wanted to carry out. We’ll walk through several examples of how to use this data as a shortcut means for prioritizing risk without the need for any pesky audit questionnaires.

From Data Straight-jacket to Armored Data: Duke's Protected Network for Conducting Research with Sensitive Data

Richard Biever - Chief Information Security Officer and Director of Identity Management, Duke University 

Mark DeLong - Director of Research Computing, Duke University

In 2011, Duke started work on a “protected network” to house administrative sensitive data (e.g. SSNs). Since that time, Duke OIT, the IT Security Office, and research groups have made technical and policy modifications to the network resulting in over 30 research groups using the environment and relying on technical controls such as multi-factor for remote access, audit logging and analysis within Splunk, and segmentation within the environment. The model has shifted from a completely isolated and unplugged network with fixed resources to a model of well partitioned and isolated network with flexibly allocated computational and storage resources. Thanks to the involvement of Duke’s research groups, especially in the social sciences, a new set of IT and analysis tools are being developed and tested to provide fast and secure movement of data into the environment (SDN) and browser-based, fast-provisioning of desktop environments with research analysis tools built in. Tools to deploy on-demand cluster computing resources are also under development. Work is underway to use Internet2 technologies to federate authentication, making access to the Protected Network easier for collaborators at other universities. The result is that researchers are finding that computational resources can be matched to the demands of their analysis and their research teams, and the security context is less a constraint on their research plans.

Last Updated: 2/25/16