The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 101 to 125 of 940

Affiliation shown is the affiliation at the time the talk was given.

Episode #822
02/15/2023
Chinese Views of Information and Future Warfare

Chinese Views of Information and Future Warfare

Dean Cheng - Potomac Institute for Policy Studies

Episode #821
02/08/2023
Increasing Dependency; Increasing Threat

Increasing Dependency; Increasing Threat

Ronald Keen - DHS

Episode #820
02/01/2023
Securing Your Software Supply Chain

Securing Your Software Supply Chain

Jason Ortiz - Finite State

Episode #819
01/25/2023
Our Journey in Phishing Mitigation

Our Journey in Phishing Mitigation

Aurobindo Sundaram - RELX

Episode #818
01/18/2023
Problems and Challenges in Data Security Posture Management

Problems and Challenges in Data Security Posture Management

Mummoorthy Murugesan - Normalyze, Inc.

Episode #817
01/11/2023
Applying Multi-Agent Reinforcement Learning (MARL) in a Cyber Wargame Engine

Applying Multi-Agent Reinforcement Learning (MARL) in a Cyber Wargame Engine

Ambrose Kam - Lockheed Martin

Episode #816
12/07/2022
Users Are Not Stupid: Six Cybersecurity Pitfalls Overturned

Users Are Not Stupid: Six Cybersecurity Pitfalls Overturned

Julie Haney - National Institute of Standards and Technologies

Episode #815
11/30/2022
Fast and Reliable Formal Verification of Smart Contracts with the Move Prover

Fast and Reliable Formal Verification of Smart Contracts with the Move Prover

Meng Xu - University of Waterloo

Episode #814
11/16/2022
Making Cybersecurity Reliable and Cybersecurity Careers Rewarding

Making Cybersecurity Reliable and Cybersecurity Careers Rewarding

Brian Barnier & Prachee Kale - Think.Design.Cyber

Episode #813
11/09/2022
Data, Privacy---and the Interactions Between Them

Data, Privacy---and the Interactions Between Them

Christine Task - Knexus Research Corporation

Episode #812
11/02/2022

Program Maturity - Cybersecurity and Operational Risk Management

Gideon Rasmussen

Episode #811
10/26/2022
Security and Privacy in the Cyber-physical World

Security and Privacy in the Cyber-physical World

Ning Zhang - Washington University in St. Louis

Episode #810
10/19/2022
On Using Differential Privacy

On Using Differential Privacy

Florian Kerschbaum - University of Waterloo

Episode #809
10/12/2022
Stop Selling Cybersecurity Short!: Cybersecurity as a Component of National Power

Stop Selling Cybersecurity Short!: Cybersecurity as a Component of National Power

David C. Benson - United States Air Force

Episode #808
10/05/2022
Ransomware and the Future of Cyberwarfare

Ransomware and the Future of Cyberwarfare

Maggie MacAlpine - MITRE Engenuity

Episode #807
09/28/2022
Adaptive Multi-Factor Authentication & Cyber Identity

Adaptive Multi-Factor Authentication & Cyber Identity

Dipankar Dasgupta - The University of Memphis

Episode #805
09/14/2022
Cyber Security in Aviation

Cyber Security in Aviation

James Huffaker - Boeing

Episode #804
09/07/2022
A Fake Image is Worth a Thousand Lies

A Fake Image is Worth a Thousand Lies

Cuihua (Cindy) Shen - UC Davis

Episode #803
08/31/2022
Moving Target Defense for Space Systems

Moving Target Defense for Space Systems

Chris Jenkins - Sandia

Episode #802
08/24/2022
IoT Device Security in a Zero Trust Environment

IoT Device Security in a Zero Trust Environment

Kevin Kornegay - Morgan State University

Episode #801
04/27/2022
Securing Connected Devices – Challenge and Opportunities

Securing Connected Devices – Challenge and Opportunities

Máire O'Neill - Queen's University Belfast

Episode #800
04/20/2022
Enabling a Practically Secure Mobile Networked System

Enabling a Practically Secure Mobile Networked System

Dr. Guan-Hua (Scott) Tu - Michigan State University

Episode #799
04/13/2022
Crowd Forecasting to Enhance Cybersecurity

Crowd Forecasting to Enhance Cybersecurity

Paul Rosenzweig - Red Branch Consulting

Episode #798
04/06/2022
Automated Function Boundary Detection in Stripped Binaries

Automated Function Boundary Detection in Stripped Binaries

Jim Alves-Foss - University of Idaho

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!