Ranked #1
Anupam Joshi, Context Aware, Policy based approaches to Security
Anupam Joshi, Context Aware, Policy based approaches to Security
Traditional approaches to securing systems tend to be fixed and mostly non adaptive. The Policy that defines the securit... Read more
2 Mar 2016
•
56mins
Ranked #2
Jerome Edge, Applying commercial best practices to DoD risk management to offer suggestions how to move from risk avoidance to cost effective risk management
Jerome Edge, Applying commercial best practices to DoD risk management to offer suggestions how to move from risk avoidance to cost effective risk management
The Department of Defense has mandated a risk management rather than risk avoidance approach in Cybersecurity. All Depar... Read more
25 Oct 2017
•
48mins
Ranked #3
Andrew Rozema, 'Networking' Skills for Cybersecurity
Andrew Rozema, 'Networking' Skills for Cybersecurity
Sure, you may know how to subnet a class "C" network into 64 different networks, but how about where to go to learn abou... Read more
16 Oct 2019
•
46mins
Ranked #4
Char Sample, The Role of Culture in Cybersecurity
Char Sample, The Role of Culture in Cybersecurity
Distinguished social psychologist Geert Hofstede observed the "dominance of technology over culture is an illusion. The ... Read more
12 Feb 2020
•
54mins
Ranked #5
James Cole, Securing the Internet of Things
James Cole, Securing the Internet of Things
The Internet of Things (IOT) is a potential massive market. However, the deployment of IOT brings forth many challenges... Read more
6 Nov 2019
•
46mins
Ranked #6
Corey Holzer, The Application of Natural Language Processing to Open Source Intelligence for Ontology Development in the Advanced Persistent Threat Domain
Corey Holzer, The Application of Natural Language Processing to Open Source Intelligence for Ontology Development in the Advanced Persistent Threat Domain
Over the past decade, the Advanced Persistent Threat (APT) has risen to forefront of cybersecurity threats. APTs are a m... Read more
16 Nov 2016
•
36mins
Ranked #7
Nick Sturgeon, Emerging Cyber Threats
Nick Sturgeon, Emerging Cyber Threats
Cybersecurity threats are constantly evolving and becoming more sophisticated. This has been observed through advanced s... Read more
18 Jan 2017
•
1hr 1min
Ranked #8
Aritra Mitra, A New Approach to Distributed Hypothesis Testing and Non-Bayesian Learning: Improved Learning Rate and Byzantine Resilience
Aritra Mitra, A New Approach to Distributed Hypothesis Testing and Non-Bayesian Learning: Improved Learning Rate and Byzantine Resilience
Consider a scenario where a group of agents, each receiving partially informative private signals, aim to learn the true... Read more
11 Sep 2019
•
53mins
Ranked #9
Ron Ross, Pushing Computers to the Edge: Next Generation Security and Privacy Controls for Systems and IoT Devices
Ron Ross, Pushing Computers to the Edge: Next Generation Security and Privacy Controls for Systems and IoT Devices
As we push computers to "the edge" building an increasingly complex world of interconnected systems and devices, securit... Read more
19 Apr 2017
•
1hr 5mins
Ranked #10
Lotfi ben-Othmane, What Roles Can Empirical Research Play to Advance Software Security Knowledge?
Lotfi ben-Othmane, What Roles Can Empirical Research Play to Advance Software Security Knowledge?
Software is an essential component to the operation of business information systems, cyber physical systems, and various... Read more
24 Jan 2018
•
57mins
Ranked #11
Sriharsha Etigowni, Contactless Control Flow Monitoring via Electromagnetic Emanations
Sriharsha Etigowni, Contactless Control Flow Monitoring via Electromagnetic Emanations
Trustworthy operation of industrial control systems depends on secure and real-time code execution on the embedded progr... Read more
15 Jan 2020
•
35mins
Ranked #12
Lauren Featherstun, Shivam Trivedi, Brian Werts, Erik Gough, The Purdue Live Security Analyzer (PULSAR)
Lauren Featherstun, Shivam Trivedi, Brian Werts, Erik Gough, The Purdue Live Security Analyzer (PULSAR)
As more disciplines leverage computational and data-driven modeling, the security of campus cyberinfrastructure is becom... Read more
24 Apr 2019
•
43mins
Ranked #13
Aniket Kate, The Internet of Value: Privacy and Applications
Aniket Kate, The Internet of Value: Privacy and Applications
Over the last seven years we have been observing a tremendous growth of crypto-currencies such as Bitcoin and IOU credit... Read more
21 Sep 2016
•
58mins
Ranked #14
Krishna Kavi, Hardware Cybersecurity Attacks and Some Solutions
Krishna Kavi, Hardware Cybersecurity Attacks and Some Solutions
Recent reports on how side-channel attacks can be used to obtain secret information stored in Cache memories and how cur... Read more
3 Apr 2019
•
52mins
Ranked #15
Chris Clifton, A Data Privacy Primer
Chris Clifton, A Data Privacy Primer
One of the reasons we care about information security is protectingprivacy, and satisfying requirements of privacy law. ... Read more
16 Jan 2019
•
49mins
Ranked #16
Tawei (David) Wang, CIO Risk Appetite and Information Security Management
Tawei (David) Wang, CIO Risk Appetite and Information Security Management
After a series of recent high profile information security breach incidents, the role of Chief Information Officers, par... Read more
22 Mar 2017
•
49mins
Ranked #17
Mitch Parker, Bitcoin and other dreams of utopian thinking-what happens when they meet reality?
Mitch Parker, Bitcoin and other dreams of utopian thinking-what happens when they meet reality?
Cryptocurrencies are the latest in a series of market bubbles that demonstrate irrational exuberance. In this lecture, ... Read more
30 Oct 2019
•
48mins
Ranked #18
Robert Mundt, Protecting your online Identity in a world of modern application architecture
Robert Mundt, Protecting your online Identity in a world of modern application architecture
Learn about common attacks against online accounts, ways to protect your accounts against malicious actors, and the next... Read more
17 Apr 2019
•
40mins
Ranked #19
Matt Dimino, State of Cybersecurity in Healthcare
Matt Dimino, State of Cybersecurity in Healthcare
The public health sector cannot deliver efficient and safe patient care without digital interconnectivity among devices.... Read more
31 Jan 2018
•
1hr 7mins
Ranked #20
Yuhong Nan, Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps
Yuhong Nan, Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps
A long-standing challenge in analyzing information leaks within mobile apps is to automatically identify the codeoperati... Read more
26 Feb 2020
•
33mins