The 26th annual CERIAS Cybersecurity Symposium will bring together researchers, practitioners, academics, and industry professionals to examine the state of Cyber/Cyber-Physical security and emerging technologies. Programming will include topical keynote addresses, thought-provoking panel discussions, innovative technology talks, and a student poster session highlighting more than 60 current cyber security, resiliency, privacy, autonomous systems, trusted electronics, and trustworthy AI research projects.
Planned Panel Topics:
- Purdue ICS Security Model 2.0
- AI + Cybersecurity (ACTION)
- Public / Private Partnerships
- Lesson Learned from the Cyber Battlefield
Speakers
AGENDA
Printable AgendaTravel Information
For More Information…
For further information on the symposium or current and future CERIAS initiatives, contact:
Joel Rasmus
CERIAS
Managing Director
Phone: 765 494-7806
E-mail: info@cerias.purdue.edu
Archives
- 2024 Trustworthiness of AI, Cyber-physical, Where Code Meets Chip
- 2023 20th Anniversary of the Grand Challenges in Trustworthy Computing Report, The Intersection of Space and Cybersecurity, Indiana Statewide Cybersecurity Summit
- 2022 Trusted and Fair AI, Securing Digital Healthcare, Secure Software Supply-chain
- 2021 (Virtual in Oct.): Aero-Cyber, Trusted Microelectronics, Ransomware
- 2020 (Virtual in Sept.): Automotive Security, Securing Industry, 5G, Challenges in Security and Privacy Policy
- 2019: What If Our Future Was More Secure?
- 2018: Where we've Been, What's Ahead (CERIAS 20th Anniversary)
- 2017: 25th Anniversary of the COAST Lab
- 2016 "When Cyber Meets Physical", “The State of Software Security”, IOT Security
- 2015 Financial Sector Security, "Advanced Persistent Gullibility"
- 2014 Sharing Incidence Data, APT, Privacy
- 2013 Security Analytics, Trusted Identities, Security Education and Training
- 2012 Securing SCADA Systems, Big Data Analytics, Mobile Devices2
- 2011 Data Provenance, Scientific Foundations for Cyber Security, Securing Web 2.0
- 2010 Visualization, Infosec Ethics, Research Funding Evolution
- 2009 Transitive Security, Cloud Security, Protecting IP
- 2008 Virtual Machines, Wireless, Malware, Finance and Healthcare
- 2007: Then - Now - Next
- 2006: Negotiating Trust: Security * Privacy * Risk
- 2005: Security in Motion
- 2004: Energizing the Enterprise: Cyber Security in Context
- 2003: Cyber Security & Safety for the 21st Century
- 2002: Protecting Information Resources
- 2001: A Multidisciplinary Approach To Information Assurance And Security
- 2000: Advancing the State and Practice of Information Assurance and Security