Skip to main content

Home

 

Find us on

facebook youtube flickr twitter itunes u logo

Upcoming Talks

 

 

Past Talks

William Regli, Ph.D

William Regli, Ph.D.
Director of the Institute for Systems Research at the Clark School of Engineering, 
Professor of Computer Science at the 
University of Maryland at College Park
A New Type of Thinking
Friday, June 22, 2018
Life Sciences Center 105
11:00 AM

Tata Consulting Logo

Dr. Gautam Shroff
Vice President, Chief Scientist, and Head of Research at Tata Consultancy Services 
Enterprise AI for Business 4.0: from Automation to Amplification
Thursday, June 07, 2018
Haldeman 041 Kreindler Conference Room
3:30 PM

John Dickerson UMD

John P Dickerson
Assistant Professor, Department of Computer Science, University of Maryland
Using Optimization to Balance Fairness and Efficiency in Kidney Exchange
Monday,  May 21st
Kemeny Hall 008
3:30 PM

Senator Jeanne Shaheen

Jeanne Shaheen
U.S. Senator from New Hampshire
Russian Interference in American Politics and Cyber Threats to Our Democracy
Tuesday, February 20, 2018
Alumni Hall (Hopkins Center)
11:00 AM

Lisa Monaco

Lisa Monaco
Former Homeland Security Advisor to President Obama
In Conversation: Lisa Monaco, Fmr Homeland Security Advisor to President Obama
Tuesday, February 13, 2018
Filene Auditorium (Moore Building)
5:00 PM
Sponsored by The Dickey Center for International Understanding

John Stewart EPRI

John Stewart
Sr. Technical Leader, Cyber Security, EPRI
Securing Grid Control Systems
Friday, January 12, 2018
Sudikoff L045 Trust Lab
12:00 Noon

M. Todd Henderson

M. Todd Henderson
Professor of Law, University of Chicago
Hacking Trust: How the Social Technology of Cooperation Will Revolutionize Government
Thursday, January 11, 2018
5:00pm-6:30pm 
Room 003, Rockefeller Center
Sponsored by: Rockefeller Center

Dr. Liz Bowman

Dr. Elizabeth Bowman
U.S. Army Research Laboratory
Artificial Intelligence, Machine Learning and Information: Army Social Computing Research
Tuesday, December 5th
Haldeman 041 Kreindler Conference Room
4:00 PM

Dr. Fabio Pierazzi

Dr. Fabio Pierazzi
Royal Holloway University of London
Network Security Analytics for Detection of Advanced Cyberattacks
Tuesday, November 28th
Sudikoff Trust Lab (L045)
12:30 PM

V.S. Subrahmanian

V.S. Subrahmanian
Dartmouth Distinguished Professor in Cybersecurity, Technology, and Society
Bots, Socks, and Vandals
Tuesday, November 14th
Carson L01
5:00 PM 

Rand Beers

Rand Beers ('64)
Big Data, the Internet, and Social Media:  The Road to the November 2016 Election
Wednesday, November 8th
Haldeman 41 (Kreindler Conference Hall)
4:30 PM 

Fright Night Imge

Wanna See Something REALLY Scary?
ISTS Looks at the Dark Web on Halloween Night
Tuesday, October 31st
S
udikoff  045 Trust Lab (dungeon)
7:30 PM - RSVP
Space is Limited 

Sal Stolfo

Salvatore J. Stolfo 
Columbia University
A Brief History of Symbiote Defense
Tuesday, October 31st
Rockefeller 003
5:00 PM

Dan Wallach

STAR-Vote: A Secure, Transparent, Auditable and Reliable Voting System

Professor Dan Wallach
Rice University
Thursday April 27, 2017
Carson L01, 5:00 PM

Ben Miller Dragos

Pandora's Power Grid - What Can State Attacks Do and What Would be the Impact?

Ben Miller
Chief Threat Officer, Dragos, Inc.
Tuesday May 2, 2017
Kemeny 007, 4:30 PM
Brendan Nyhan

 

 

 

Factual Echo Chambers? Fact-checking and Fake News in Election 2016.

Professor Brendan Nyhan
Dartmouth College
Thursday May 4, 2017
Rocky 001, 5:00 PM

Dickie George

 

Espionage and Intelligence

Professor Dickie George
Johns Hopkins University
Thursday May 11, 2017
Rocky 001, 5:00 PM

Dan Wallach

A Nation Under Attack: Advanced Cyber-Attacks in Ukraine

Ukrainian Cybersecurity Researchers
Thursday April 6, 2017
Oopik Auditorium 5:30 PM

ISTS Information Pamphlet


2012BrochureCover

 

Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA
info.ists@dartmouth.edu
HomeEvents >

Past Speakers for 2014

Co-sponsored by Dartmouth College Information Technology Services and Dartmouth Center for the Advancement of Learning

Friday October 10 and Tuesday November 4, 2014
Adam Goldstein
Dartmouth College Information Technology Services
My Computer Ate My Data, Changed My Students' Grades and Stole My Money OR What all faculty need to know about securing their information

CyberSec Button 2014

Co-sponsored by the Trustworthy Health and Wellness project (thaw.org) 

Friday October 31, 2014
Jenna Wiens
The University of Michigan
Leveraging Data Across Time and Space to Build Predictive Models for Healthcare-Associated Infections

Jenna Weins

Co-sponsored by Dartmouth College Information Technology Services

July 15-16, 2014
Securing the eCampus 2014
A workshop on cyber security for higher education

 Nate Fick

Co-sponsored by the Computer Science Colloquium

Wednesday May 28, 2014 
Radu Sion
Stony Brook University and Private Machines Inc.
Computation Privacy and Regulatory Compliance Mechanisms for the Cloud

Radu Sion

Co-sponsored by the Dickey Center and the Computer Science Colloquium

Wednesday May 14, 2014 
John DeLong
National Security Agency
National Security Implications of "Big Data" Surveillance

John DeLong

Co-sponsored by the Computer Science Colloquium

Wednesday May 7, 2014
Daniel Weitzner
MIT
Privacy - Now What?

Daniel Weitzner

The Spring 2014 Donoho Colloquium co-sponsored by the Neukom Institute

Monday May 5, 2014
Peter Singer
Brookings Institution
Cybersecurity and CyberWar: What Everyone Needs to Know

Peter Singer

Co-sponsored by the Computer Science Colloquium

Wednesday April 9, 2014
Greg Morrisett
Harvard University
Trustworthy Hardened Code

Greg Morrisett

Co-sponsored by the Computer Science Colloquium

Wednesday April 2, 2014
Edward Felten
Princeton University
Technical Tradeoffs in the NSA's Mass Phone Call Data Program

Edward Felten

 

 

View Other Years: 2014 |2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003

Last Updated: 9/10/15