CERIAS Weekly Security Seminar - Purdue University artwork

CERIAS Weekly Security Seminar - Purdue University

1,160 episodes - English - Latest episode: 20 days ago - ★★★★ - 6 ratings

CERIAS -- the Nation's top-ranked interdisciplinary academic education and research institute -- hosts a weekly cyber security, privacy, resiliency or autonomy speaker, highlighting technical discovery, a case studies or exploring cyber operational approaches; they are not product demonstrations, service sales pitches, or company recruitment presentations. Join us weekly...or explore 25 years of archives for the who's-who in cybersecurity.

Technology Education Courses infosec security video seminar cerias purdue information sfs research education
Homepage Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed

Episodes

Christine Task, Data, Privacy---and the Interactions Between Them

November 09, 2022 21:30 - 1 hour - 276 MB Video

Data deidentification aims to provide data owners with edible cake: to allow them to freely use, share, store and publicly release sensitive record data without risking the privacy of any of the individuals in the data set.   And, surprisingly, given some constraints, that's not impossible to do.    However, the behavior of a deidentification algorithm depends on the distribution of the data itself.   Privacy research often treats data as a black box---omitting formal data-dependent utility a...

Gideon Rasmussen, "Program Maturity - Cybersecurity and Operational Risk Management"

November 02, 2022 20:30 - 237 MB Video

Business executives leverage cybersecurity programs to understand residual risk. That helps them make informed decisions to mitigate risk to an acceptable level. This session provides guidance to improve program maturity in stages. Maturity Level 1. Minimal Compliance Development of an information security programshould begin with a reputable baseline such as the NIST Cybersecurity Framework. A framework communicates the minimum controls required to protect an organization. It is a...

Gideon Rasmussen, Program Maturity - Cybersecurity and Operational Risk Management

November 02, 2022 20:30 - 52 minutes - 237 MB Video

Business executives leverage cybersecurity programs to understand residual risk. That helps them make informed decisions to mitigate risk to an acceptable level. This session provides guidance to improve program maturity in stages.Maturity Level 1.Minimal Compliance Development of an information security programshould begin with a reputable baseline such as the NIST Cybersecurity Framework.A framework communicates the minimum controls required to protect an organization. It is also necessary ...

Ning Zhang, "Security and Privacy in the Cyber-physical World"

October 26, 2022 20:30 - 190 MB Video

  Students: This is a hybrid event. You are encouraged to attend in-person in STEW G-52 As computing advances are making profound changes in our society, they also expose us to new security threats. While the impact of cyber attacks was often in our digital life in the past, our cyber world is increasingly intertwined with the physical world. Compromised safety-critical systems or critical infrastructures can have life and death implications. In this talk, I will hi...

Ning Zhang, Security and Privacy in the Cyber-physical World

October 26, 2022 20:30 - 42 minutes - 190 MB Video

 Students: This is a hybrid event. You are encouraged to attend in-person in STEW G-52As computing advances are making profound changes in our society, they also expose us to new security threats. While the impact of cyber attacks was often in our digital life in the past, our cyber world is increasingly intertwined with the physical world. Compromised safety-critical systems or critical infrastructures can have life and death implications. In this talk, I will highlight two research directio...

Florian Kerschbaum, "On Using Differential Privacy"

October 19, 2022 20:30 - 214 MB Video

Differential Privacy has become a widely used tool to protect privacy in data science applications.  In this talk, I will present two use cases for differential privacy: a) in collection of key-value statistics and b) as a protection against membership inference attacks.  Key-value statistics are commonly used to gather information about the use of software products.  Yet, the collector may be untrusted, and the data of each user should be protected.  There exist a number of differentially ...

Florian Kerschbaum, On Using Differential Privacy

October 19, 2022 20:30 - 47 minutes - 214 MB Video

Differential Privacy has become a widely used tool to protect privacy in data science applications.  In this talk, I will present two use cases for differential privacy: a) in collection of key-value statistics and b) as a protection against membership inference attacks.  Key-value statistics are commonly used to gather information about the use of software products.  Yet, the collector may be untrusted, and the data of each user should be protected.  There exist a number of differentially pr...

David C. Benson, "Stop Selling Cybersecurity Short!: Cybersecurity as a Component of National Power"

October 12, 2022 20:30 - 199 MB Video

Often, policy makers and cybersecurity professionals talk about cybersecurity as if cybersecurity is only important insofar as it benefits or protects other assets or values. For example, it is common to hear people argue that cybersecurity is important because of its role in economic growth, or potential damage military operations. Those arguments are not wrong, but they fail to understand national power, and consequently grossly understate cybersecurity's importance in internation...

