Archive
2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 176 to 200 of 940Affiliation shown is the affiliation at the time the talk was given.
Building Practical Security Systems for the Post-App Smart Home
Adwait Nadkarni - College of William and Mary
Security and Privacy for Humans
Lorrie Cranor - Carnegie Mellon University, CyLab
Maximizing Cyber Deception to Improve Security: An Empirical Analysis
Kimberly Ferguson-Walter - Laboratory for Advanced Cybersecurity Research, NSA Research
Improving the Accuracy of Blocklists by Aggregation and Address Reuse Detection
Sivaram Ramanathan - University of Southern California
Results from the Field: Cybersecurity in Nonprofits and Why it Matters
Kelley Misata - Sightline Security
NUTS: eNcrypted Userdata Transit & Storage; Viewing Data as an Endpoint™ (DaaE) using Structured Cryptography
Yoon Auh - NUTS Technologies
The Pod People Campaign: Driving User Traffic via Social Networks
Courtney Falk - GoDaddy
From Machine Learning Threats to Machine Learning Protection Requirements
Michael Clark - Riverside Research
Authentication: Behind The Scenes When You Click "Check Out"
Warda Zahid Khan - Mastercard
Dramatically Reducing Attack Surface Using Integrity MAC Security Kernel
Roger Schell - AESec Corporation
From Compliance in the Classroom to Compliance on the Street, Important Lessons That Every Cybersecurity Professional Must Know
Jeremiah Sahlberg - Tevora
Flexible and Adaptive Malware Identification Using Techniques from Biology
Elena Peterson - Pacific Northwest National Laboratory
Value of Cyber Threat Intelligence in Modern Security Operations
Shimon Modi - Elastic
The Ghost in the Machine: Reconciling AI and Trust in the Connected World
Sam Curry and Alon Kaufman - Cybereason / Duality Technologies
Cyber Security of Control Systems: The Second Coming of the Maginot Line
Joe Weiss - Applied Control Systems, LLC
Election Security in the Age of COVID-19: Risk Management in the face of a "Perfect Storm"
Jim Richberg - Fortinet
Using Machine Learning for Network Intrusion Detection
Nandi Leslie - Raytheon
A Principled Approach to Cybersecurity Engineering
Sami Saydjari - Cyber Defense Agency, Inc.
Ways to Watch
Watch Now!
Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!- Upcoming
- Past Seminars
- Previous Speakers
- Open Dates (Fall/Spring)
- Attending the Seminar
- About the Weekly Seminar
- CPE Credit Information (PDF)
- Join our Mailing List







