Skip to main content



Find us on

facebook youtube flickr twitter itunes u logo

Upcoming Events

 V.S. Subrahmanian

V.S. Subrahmanian
Dartmouth Distinguished Professor in Cybersecurity, Technology, and Society
Bots, Socks, and Vandals
Tuesday, November 14th
Carson L01
5:00 PM 

Past Talks

Rand Beers

Rand Beers ('64)
Big Data, the Internet, and Social Media:  The Road to the November 2016 Election
Wednesday, November 8th
Haldeman 41 (Kreindler Conference Hall)
4:30 PM 

Fright Night Imge

Wanna See Something REALLY Scary?
ISTS Looks at the Dark Web on Halloween Night
Tuesday, October 31st
udikoff  045 Trust Lab (dungeon)
7:30 PM - RSVP
Space is Limited 

Sal Stolfo

Salvatore J. Stolfo 
Columbia University
A Brief History of Symbiote Defense
Tuesday, October 31st
Rockefeller 003
5:00 PM

Dan Wallach

STAR-Vote: A Secure, Transparent, Auditable and Reliable Voting System

Professor Dan Wallach
Rice University
Thursday April 27, 2017
Carson L01, 5:00 PM

Ben Miller Dragos

Pandora's Power Grid - What Can State Attacks Do and What Would be the Impact?

Ben Miller
Chief Threat Officer, Dragos, Inc.
Tuesday May 2, 2017
Kemeny 007, 4:30 PM
Brendan Nyhan




Factual Echo Chambers? Fact-checking and Fake News in Election 2016.

Professor Brendan Nyhan
Dartmouth College
Thursday May 4, 2017
Rocky 001, 5:00 PM

Dickie George


Espionage and Intelligence

Professor Dickie George
Johns Hopkins University
Thursday May 11, 2017
Rocky 001, 5:00 PM

Dan Wallach

A Nation Under Attack: Advanced Cyber-Attacks in Ukraine

Ukrainian Cybersecurity Researchers
Thursday April 6, 2017
Oopik Auditorium 5:30 PM

ISTS Information Pamphlet



Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA
HomeEvents >

Past Speakers for 2014

Co-sponsored by Dartmouth College Information Technology Services and Dartmouth Center for the Advancement of Learning

Friday October 10 and Tuesday November 4, 2014
Adam Goldstein
Dartmouth College Information Technology Services
My Computer Ate My Data, Changed My Students' Grades and Stole My Money OR What all faculty need to know about securing their information

CyberSec Button 2014

Co-sponsored by the Trustworthy Health and Wellness project ( 

Friday October 31, 2014
Jenna Wiens
The University of Michigan
Leveraging Data Across Time and Space to Build Predictive Models for Healthcare-Associated Infections

Jenna Weins

Co-sponsored by Dartmouth College Information Technology Services

July 15-16, 2014
Securing the eCampus 2014
A workshop on cyber security for higher education

 Nate Fick

Co-sponsored by the Computer Science Colloquium

Wednesday May 28, 2014 
Radu Sion
Stony Brook University and Private Machines Inc.
Computation Privacy and Regulatory Compliance Mechanisms for the Cloud

Radu Sion

Co-sponsored by the Dickey Center and the Computer Science Colloquium

Wednesday May 14, 2014 
John DeLong
National Security Agency
National Security Implications of "Big Data" Surveillance

John DeLong

Co-sponsored by the Computer Science Colloquium

Wednesday May 7, 2014
Daniel Weitzner
Privacy - Now What?

Daniel Weitzner

The Spring 2014 Donoho Colloquium co-sponsored by the Neukom Institute

Monday May 5, 2014
Peter Singer
Brookings Institution
Cybersecurity and CyberWar: What Everyone Needs to Know

Peter Singer

Co-sponsored by the Computer Science Colloquium

Wednesday April 9, 2014
Greg Morrisett
Harvard University
Trustworthy Hardened Code

Greg Morrisett

Co-sponsored by the Computer Science Colloquium

Wednesday April 2, 2014
Edward Felten
Princeton University
Technical Tradeoffs in the NSA's Mass Phone Call Data Program

Edward Felten



View Other Years: 2014 |2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003

Last Updated: 9/10/15