David C. Benson, Stop Selling Cybersecurity Short!: Cybersecurity as a Component of National Power

October 12, 2022 20:30 - 44 minutes - 199 MB Video

Often, policy makers and cybersecurity professionals talk about cybersecurity as if cybersecurity is only important insofar as it benefits or protects other assets or values. For example, it is common to hear people argue that cybersecurity is important because of its role in economic growth, or potential damage military operations. Those arguments are not wrong, but they fail to understand national power, and consequently grossly understate cybersecurity's importance in international politic...

Maggie MacAlpine, "Ransomware and the Future of Cyberwarfare"

October 05, 2022 20:30 - 208 MB Video

Use of Ransomware as a class of malware has exploded in recent years, causing millions in damages to organizations across the world. The damage isn’t slowing down. On the contrary, ransomware as a tool is being adopted by a wide array of perpetrators. This includes nation-states, for cash, and to use the demand for cash to obfuscate activities like espionage and sabotage. Ransomware has become a powerful tool of asset seizure and extortion, being used by criminals, activists, and ev...

Maggie MacAlpine, Ransomware and the Future of Cyberwarfare

October 05, 2022 20:30 - 49 minutes - 208 MB Video

Use of Ransomware as a class of malware has exploded in recent years, causing millions in damages to organizations across the world. The damage isn't slowing down. On the contrary, ransomware as a tool is being adopted by a wide array of perpetrators. This includes nation-states, for cash, and to use the demand for cash to obfuscate activities like espionage and sabotage. Ransomware has become a powerful tool of asset seizure and extortion, being used by criminals, activists, and even sancti...

Dipankar Dasgupta, Adaptive Multi-Factor Authentication & Cyber Identity

September 28, 2022 20:30 - 48 minutes - 961 MB Video

Authentication is a critical part to ensure the identity of a legitimate user. During authentication, an individual's credential is validated with a specific computational technique to determine the association of the user with his/her claimed identity. In this talk, I will discuss an adaptive multi-factor authentication (A-MFA) framework which uses adaptive selection of multiple modalities at different operating environment so to make authentication strategy unpredictable to hackers. This me...

Dipankar Dasgupta, "Adaptive Multi-Factor Authentication & Cyber Identity"

September 28, 2022 20:30 - 961 MB Video

Authentication is a critical part to ensure the identity of a legitimate user. During authentication, an individual’s credential is validated with a specific computational technique to determine the association of the user with his/her claimed identity. In this talk, I will discuss an adaptive multi-factor authentication (A-MFA) framework which uses adaptive selection of multiple modalities at different operating environment so to make authentication strategy unpredictable to hackers...

Abhilasha Bhargav-Spantzel &amp; <span>Sonnie Ebikwo</span>, "“With great power comes great responsibility” – Responsible Cybersecurity Innovations and Investments for Cloud Computing"

September 21, 2022 20:30 - 897 MB Video

There is no one bigger game changer in the world than technology and its uptake in every aspect of our lives including our collective future. Cybersecurity has become the top priority across the board. There is need for informed cybersecurity investments that consider sustainability, responsible data usage, being prepared for any crisis and being resilient. We have to enable a culture of responsible innovation that takes holistic considerations for the people, process and technologies...

Abhilasha Bhargav-Spantzel &amp; Sonnie Ebikwo, "With great power comes great responsibility" – Responsible Cybersecurity Innovations and Investments for Cloud Computing

September 21, 2022 20:30 - 55 minutes - 897 MB Video

There is no one bigger game changer in the world than technology and its uptake in every aspect of our lives including our collective future. Cybersecurity has become the top priority across the board. There is need for informed cybersecurity investments that consider sustainability, responsible data usage, being prepared for any crisis and being resilient. We have to enable a culture of responsible innovation that takes holistic considerations for the people, process and technologies and dri...

James Huffaker, "Cyber Security in Aviation"

September 14, 2022 20:30 - 534 MB Video

Students: This is a hybrid event. You are encouraged to attend in person in STEW 050B (G52) Common IT based Cyber techniques do not apply to many parts of the aviation industry. The aviation industry has to meet a number of Federal Aviation Regulations and using Industry provided standards show compliance to those regulations, perhaps for the life of the airplane after initial certification. Most all updates to airplanes require a certification activity, thus it takes considerable time to ...

