Weekly Security Seminar
About our Seminar Series
CERIAS -- the Nation's top-ranked interdisciplinary academic education and research institute -- hosts a weekly cyber security, privacy, resiliency or autonomy speaker, highlighting technical discovery, a case studies or exploring cyber operational approaches; they are not product demonstrations, service sales pitches, or company recruitment presentations. Join us weekly...or explore 20 years of archives for the who's-who in cybersecurity.
Many cybersecurity certification organizations recognized CERIAS Security Seminar sessions for continuing education credit. CPE forms available.
Interested in giving a technical talk at a future CERIAS Security Seminar? Contact us at seminars@cerias.purdue.edu
Join our Mailing List: receive weekly announcements about upcoming seminars.
Latest
04/24/2024 - Defining Trusted Artificial Intelligence for the National Security Space
David Stracuzzi - Sandia National Laboratories
Ways to Watch
![YouTube](/assets/images/youtube_200.png)
Watch Now!
Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!Recent
![In Pursuit of Silent Flaws: Dataflow Analysis for Bugfinding and Triage](/assets/video/secsem/images/secsem_20240410_full.jpg)
In Pursuit of Silent Flaws: Dataflow Analysis for Bugfinding and Triage
Evan Sultanik - Trail of Bits
![Secure Sourcing of COTS Products: A Critical Missing Element in Software Engineering Education](/assets/video/secsem/images/secsem_20240327_full.jpg)
Secure Sourcing of COTS Products: A Critical Missing Element in Software Engineering Education
Daniel Shoemaker - University of Detroit Mercy
![The Fault in Our Stars: How Reputation Systems Fail in Practice](/assets/video/secsem/images/secsem_20240306_full.jpg)
The Fault in Our Stars: How Reputation Systems Fail in Practice
Alejandro Cuevas - Carnegie Mellon University
![Stepping Through Cybersecurity Risk Management A Systems Thinking Approach](/assets/video/secsem/images/secsem_20240221_full.jpg)
Stepping Through Cybersecurity Risk Management A Systems Thinking Approach
Jennifer Bayuk - Jennifer L. Bayuk, LLC
![On Security Operations for AI Systems](/assets/video/secsem/images/secsem_20240214_full.jpg)
On Security Operations for AI Systems
Jonathan (Jono) Spring - Cybersecurity and Infrastructure Security Agency (CISA)
![Tensor Decomposition Methods for Cybersecurity](/assets/video/secsem/images/secsem_20240207_full.jpg)
Tensor Decomposition Methods for Cybersecurity
Maksim Eren - Los Alamos National Laboratory
![Multifactor Authentication - The Problem, Recommendations, and Future Concerns](/assets/video/secsem/images/secsem_20240131_full.jpg)
Multifactor Authentication - The Problem, Recommendations, and Future Concerns
William Malik - Malik Consulting
![Enhancing Cybersecurity via Lessons Learned from the Evolution of Malware](/assets/video/secsem/images/secsem_20240124_full.jpg)
Enhancing Cybersecurity via Lessons Learned from the Evolution of Malware
Solomon Sonya - Purdue University