Archive
2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Affiliation shown is the affiliation at the time the talk was given.
Invisible Signatures: Device Fingerprinting in a Connected World
Sandhya Aneja - Marist College
Enhancing Cybersecurity via Lessons Learned from the Evolution of Malware
Solomon Sonya - Purdue University
Multifactor Authentication - The Problem, Recommendations, and Future Concerns
William Malik - Malik Consulting
Tensor Decomposition Methods for Cybersecurity
Maksim Eren - Los Alamos National Laboratory
On Security Operations for AI Systems
Jonathan (Jono) Spring - Cybersecurity and Infrastructure Security Agency (CISA)
Stepping Through Cybersecurity Risk Management A Systems Thinking Approach
Jennifer Bayuk - Jennifer L. Bayuk, LLC
The Fault in Our Stars: How Reputation Systems Fail in Practice
Alejandro Cuevas - Carnegie Mellon University
The Importance of Security by Design & The Importance of Including Cybersecurity Experts in Your Business Decisions
Douglas Huelsbeck - DoD
Secure Sourcing of COTS Products: A Critical Missing Element in Software Engineering Education
Daniel Shoemaker - University of Detroit Mercy
In Pursuit of Silent Flaws: Dataflow Analysis for Bugfinding and Triage
Evan Sultanik - Trail of Bits
Defining Trusted Artificial Intelligence for the National Security Space
David Stracuzzi - Sandia National Laboratories
Privacy and Security in ML: A Priority, not an Afterthought
Shagufta Mehnaz - The Pennsylvania State University
AI's Security Maze: Navigating AI's Top Cybersecurity Risks Through Strategic Planning and Resilient Operations
David Haddad - Purdue University
Empowering the Next Generation of Digital Defenders: Ethics in Cybersecurity and Emerging Technologies
Chris Kubecka de Medina - HypaSec
IDART (Information Design Assurance Red Team): A Red Team Assessment Methodology
Russel Waymire - Sandia
Exploiting Vulnerabilities in AI-Enabled UAV: Attacks and Defense Mechanisms
Ashok Vardhan Raja - Purdue University Northwest
Shamrock Cyber – When Luck Just Isn't Enough
Chance Younkin - Pacific Northwest National Laboratory
Dissecting the Software Supply Chain of Modern Industrial Control Systems
Michail Maniatakos - NYU Abu Dhabi
The Road Towards Accurate, Scalable and Robust Graph-based Security Analytics: Where Are We Now?
Zhou Li - University of California, Irvine
HomeRun: High-efficiency Oblivious Message Retrieval, Unrestricted
Yanxue Jia - Purdue University
Fairness as Equal Concession: Critical Remarks on Fair AI
Christopher Yeomans - Purdue University
Ways to Watch
Watch Now!
Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!- Upcoming
- Past Seminars
- Previous Speakers
- Open Dates (Fall/Spring)
- Attending the Seminar
- About the Weekly Seminar
- CPE Credit Information (PDF)
- Join our Mailing List