James Huffaker, Cyber Security in Aviation

September 14, 2022 20:30 - 50 minutes - 534 MB Video

Students: This is a hybrid event. You are encouraged to attend in person in STEW 050B (G52)Common IT based Cyber techniques do not apply to many parts of the aviation industry. The aviation industry has to meet a number of Federal Aviation Regulations and using Industry provided standards show compliance to those regulations, perhaps for the life of the airplane after initial certification. Most all updates to airplanes require a certification activity, thus it takes considerable time to ma...

Cuihua (Cindy) Shen, A Fake Image is Worth a Thousand Lies

September 07, 2022 20:30 - 50 minutes - 477 MB Video

Visual misinformation, including fake, manipulated or out-of-context images and videos, is increasingly common on the Internet and social media platforms. Because of visuals' superior impression, retention, virality and persuasiveness, visual misinformation poses a significant threat to national security, social cohesion, and public health. Yet, we know very little about how users process and judge the authenticity of visuals, and the ways in which platforms and fact-checking agencies could ...

Cuihua (Cindy) Shen, "A Fake Image is Worth a Thousand Lies"

September 07, 2022 20:30 - 477 MB Video

Visual misinformation, including fake, manipulated or out-of-context images and videos, is increasingly common on the Internet and social media platforms. Because of visuals’ superior impression, retention, virality and persuasiveness, visual misinformation poses a significant threat to national security, social cohesion, and public health. Yet, we know very little about how users process and judge the authenticity of visuals, and the ways in which platforms and fact-checking agencies...

Chris Jenkins, "Moving Target Defense for Space Systems"

August 31, 2022 20:30 - 430 MB Video

Students: This is a hybrid event. You are encouraged to attend in person in STEW 050B (G52) Space systems provide many critical functions to the military, federal agencies, and infrastructure networks. Space Policy Directive-5 Cybersecurity Principles for Space Systems describes both the cyber threat to space systems and the need for these systems to be secure and resilient against cyber-attacks. Most cyber defenses for space systems rely on the ability to detect the adversary. Reliance on...

Chris Jenkins, Moving Target Defense for Space Systems

August 31, 2022 20:30 - 47 minutes - 430 MB Video

Students: This is a hybrid event. You are encouraged to attend in person in STEW 050B (G52)Space systems provide many critical functions to the military, federal agencies, and infrastructure networks. Space Policy Directive-5 Cybersecurity Principles for Space Systems describes both the cyber threat to space systems and the need for these systems to be secure and resilient against cyber-attacks. Most cyber defenses for space systems rely on the ability to detect the adversary. Reliance on det...

Kevin Kornegay, "IoT Device Security in a Zero Trust Environment"

August 24, 2022 20:30 - 386 MB Video

The mission of the Cybersecurity Assurance and Policy (CAP) Center at Morgan State University is to provide the defense and intelligence community with the knowledge, methodology, solutions, and highly skilled cybersecurity professionals to mitigate penetration and manipulation of our nation’s cyber-physical infrastructure. Internet of Things (IoT) devices permeate all areas of life and work, with unprecedented economic effects. Critical infrastructures in transportation, smart grid, ...

Kevin Kornegay, IoT Device Security in a Zero Trust Environment

August 24, 2022 20:30 - 45 minutes - 386 MB Video

The mission of the Cybersecurity Assurance and Policy (CAP) Center at Morgan State University is to provide the defense and intelligence community with the knowledge, methodology, solutions, and highly skilled cybersecurity professionals to mitigate penetration and manipulation of our nation's cyber-physical infrastructure. Internet of Things (IoT) devices permeate all areas of life and work, with unprecedented economic effects. Critical infrastructures in transportation, smart grid, manufact...

Máire O'Neill, "Securing Connected Devices – Challenge and Opportunities"

April 27, 2022 20:30 - 703 MB Video

With the rapidproliferation of pervasive electronic devices in our lives, the internet ofthings (IoT) has become a reality and its influence on our day to dayactivities is set to further increase with a projected 125 Billion connecteddevices by 2030. However, this poses serious security and privacy issues as wewill no longer have direct control over with whom and what our devicescommunicate. Counterfeit, hacked, or cloned devices acting on a network are asignificant threat. In additio...

Máire O'Neill, Securing Connected Devices – Challenge and Opportunities

April 27, 2022 20:30 - 58 minutes - 703 MB Video

With the rapidproliferation of pervasive electronic devices in our lives, the internet ofthings (IoT) has become a reality and its influence on our day to dayactivities is set to further increase with a projected 125 Billion connecteddevices by 2030. However, this poses serious security and privacy issues as wewill no longer have direct control over with whom and what our devicescommunicate. Counterfeit, hacked, or cloned devices acting on a network are asignificant threat. In addition, IoT d...

