The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 251 to 275 of 940

Affiliation shown is the affiliation at the time the talk was given.

Episode #675
10/24/2018
80/20 Rule-Cyber Hygiene

80/20 Rule-Cyber Hygiene

Mark Loepker - SANMARK

Episode #674
10/17/2018
Applied Cyber and Mobile Security Consulting

Applied Cyber and Mobile Security Consulting

Ryan Goldsberry - Deloitte

Episode #672
09/26/2018
Kernel-Supported Cost-Effective Audit Logging for Causality Tracking

Kernel-Supported Cost-Effective Audit Logging for Causality Tracking

Shiqing Ma - Purdue University

Episode #671
09/19/2018
What's Private: Exploring Reasonable Expectation of Privacy in the Age of Modern Innovation

What's Private: Exploring Reasonable Expectation of Privacy in the Age of Modern Innovation

Jillean Long Battle - Rofori Corporation

Episode #670
09/12/2018

Security in All Aspects of Design

Jim Gordon - Intel

Episode #669
09/05/2018
Breaching Water Treatment Plants: Lessons Learned from Complex Exercises

Breaching Water Treatment Plants: Lessons Learned from Complex Exercises

Doug Rapp - Rofori Corporation

Episode #668
08/29/2018
Hacking Your Security Career: Strategies That College Did Not Teach Me

Hacking Your Security Career: Strategies That College Did Not Teach Me

Ryan Elkins - Eli Lilly

Episode #667
08/22/2018
Protecting Bare-metal Embedded Systems from Memory Corruption Attacks

Protecting Bare-metal Embedded Systems from Memory Corruption Attacks

Abe Clements - Purdue University

Episode #666
04/25/2018
DoD Cyber Requirements and Directives

DoD Cyber Requirements and Directives

Cristina Ledezma - Raytheon

Episode #665
04/18/2018
Personally Identifiable Data and the Specter of Customer Privacy

Personally Identifiable Data and the Specter of Customer Privacy

Leon Ravenna - KAR Auction Services, Inc.

Episode #664
04/11/2018
Anonymity Trilemma : Strong Anonymity, Low Bandwidth Overhead, Low Latency – Choose Two.

Anonymity Trilemma : Strong Anonymity, Low Bandwidth Overhead, Low Latency – Choose Two.

Debajyoti Das - Purdue University

Episode #661
03/21/2018
Mind Your Credit: Assessing the Health of the Ripple Credit Network

Mind Your Credit: Assessing the Health of the Ripple Credit Network

Pedro Moreno-Sanchez - Purdue University

Episode #660
03/07/2018
CFIXX -- Object Type Integrity for C++

CFIXX -- Object Type Integrity for C++

Nathan Burrow - Purdue University

Episode #659
02/28/2018
Threats and Risks in Cryptocurrencies

Threats and Risks in Cryptocurrencies

Courtney Falk - Optiv

Episode #658
02/21/2018
Lessons Learned From the Retrocomputing Community

Lessons Learned From the Retrocomputing Community

Mitchell Parker - IU Health

Episode #657
02/14/2018
OBLIVIATE: A Data Oblivious File System for Intel SGX

OBLIVIATE: A Data Oblivious File System for Intel SGX

Adil Ahmad - Purdue University

Episode #656
02/07/2018
Eli Lilly's Path to a Successful Threat Intelligence Program

Eli Lilly's Path to a Successful Threat Intelligence Program

Brian Lynch - Eli Lilly

Episode #655
01/31/2018
State of Cybersecurity in Healthcare

State of Cybersecurity in Healthcare

Matt Dimino - Eskenazi Health

Episode #654
01/24/2018
What Roles Can Empirical Research Play to Advance Software Security Knowledge?

What Roles Can Empirical Research Play to Advance Software Security Knowledge?

Lotfi ben-Othmane - Iowa State University

Episode #653
01/17/2018
The Economics of Offline Password Cracking

The Economics of Offline Password Cracking

Ben Harsha - Purdue University

Episode #652
12/06/2017
Penetration Testing: What? Why? How?

Penetration Testing: What? Why? How?

Nat Shere - Rook Security

Episode #651
11/29/2017
Securing the Future of Business: Broadening the Role of Security Technology

Securing the Future of Business: Broadening the Role of Security Technology

Kirsten Bay - Cyber adAPT

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!