Cover image of CERIAS Weekly Security Seminar - Purdue University

CERIAS Weekly Security Seminar - Purdue University

CERIAS -- the Nation's top-ranked interdisciplinary academic education and research institute -- hosts a weekly cyber security, privacy, resiliency or autonomy speaker, highlighting technical discover... Read more

Ranked #1

Podcast cover

Anupam Joshi, Context Aware, Policy based approaches to Security

Anupam Joshi, Context Aware, Policy based approaches to Security

Traditional approaches to securing systems tend to be fixed and mostly non adaptive. The Policy that defines the securit... Read more

2 Mar 2016

56mins

Ranked #2

Podcast cover

Jerome Edge, Applying commercial best practices to DoD risk management to offer suggestions how to move from risk avoidance to cost effective risk management

Jerome Edge, Applying commercial best practices to DoD risk management to offer suggestions how to move from risk avoidance to cost effective risk management

The Department of Defense has mandated a risk management rather than risk avoidance approach in Cybersecurity. All Depar... Read more

25 Oct 2017

48mins

Ranked #3

Podcast cover

Andrew Rozema, 'Networking' Skills for Cybersecurity

Andrew Rozema, 'Networking' Skills for Cybersecurity

Sure, you may know how to subnet a class "C" network into 64 different networks, but how about where to go to learn abou... Read more

16 Oct 2019

46mins

Ranked #4

Podcast cover

Char Sample, The Role of Culture in Cybersecurity

Char Sample, The Role of Culture in Cybersecurity

Distinguished social psychologist Geert Hofstede observed the "dominance of technology over culture is an illusion. The ... Read more

12 Feb 2020

54mins

Most Popular Podcasts

Ranked #5

Podcast cover

James Cole, Securing the Internet of Things

James Cole, Securing the Internet of Things

The Internet of Things (IOT) is a potential massive market. However, the deployment of IOT brings forth many challenges... Read more

6 Nov 2019

46mins

Ranked #6

Podcast cover

Corey Holzer, The Application of Natural Language Processing to Open Source Intelligence for Ontology Development in the Advanced Persistent Threat Domain

Corey Holzer, The Application of Natural Language Processing to Open Source Intelligence for Ontology Development in the Advanced Persistent Threat Domain

Over the past decade, the Advanced Persistent Threat (APT) has risen to forefront of cybersecurity threats. APTs are a m... Read more

16 Nov 2016

36mins

Ranked #7

Podcast cover

Nick Sturgeon, Emerging Cyber Threats

Nick Sturgeon, Emerging Cyber Threats

Cybersecurity threats are constantly evolving and becoming more sophisticated. This has been observed through advanced s... Read more

18 Jan 2017

1hr 1min

Ranked #8

Podcast cover

Aritra Mitra, A New Approach to Distributed Hypothesis Testing and Non-Bayesian Learning: Improved Learning Rate and Byzantine Resilience

Aritra Mitra, A New Approach to Distributed Hypothesis Testing and Non-Bayesian Learning: Improved Learning Rate and Byzantine Resilience

Consider a scenario where a group of agents, each receiving partially informative private signals, aim to learn the true... Read more

11 Sep 2019

53mins

Ranked #9

Podcast cover

Ron Ross, Pushing Computers to the Edge: Next Generation Security and Privacy Controls for Systems and IoT Devices

Ron Ross, Pushing Computers to the Edge: Next Generation Security and Privacy Controls for Systems and IoT Devices

As we push computers to "the edge" building an increasingly complex world of interconnected systems and devices, securit... Read more

19 Apr 2017

1hr 5mins

Ranked #10

Podcast cover

Lotfi ben-Othmane, What Roles Can Empirical Research Play to Advance Software Security Knowledge?

Lotfi ben-Othmane, What Roles Can Empirical Research Play to Advance Software Security Knowledge?

Software is an essential component to the operation of business information systems, cyber physical systems, and various... Read more

24 Jan 2018

57mins

Ranked #11

Podcast cover

Sriharsha Etigowni, Contactless Control Flow Monitoring via Electromagnetic Emanations

Sriharsha Etigowni, Contactless Control Flow Monitoring via Electromagnetic Emanations

Trustworthy operation of industrial control systems depends on secure and real-time code execution on the embedded progr... Read more

15 Jan 2020

35mins

Ranked #12

Podcast cover

Lauren Featherstun, Shivam Trivedi, Brian Werts, Erik Gough, The Purdue Live Security Analyzer (PULSAR)

Lauren Featherstun, Shivam Trivedi, Brian Werts, Erik Gough, The Purdue Live Security Analyzer (PULSAR)

As more disciplines leverage computational and data-driven modeling, the security of campus cyberinfrastructure is becom... Read more

Ranked #13

Podcast cover

Aniket Kate, The Internet of Value: Privacy and Applications

Aniket Kate, The Internet of Value: Privacy and Applications

Over the last seven years we have been observing a tremendous growth of crypto-currencies such as Bitcoin and IOU credit... Read more

21 Sep 2016

58mins

Ranked #14

Podcast cover

Krishna Kavi, Hardware Cybersecurity Attacks and Some Solutions

Krishna Kavi, Hardware Cybersecurity Attacks and Some Solutions

Recent reports on how side-channel attacks can be used to obtain secret information stored in Cache memories and how cur... Read more

3 Apr 2019

52mins

Ranked #15

Podcast cover

Chris Clifton, A Data Privacy Primer

Chris Clifton, A Data Privacy Primer

One of the reasons we care about information security is protectingprivacy, and satisfying requirements of privacy law. ... Read more

16 Jan 2019

49mins

Ranked #16

Podcast cover

Tawei (David) Wang, CIO Risk Appetite and Information Security Management

Tawei (David) Wang, CIO Risk Appetite and Information Security Management

After a series of recent high profile information security breach incidents, the role of Chief Information Officers, par... Read more

22 Mar 2017

49mins

Ranked #17

Podcast cover

Mitch Parker, Bitcoin and other dreams of utopian thinking-what happens when they meet reality?

Mitch Parker, Bitcoin and other dreams of utopian thinking-what happens when they meet reality?

Cryptocurrencies are the latest in a series of market bubbles that demonstrate irrational exuberance. In this lecture, ... Read more

30 Oct 2019

48mins

Ranked #18

Podcast cover

Robert Mundt, Protecting your online Identity in a world of modern application architecture

Robert Mundt, Protecting your online Identity in a world of modern application architecture

Learn about common attacks against online accounts, ways to protect your accounts against malicious actors, and the next... Read more

17 Apr 2019

40mins

Ranked #19

Podcast cover

Matt Dimino, State of Cybersecurity in Healthcare

Matt Dimino, State of Cybersecurity in Healthcare

The public health sector cannot deliver efficient and safe patient care without digital interconnectivity among devices.... Read more

31 Jan 2018

1hr 7mins

Ranked #20

Podcast cover

Yuhong Nan, Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps

Yuhong Nan, Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps

A long-standing challenge in analyzing information leaks within mobile apps is to automatically identify the codeoperati... Read more

26 Feb 2020

33mins

“Podium: AI tools for podcasters. Generate show notes, transcripts, highlight clips, and more with AI. Try it today at https://podium.page”