Dr. Guan-Hua (Scott) Tu, "Enabling a Practically Secure Mobile Networked System"

April 20, 2022 20:30 - 435 MB Video

The mobile network (e.g., 4G LTE and 5G NR), the only large-scale wireless network infrastructure on par with the Internet, plays a critical role in interconnecting various mobile devices (e.g., smartphones, massive/critical IoT devices) and providing them with ubiquitous network services. In recent years, more users are accessing the Internet through mobile networks; since the first quarter of 2021, mobile devices (excluding tablets) have generated more than 54% of global website traffic. ...

Dr. Guan-Hua (Scott) Tu, Enabling a Practically Secure Mobile Networked System

April 20, 2022 20:30 - 54 minutes - 435 MB Video

The mobile network (e.g., 4G LTE and 5G NR), the only large-scale wireless network infrastructure on par with the Internet, plays a critical role in interconnecting various mobile devices (e.g., smartphones, massive/critical IoT devices) and providing them with ubiquitous network services. In recent years, more users are accessing the Internet through mobile networks; since the first quarter of 2021, mobile devices (excluding tablets) have generated more than 54% of global website traffic. H...

Paul Rosenzweig, "Crowd Forecasting to Enhance Cybersecurity"

April 13, 2022 20:30 - 527 MB Video

For at least two decades, the U.S. intelligence community and special projects agencies have been exploring the potential of prediction markets and crowd-forecasting platforms to better forecast geopolitical and technical trends. Similarly, a number of prominent corporations, including Google, Ford, Yahoo, Hewlett-Packard, and Eli Lilly, have likewise turned to these tools to predict everything from which product lines will be most profitable to whether a deadline is likely to be met. Ye...

Paul Rosenzweig, Crowd Forecasting to Enhance Cybersecurity

April 13, 2022 20:30 - 56 minutes - 527 MB Video

For at least two decades, the U.S. intelligence community and special projects agencies have been exploring the potential of prediction markets and crowd-forecasting platforms to better forecast geopolitical and technical trends. Similarly, a number of prominent corporations, including Google, Ford, Yahoo, Hewlett-Packard, and Eli Lilly, have likewise turned to these tools to predict everything from which product lines will be most profitable to whether a deadline is likely to be met. Yet des...

Jim Alves-Foss, "Automated Function Boundary Detection in Stripped Binaries"

April 06, 2022 20:30 - 710 MB Video

Automated cyber defense tools require the ability to analyze binary applications, detect vulnerabilities and automatically patch or mitigate those vulnerabilities. The insertion of security mechanisms that operate at function boundaries (e.g, control flow mitigation, stack guards)require automated detection of those boundaries. This talk discusses the problem, related research and a new technique that is more accurate than other reported approaches. The presentation also discusses some of t...

Jim Alves-Foss, Automated Function Boundary Detection in Stripped Binaries

April 06, 2022 20:30 - 50 minutes - 710 MB Video

Automated cyber defense tools require the ability to analyze binary applications, detect vulnerabilities and automatically patch or mitigate those vulnerabilities. The insertion of security mechanisms that operate at function boundaries (e.g, control flow mitigation, stack guards)require automated detection of those boundaries. This talk discusses the problem, related research and a new technique that is more accurate than other reported approaches. The presentation also discusses some of the...

Richard Clarke, "Now That We’re in a Hybrid War…"

March 30, 2022 20:30 - 432 MB Video

The war Russia has waged on Ukraine has seemed largely kinetic, but the most effective weapons weilded thus far have been consumer technologies. Putin has pursued a hybrid warfare strategy, yet the Ukrainians have fought his mendacious claims with the realities of conflict captured by mobile devices and social media. Bogged down by guerilla fighting in Ukrainian cities, Putin will view offensive cyber action and aggressive information warfare as increasingly appealing options. Richard...

Richard Clarke, Now That We're in a Hybrid War…

March 30, 2022 20:30 - 1 hour - 432 MB Video

The war Russia has waged on Ukraine has seemed largely kinetic, but the most effective weapons weilded thus far have been consumer technologies. Putin has pursued a hybrid warfare strategy, yet the Ukrainians have fought his mendacious claims with the realities of conflict captured by mobile devices and social media. Bogged down by guerilla fighting in Ukrainian cities, Putin will view offensive cyber action and aggressive information warfare as increasingly appealing options. Richard Clarke,...

