Skip to main content

Home

 

Find us on

facebook youtube flickr twitter itunes u logo

Past Talks

Dr. Liz Bowman

Dr. Elizabeth Bowman
U.S. Army Research Laboratory
Artificial Intelligence, Machine Learning and Information: Army Social Computing Research
Tuesday, December 5th
Haldeman 041 Kreindler Conference Room
4:00 PM

Dr. Fabio Pierazzi

Dr. Fabio Pierazzi
Royal Holloway University of London
Network Security Analytics for Detection of Advanced Cyberattacks
Tuesday, November 28th
Sudikoff Trust Lab (L045)
12:30 PM

V.S. Subrahmanian

V.S. Subrahmanian
Dartmouth Distinguished Professor in Cybersecurity, Technology, and Society
Bots, Socks, and Vandals
Tuesday, November 14th
Carson L01
5:00 PM 

Rand Beers

Rand Beers ('64)
Big Data, the Internet, and Social Media:  The Road to the November 2016 Election
Wednesday, November 8th
Haldeman 41 (Kreindler Conference Hall)
4:30 PM 

Fright Night Imge

Wanna See Something REALLY Scary?
ISTS Looks at the Dark Web on Halloween Night
Tuesday, October 31st
S
udikoff  045 Trust Lab (dungeon)
7:30 PM - RSVP
Space is Limited 

Sal Stolfo

Salvatore J. Stolfo 
Columbia University
A Brief History of Symbiote Defense
Tuesday, October 31st
Rockefeller 003
5:00 PM

Dan Wallach

STAR-Vote: A Secure, Transparent, Auditable and Reliable Voting System

Professor Dan Wallach
Rice University
Thursday April 27, 2017
Carson L01, 5:00 PM

Ben Miller Dragos

Pandora's Power Grid - What Can State Attacks Do and What Would be the Impact?

Ben Miller
Chief Threat Officer, Dragos, Inc.
Tuesday May 2, 2017
Kemeny 007, 4:30 PM
Brendan Nyhan

 

 

 

Factual Echo Chambers? Fact-checking and Fake News in Election 2016.

Professor Brendan Nyhan
Dartmouth College
Thursday May 4, 2017
Rocky 001, 5:00 PM

Dickie George

 

Espionage and Intelligence

Professor Dickie George
Johns Hopkins University
Thursday May 11, 2017
Rocky 001, 5:00 PM

Dan Wallach

A Nation Under Attack: Advanced Cyber-Attacks in Ukraine

Ukrainian Cybersecurity Researchers
Thursday April 6, 2017
Oopik Auditorium 5:30 PM

ISTS Information Pamphlet


2012BrochureCover

 

Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA
info.ists@dartmouth.edu
HomeNewsroom >

Students Convene at Dartmouth for Cyber Security Bootcamp – SISMAT 2014

SISMAT 2014
SISMAT Class of 2014

Since 2008, ISTS has hosted the Secure Information Systems Mentoring and Training (SISMAT) program. Each summer, 16-18 undergraduate students spend an intense eleven days on the Dartmouth campus in what amounts to a cyber security boot camp, then go off to internships in industry, nonprofit organizations or academia. SISMAT targets regional and liberal arts colleges whose curricula will have prepared upper-level undergraduates for this hands-on cyber security work but cannot offer such a program themselves.

This past June marked the seventh summer of SISMAT at Dartmouth College. Fifteen students from colleges all across the US and Canada were joined by two international students from the American University of Kuwait, with which Dartmouth has a partnership program. SISMAT was led once again by former ISTS research fellow and current University of Calgary computer science professor Michael Locasto who was assisted by Dartmouth graduate student Pete Johnson. States Locasto, "SISMAT directly addresses the critical shortage of well-trained information security professionals in a way that standard college classes and most industry training courses can't. The SISMAT program recruits talented undergrads from liberal arts institutions and other small colleges who rarely have an opportunity to hone or even initially develop their cyber security skills." Indeed, SISMAT was a win for both Jason Swannack, a student at Eastern Washington University, and the cyber security industry. States Swannack, "It was easily one of the best experiences of my life and it helped me decide that I will be pursuing a career in computer security. I can't remember the last time I had that much fun being in class for that long!"SISMAT endorsements

Activities this summer ranged from labs involving assembly language programming, shell coding and packet crafting with Scapy (an interactive packet manipulation program) to "weird machines" (a computational artifact where additional code execution can occur outside the original specifictions of the program). Ethical computing and the daylong PacketWars information warfare simulation competition (packetwars.com) are also part of the program. As in previous years, the course was funded by a grant from the National Science Foundation and was completely free of charge to the students, including room and board. (With NSF funding no longer available, ISTS is seeking funding in order to run the program in 2015.)

Post-SISMAT, students go off to internships in industry, nonprofits or academia. This summer, three SISMAT students stayed local to intern with Dartmouth's Computing Services and one remained to work with the Collaboratory for Healthcare and Biomedical Informatics at The Geisel School of Medicine at Dartmouth. Others interned at companies such as Renesys, Nextmark, ADP, Tripwire and FAST Enterprises. SISMAT student Sam Daulton from Colgate University stated, "I am so glad to have participated in the SISMAT program last summer. It was a great introduction to computer security, and I acquired skills that have helped me tremendously in other computer science endeavors. Applying those skills to real projects during my internship at Dartmouth Technical Services was really cool."

SISMAT Wordle 2014

Last Updated: 1/5/15