Skip to main content

Home

 

Find us on

facebook youtube flickr twitter itunes u logo

 

 

Upcoming Events

 

Dan Wallach

 

 

 

STAR-Vote: A Secure, Transparent, Auditable and Reliable Voting System

Professor Dan Wallach
Rice University
Thursday April 27, 2017
Kemeny 007, 4:30 PM


Robert Lee

 

 

 

Pandora's Power Grid - What Can State Attacks Do and What Would be the Impact?

Mr. Robert Lee, CEO
Dragos, Inc.
Tuesday May 2, 2017
Kemeny 007, 4:30 PM

Brendan Nyhan

 

 

 

Factual Echo Chambers? Fact-checking and Fake News in Election 2016.

Professor Brendan Nyhan
Dartmouth College
Thursday May 4, 2017
Rocky 001, 4:30 PM

Dickie George

 

 

 

Espionage and Intelligence

Professor Dickie George
Johns Hopkins University
Thursday May 11, 2017
Rocky 001, 4:30 PM

   
GenCyber Logo 

GenCyber 2017- ISTS - High School Summer Program at Dartmouth College

10 July - 14 July 2017 - 9am to 3pm (Exact times and dates to be confirmed once funding has been secured)

   
 ISTS logo

Securing the e-Campus 2017 - Pre-conference Workshops mid-July; Conference mid-July 2017.

(Exact time and dates to be confirmed)


Recent Talks

RIOTS logo 

Professor Sean Smith, Director of the ISTS and Bill Nisen, Associate Director, spoke at the

School House residential cluster on the Internet of Risky Things  - February 21, 2017, 5:30 PM

Craig Smith

 

 

 

You Don't Own Your Car
Craig Smith
OpenGarages
Tuesday May 10, 2016 
Carson L02 @4:15

David Safford

 

Hardware Based Security for GE's Industrial Control Systems
David Safford
GE Global Research
Tuesday May 17, 2016
Carson L02 @4:15

 

DanTentler

"It's Fine," They Said. "Just Ship It," They Said.
Dan Tentler
The Phobos Group
Tuesday April 12, 2016 
Carson L02 @4:15

Harold Thimbleby

 

 

 

The Best Way to Improve Healthcare is to Improve Computers
Harold Thimbleby
Swansea University
April 23, 2015

Craig Shue

 

 

 

Managing User-Level Compromises in Enterprise Network
Craig Shue
Worcester Polytechnic Institute
March 31, 2015

 

Newsletter 

Oct news 2015

 

ISTS Information Pamphlet


2012BrochureCover

 

Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA
info.ists@dartmouth.edu
HomeEvents > SISMAT >

Applying to SISMAT


sismat2016Application deadline: March 1, 2016.

We are seeking exceptionally motivated community college students with an interest in systems security and the real-world application of cryptology. 

Prerequisites

More specifically, a qualified student applicant:

  • Has completed the core systems curriculum at their institution, which will likely entail at least two programming classes, a discrete math class, and one or more "systems" courses (e.g., advanced programming, programming in the large, operating systems, databases, or networking). Equivalent technical experience will be considered in lieu of formal coursework.
  • Can commit to attending the two-week training course June 21-July 1, 2016.  Due to the intense, "boot camp" nature of the course, students are expected to live in residence at Dartmouth College and give the course their full attention for the duration of the program. Class will be held part of the day on the interim Saturday and Sunday will be a free day.  

Applications

To apply for the SISMAT 2016 program, candidates should submit the following information by March 1st.  Please submit the application form online and the rest via a single email to ISTS.  There may be a short interview via Skype or teleconference.  There are three parts to the application process that are the responsibility of the student.

  1. Complete the application form. Be sure to include the reference contact information for a technology faculty member in the appropriate field.
  2. Email: A copy of your transcript. You do not need to submit official transcripts.
  3. Email: A cover letter explaining in 2-3 paragraphs why you are interested in computer security.  

Please do NOT submit a hard copy of this information.

Attachment Formats

We ask applicants to submit letters and other attached materials in .pdf format. However, other formats (such as .rtf or .doc) are acceptable.

Last Updated: 11/19/15