Bill Newhouse, Challenges at the NIST National Cybersecurity Center of Excellence

March 23, 2022 20:30 - 1 hour - 432 MB Video

What kind of projects does one get to lead at an applied cybersecurity center within the National Institute of Standards and Technology (NIST)?This talk will offer insight on the cybersecurity challenges being addressed by projects led by the speaker since he began working at the National Cybersecurity Center of Excellence in 2016. The talk will touch upon the establishment of collaborative team made up of industry, academic, and government members for each project, and discuss how each proje...

Bill Newhouse, "Challenges at the NIST National Cybersecurity Center of Excellence"

March 23, 2022 20:30 - 432 MB Video

What kind of projects does one get to lead at an applied cybersecurity center within the National Institute of Standards and Technology (NIST)? This talk will offer insight on the cybersecurity challenges being addressed by projects led by the speaker since he began working at the National Cybersecurity Center of Excellence in 2016. The talk will touch upon the establishment of collaborative team made up of industry, academic, and government members for each project, and discuss how...

Andy Klein, What You Don't Know About Hard Drives!

March 09, 2022 21:30 - 55 minutes - 376 MB Video

More than half the stored data in the world resides on hard drives. Yes, a 50+ year old technology is storing our photos, music, research, taxes, and more— and nobody blinks an eye. Given that over one zettabyte of hard drive storage shipped in 2020, this storage media is not going away anytime soon. We at Backblaze manage over 200,000 hard drives to store over 1.3 Exabytes of data. Since 2013 we have tracked every hard drive we've used and each day we record their SMART stats, giving us a un...

<span>Andy Klein</span>, "What You Don’t Know About Hard Drives!"

March 09, 2022 21:30 - 376 MB Video

More than half the stored data in the world resides on hard drives. Yes, a 50+ year old technology is storing our photos, music, research, taxes, and more— and nobody blinks an eye. Given that over one zettabyte of hard drive storage shipped in 2020, this storage media is not going away anytime soon. We at Backblaze manage over 200,000 hard drives to store over 1.3 Exabytes of data. Since 2013 we have tracked every hard drive we’ve used and each day we record their SMART stats, givin...

Samuel Visner, "The Evolution of Cybersecurity and its Role in the International System"

March 02, 2022 21:30 - 658 MB Video

Precis: The United States encountered digital cyberspace with the gradual rise of digital technology, treating cyberspace as an electromagnetic domain. China encountered cyberspace more swiftly, surpassing several years ago the United States in the number of people connected in cyberspace (now approximately one billion people), treating cyberspace as a domain of human behavior. For the United States, cybersecurity pertains to the protection of information and the systems that depend on info...

Samuel Visner, The Evolution of Cybersecurity and its Role in the International System

March 02, 2022 21:30 - 1 hour - 658 MB Video

Precis: The United States encountered digital cyberspace with the gradual rise of digital technology, treating cyberspace as an electromagnetic domain. China encountered cyberspace more swiftly, surpassing several years ago the United States in the number of people connected in cyberspace (now approximately one billion people), treating cyberspace as a domain of human behavior. For the United States, cybersecurity pertains to the protection of information and the systems that depend on inform...

Chen-Ching Liu, "Cyber-Physical System Security of the Power Grid"

February 23, 2022 21:30 - 484 MB Video

The electric power grid is a complex cyber-physical system that forms the lifeline of a modern society. Its reliable and secure operation is of paramount importance to national security and economic well-being. The power grid today is a highly automated network, wherein a variety of communication networks and information systems are interconnected to the physical grid for the purpose of monitoring, protection, control, and market functions. The increased reliance on information and co...

Chen-Ching Liu, Cyber-Physical System Security of the Power Grid

February 23, 2022 21:30 - 55 minutes - 484 MB Video

The electric power grid is a complex cyber-physical system that forms the lifeline of a modern society. Its reliable and secure operation is of paramount importance to national security and economic well-being. The power grid today is a highly automated network, wherein a variety of communication networks and information systems are interconnected to the physical grid for the purpose of monitoring, protection, control, and market functions. The increased reliance on information and communicat...

Bob Gourley, "The Metaverse: Infinite attack surface and boundless risk"

February 16, 2022 21:30 - 1 MB Video

The Metaverse is coming. What is the Metaverse? A massive, infinitely scalable, shared virtual world where land, buildings, bots, avatars and other property can be bought sold and persist. Think of it as the future convergence of all of today's virtual worlds, interconnected with a single settlement layer for totally interoperable transactions. The Metaverse will be accessible by billions via any web browser, mobile device or virtual reality system. All indications are that the metaverse i...

