Search for tag: "cybersecurity lecture series"

Peter Swire - The Growing Importance of the Non-Code Aspects of Cybersecurity

According to the National Initiative for Cybersecurity Education, half of the cybersecurity specialties now involve primarily non-code work. This lecture draws on the "Pedagogic Cybersecurity…

From  Kathryn Gentilello on October 15th, 2019 4 plays 0  

Ambrose Kam - Simulation-Based Cyber Wargaming

Cyber threats are rampant and their potential damages to enterprises continue to soar over time. Hence, cyber resilience techniques need to be examined and assessed for their effectiveness before…

From  Kathryn Gentilello on October 14th, 2019 5 plays 0  

Adam Bates - Can Data Provenance Put an End to the Data Breach?

In a provenance-aware system, mechanisms gather and report metadata that describes the history of each data object being processed, allowing us to understand how objects came to exist in their…

From  Kathryn Gentilello on October 11th, 2019 5 plays 0  

Margaret Loper - Trusting Smart Cities: Risk Factors and Implications

In the coming decades, we will live in a world surrounded by tens of billions of devices that will interoperate and collaborate in an effort to deliver personalized and autonomic services. This…

From  Kathryn Gentilello on September 19th, 2019 14 plays 0  

David Heath - Efficiently Computing with Private Data

Today, individual users and organizations often wish to contribute their private data to compute functions of interest. Unfortunately, when data is deemed too valuable or is legally protected, such…

From  Kathryn Gentilello on September 9th, 2019 31 plays 0  

Sakis Meliopoulos - Energy System Cyber Security: An Overview

The electric energy grid is a recognized critical infrastructure. It is vulnerable to self-disturbances as well as cyber-attacks. In particular cyber-attacks can cause from mild disruptions to…

From  Kathryn Gentilello on September 3rd, 2019 6 plays 0  

Simson L. Garfinkel - Attacking and Protecting Public Data with Differential Privacy

Publishing exact statistical data creates mathematical risks and vulnerabilities that have only recently been appreciated. In 2010, the U.S. Census Bureau collected information on more than 308…

From  Kathryn Gentilello on May 9th, 2019 41 plays 0  

Tohid Shekari - RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid

Recently, the number of cyber threats to power systems has increased at an unprecedented rate. For instance, the widespread blackout in Ukrainian power grid on December 2015 was a wakeup call that…

From  Kathryn Gentilello on May 1st, 2019 15 plays 0  

Terry Nelms - Caller Authentication Using Mobile Devices

Verifying the identity claim of a caller is challenging to both enterprises and individuals. Blindly trusting the caller is not an option; however, building trust is difficult because the…

From  Kathryn Gentilello on April 23rd, 2019 5 plays 0  

Shang-Tse Chen - AI-infused Security: Robust Defense by Bridging Theory and Practice

While Artificial Intelligence (AI) has tremendous potential as a defense against real-world cybersecurity threats, understanding the capabilities and robustness of AI remains a fundamental challenge,…

From  Kathryn Gentilello on April 15th, 2019 26 plays 0  

Ron Gula - Grand Cyber Questions and How They Impact Cyber Start-ups

Ron Gula will discuss some of the harder questions in cyber we've not come to terms with such as quantifying cyber risk and the government's responsibility for keeping us "cyber…

From  Kathryn Gentilello on April 2nd, 2019 16 plays 0  

Hanjun Dai - Adversarial Attack on Graph-Structured Data

Deep learning on graph structures has shown exciting results in cybersecurity applications, such as risk management, binary code similarity detection, etc. However, few attentions have been paid to…

From  Kathryn Gentilello on April 1st, 2019 33 plays 0  

Shelby Allen - A Tale of Two Tasks: Designing and Validating Secure Software

Secure software development can be categorized into two major tasks: designing secure software and validating secure software. In this talk, we will review both categories as well as some resources…

From  Kathryn Gentilello on March 13th, 2019 23 plays 0  

Michael Brown - Improving Security Through Software Debloating

As software security breaches continue to increase in frequency and sophistication, there has been an increase in the research and development of new methods for improving software security. One such…

From  Kathryn Gentilello on March 11th, 2019 23 plays 0  

Matice Wright - From the cockpit to cybersecurity: A cyber perspective from the nations first African-American Female Naval Flight Officer

Cybersecurity is essential for national security. Ms. Wright is a national security executive at ManTech International Corporation. ManTech is a trusted partner and leading systems integrator for the…

From  Kathryn Gentilello on February 26th, 2019 97 plays 0  

Rob Krug - Defending Organizations in a Fast-Moving Cyber Arms Race

This presentation will provide an in-depth analysis of the latest trends, tactics, and news of the cyber threat landscape as seen from the eyes of a practicing security architect. Providing more than…

From  Kathryn Gentilello on February 14th, 2019 28 plays 0