Latest COVID-19 Information for Purdue University

The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 1 to 25 of 845

Affiliation shown is the affiliation at the time the talk was given.

02/01/2023

Securing Your Software Supply Chain

Jason Ortiz - Finite State

01/25/2023
Our Journey in Phishing Mitigation

Our Journey in Phishing Mitigation

Aurobindo Sundaram - RELX

01/18/2023
Problems and Challenges in Data Security Posture Management

Problems and Challenges in Data Security Posture Management

Mummoorthy Murugesan - Normalyze, Inc.

12/07/2022
Users Are Not Stupid: Six Cybersecurity Pitfalls Overturned

Users Are Not Stupid: Six Cybersecurity Pitfalls Overturned

Julie Haney - National Institute of Standards and Technologies

11/16/2022
Making Cybersecurity Reliable and Cybersecurity Careers Rewarding

Making Cybersecurity Reliable and Cybersecurity Careers Rewarding

Brian Barnier & Prachee Kale - Think.Design.Cyber

11/09/2022
Data, Privacy---and the Interactions Between Them

Data, Privacy---and the Interactions Between Them

Christine Task - Knexus Research Corporation

10/26/2022
Security and Privacy in the Cyber-physical World

Security and Privacy in the Cyber-physical World

Ning Zhang - Washington University in St. Louis

10/19/2022
On Using Differential Privacy

On Using Differential Privacy

Florian Kerschbaum - University of Waterloo

10/12/2022
Stop Selling Cybersecurity Short!: Cybersecurity as a Component of National Power

Stop Selling Cybersecurity Short!: Cybersecurity as a Component of National Power

David C. Benson - United States Air Force

10/05/2022
Ransomware and the Future of Cyberwarfare

Ransomware and the Future of Cyberwarfare

Maggie MacAlpine - MITRE Engenuity

09/28/2022
Adaptive Multi-Factor Authentication & Cyber Identity

Adaptive Multi-Factor Authentication & Cyber Identity

Dipankar Dasgupta - The University of Memphis

09/14/2022
Cyber Security in Aviation

Cyber Security in Aviation

James Huffaker - Boeing

09/07/2022
A Fake Image is Worth a Thousand Lies

A Fake Image is Worth a Thousand Lies

Cuihua (Cindy) Shen - UC Davis

08/31/2022
Moving Target Defense for Space Systems

Moving Target Defense for Space Systems

Chris Jenkins - Sandia

08/24/2022
IoT Device Security in a Zero Trust Environment

IoT Device Security in a Zero Trust Environment

Kevin Kornegay - Morgan State University

04/27/2022
Securing Connected Devices – Challenge and Opportunities

Securing Connected Devices – Challenge and Opportunities

Máire O'Neill - Queen's University Belfast

04/20/2022
Enabling a Practically Secure Mobile Networked System

Enabling a Practically Secure Mobile Networked System

Dr. Guan-Hua (Scott) Tu - Michigan State University

04/13/2022
Crowd Forecasting to Enhance Cybersecurity

Crowd Forecasting to Enhance Cybersecurity

Paul Rosenzweig - Red Branch Consulting

04/06/2022
Automated Function Boundary Detection in Stripped Binaries

Automated Function Boundary Detection in Stripped Binaries

Jim Alves-Foss - University of Idaho

03/30/2022
Now That We’re in a Hybrid War…

Now That We’re in a Hybrid War…

Richard Clarke

03/23/2022
Challenges at the NIST National Cybersecurity Center of Excellence

Challenges at the NIST National Cybersecurity Center of Excellence

Bill Newhouse - National Institute of Standards and Technology (NIST)

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!