Bob Gourley, The Metaverse: Infinite attack surface and boundless risk

February 16, 2022 21:30 - 59 minutes - 1 MB Video

The Metaverse is coming. What is the Metaverse? A massive, infinitely scalable, shared virtual world where land, buildings, bots, avatars and other property can be bought sold and persist. Think of it as the future convergence of all of today's virtual worlds, interconnected with a single settlement layer for totally interoperable transactions.The Metaverse will be accessible by billions via any web browser, mobile device or virtual reality system. All indications are that the metaverse is de...

Dr. Chris C. Demchak, "Robust Collective Cyber Power across Consolidated Democracies"

February 09, 2022 21:30 - 670 MB Video

The complexities of and losses from a shoddily created cyberspace substrate continue to hollow the economies and national power of consolidated democracies.  As China rises as a strategically focused and digitally aggressive authoritarian giant, it is critical that democratic leaders both understand the reality they face and how an institutional alternative may be created to avoid being weak cyber powers in the future. This presentation offers two models: the ‘Cybered Conflict’ mode...

Dr. Chris C. Demchak, Robust Collective Cyber Power across Consolidated Democracies

February 09, 2022 21:30 - 50 minutes - 670 MB Video

The complexities of and losses from a shoddily created cyberspace substrate continue to hollow the economies and national power of consolidated democracies.  As China rises as a strategically focused and digitally aggressive authoritarian giant, it is critical that democratic leaders both understand the reality they face and how an institutional alternative may be created to avoid being weak cyber powers in the future. This presentation offers two models: the ‘Cybered Conflict' model to lay t...

Alyssa Miller, Threat Modeling in the World of DevOps

February 02, 2022 21:30 - 1 hour - 1 MB Video

Threat modeling is an extremely valuable tool in the secure software development pipeline. Some studies suggest it has greater impact on security posture than other more widely practiced security activities. There are many different frameworks, models, and methodologies that have been developed in an attempt to make threat modeling easier. Yet, despite these efforts, popular approaches to threat modeling are often still considered too cumbersome, structured, or time consuming to fit with mode...

Alyssa Miller, "Threat Modeling in the World of DevOps"

February 02, 2022 21:30 - 1 MB Video

Threat modeling is an extremely valuable tool in the secure software development pipeline. Some studies suggest it has greater impact on security posture than other more widely practiced security activities. There are many different frameworks, models, and methodologies that have been developed in an attempt to make threat modeling easier. Yet, despite these efforts, popular approaches to threat modeling are often still considered too cumbersome, structured, or time consuming to fit with mo...

Dr. David Mussington, "Critical Infrastructure Resilience Hinges on Cyber-Physical Convergence"

January 26, 2022 21:30 - 215 MB Video

Cyber-physical systems are delivering an increasing portion of the infrastructure services at the heart of our economy and national security, and you don’t have to look far for examples of technology-enabled, industrial control, and the internet-of-things in the core operations of healthcare, food and agriculture, energy, transportation, or manufacturing. Further, one has only to look at the contemporary examples of our systems under stress, such as the JBS and Colonial Pipeline cyber...

Dr. David Mussington, Critical Infrastructure Resilience Hinges on Cyber-Physical Convergence

January 26, 2022 21:30 - 48 minutes - 215 MB Video

Cyber-physical systems are delivering an increasing portion of the infrastructure services at the heart of our economy and national security, and you don't have to look far for examples of technology-enabled, industrial control, and the internet-of-things in the core operations of healthcare, food and agriculture, energy, transportation, or manufacturing. Further, one has only to look at the contemporary examples of our systems under stress, such as the JBS and Colonial Pipeline cyber attack...

Chuck Brooks, "Leading Trends and Emerging Technologies for Cybersecurity in 2022"

January 19, 2022 21:30 - 695 MB Video

As we begin 2022, the cost, sophistication, and lethality of cyber-breaches continues to rise. Threat actors, especially state-sponsored, and criminal enterprises are taking advantage of the expanding cyber-attack surface by using their resources to employ more sophisticated means for discovering target vulnerabilities, automating phishing, and finding new deceptive paths for infiltrating malware. This presentation will explore some of the more compelling trends and threats in the cybers ec...

Twitter Mentions

@privacyprof 1 Episode