The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 76 to 100 of 916

Affiliation shown is the affiliation at the time the talk was given.

02/15/2023
Chinese Views of Information and Future Warfare

Chinese Views of Information and Future Warfare

Dean Cheng - Potomac Institute for Policy Studies

02/08/2023
Increasing Dependency; Increasing Threat

Increasing Dependency; Increasing Threat

Ronald Keen - DHS

02/01/2023
Securing Your Software Supply Chain

Securing Your Software Supply Chain

Jason Ortiz - Finite State

01/25/2023
Our Journey in Phishing Mitigation

Our Journey in Phishing Mitigation

Aurobindo Sundaram - RELX

01/18/2023
Problems and Challenges in Data Security Posture Management

Problems and Challenges in Data Security Posture Management

Mummoorthy Murugesan - Normalyze, Inc.

12/07/2022
Users Are Not Stupid: Six Cybersecurity Pitfalls Overturned

Users Are Not Stupid: Six Cybersecurity Pitfalls Overturned

Julie Haney - National Institute of Standards and Technologies

11/16/2022
Making Cybersecurity Reliable and Cybersecurity Careers Rewarding

Making Cybersecurity Reliable and Cybersecurity Careers Rewarding

Brian Barnier & Prachee Kale - Think.Design.Cyber

11/09/2022
Data, Privacy---and the Interactions Between Them

Data, Privacy---and the Interactions Between Them

Christine Task - Knexus Research Corporation

10/26/2022
Security and Privacy in the Cyber-physical World

Security and Privacy in the Cyber-physical World

Ning Zhang - Washington University in St. Louis

10/19/2022
On Using Differential Privacy

On Using Differential Privacy

Florian Kerschbaum - University of Waterloo

10/12/2022
Stop Selling Cybersecurity Short!: Cybersecurity as a Component of National Power

Stop Selling Cybersecurity Short!: Cybersecurity as a Component of National Power

David C. Benson - United States Air Force

10/05/2022
Ransomware and the Future of Cyberwarfare

Ransomware and the Future of Cyberwarfare

Maggie MacAlpine - MITRE Engenuity

09/28/2022
Adaptive Multi-Factor Authentication & Cyber Identity

Adaptive Multi-Factor Authentication & Cyber Identity

Dipankar Dasgupta - The University of Memphis

09/14/2022
Cyber Security in Aviation

Cyber Security in Aviation

James Huffaker - Boeing

09/07/2022
A Fake Image is Worth a Thousand Lies

A Fake Image is Worth a Thousand Lies

Cuihua (Cindy) Shen - UC Davis

08/31/2022
Moving Target Defense for Space Systems

Moving Target Defense for Space Systems

Chris Jenkins - Sandia

08/24/2022
IoT Device Security in a Zero Trust Environment

IoT Device Security in a Zero Trust Environment

Kevin Kornegay - Morgan State University

04/27/2022
Securing Connected Devices – Challenge and Opportunities

Securing Connected Devices – Challenge and Opportunities

Máire O'Neill - Queen's University Belfast

04/20/2022
Enabling a Practically Secure Mobile Networked System

Enabling a Practically Secure Mobile Networked System

Dr. Guan-Hua (Scott) Tu - Michigan State University

04/13/2022
Crowd Forecasting to Enhance Cybersecurity

Crowd Forecasting to Enhance Cybersecurity

Paul Rosenzweig - Red Branch Consulting

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!