The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Affiliation shown is the affiliation at the time the talk was given.

01/19/2022
Leading Trends and Emerging Technologies for Cybersecurity in 2022

Leading Trends and Emerging Technologies for Cybersecurity in 2022

Chuck Brooks - Georgetown University

01/26/2022
Critical Infrastructure Resilience Hinges on Cyber-Physical Convergence

Critical Infrastructure Resilience Hinges on Cyber-Physical Convergence

Dr. David Mussington - Cybersecurity and Infrastructure Security Agency (CISA)

02/02/2022
Threat Modeling in the World of DevOps

Threat Modeling in the World of DevOps

Alyssa Miller - S&P Global

02/09/2022
Robust Collective Cyber Power across Consolidated Democracies

Robust Collective Cyber Power across Consolidated Democracies

Dr. Chris C. Demchak - US Naval War College

02/23/2022
Cyber-Physical System Security of the Power Grid

Cyber-Physical System Security of the Power Grid

Chen-Ching Liu - Virginia Tech

03/09/2022
What You Don't Know About Hard Drives!

What You Don't Know About Hard Drives!

Andy Klein - Backblaze

03/23/2022
Challenges at the NIST National Cybersecurity Center of Excellence

Challenges at the NIST National Cybersecurity Center of Excellence

Bill Newhouse - National Institute of Standards and Technology (NIST)

03/30/2022
Now That We're in a Hybrid War…

Now That We're in a Hybrid War…

Richard Clarke

04/06/2022
Automated Function Boundary Detection in Stripped Binaries

Automated Function Boundary Detection in Stripped Binaries

Jim Alves-Foss - University of Idaho

04/13/2022
Crowd Forecasting to Enhance Cybersecurity

Crowd Forecasting to Enhance Cybersecurity

Paul Rosenzweig - Red Branch Consulting

04/20/2022
Enabling a Practically Secure Mobile Networked System

Enabling a Practically Secure Mobile Networked System

Dr. Guan-Hua (Scott) Tu - Michigan State University

04/27/2022
Securing Connected Devices – Challenge and Opportunities

Securing Connected Devices – Challenge and Opportunities

Máire O'Neill - Queen's University Belfast

08/24/2022
IoT Device Security in a Zero Trust Environment

IoT Device Security in a Zero Trust Environment

Kevin Kornegay - Morgan State University

08/31/2022
Moving Target Defense for Space Systems

Moving Target Defense for Space Systems

Chris Jenkins - Sandia

09/07/2022
A Fake Image is Worth a Thousand Lies

A Fake Image is Worth a Thousand Lies

Cuihua (Cindy) Shen - UC Davis

09/14/2022
Cyber Security in Aviation

Cyber Security in Aviation

James Huffaker - Boeing

09/28/2022
Adaptive Multi-Factor Authentication & Cyber Identity

Adaptive Multi-Factor Authentication & Cyber Identity

Dipankar Dasgupta - The University of Memphis

10/05/2022
Ransomware and the Future of Cyberwarfare

Ransomware and the Future of Cyberwarfare

Maggie MacAlpine - MITRE Engenuity

10/12/2022
Stop Selling Cybersecurity Short!: Cybersecurity as a Component of National Power

Stop Selling Cybersecurity Short!: Cybersecurity as a Component of National Power

David C. Benson - United States Air Force

10/19/2022
On Using Differential Privacy

On Using Differential Privacy

Florian Kerschbaum - University of Waterloo

10/26/2022
Security and Privacy in the Cyber-physical World

Security and Privacy in the Cyber-physical World

Ning Zhang - Washington University in St. Louis

11/09/2022
Data, Privacy---and the Interactions Between Them

Data, Privacy---and the Interactions Between Them

Christine Task - Knexus Research Corporation

11/16/2022
Making Cybersecurity Reliable and Cybersecurity Careers Rewarding

Making Cybersecurity Reliable and Cybersecurity Careers Rewarding

Brian Barnier & Prachee Kale - Think.Design.Cyber

12/07/2022
Users Are Not Stupid: Six Cybersecurity Pitfalls Overturned

Users Are Not Stupid: Six Cybersecurity Pitfalls Overturned

Julie Haney - National Institute of Standards and Technologies

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!