Archive
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Affiliation shown is the affiliation at the time the talk was given.
![Contactless Control Flow Monitoring via Electromagnetic Emanations](/assets/video/secsem/images/secsem_20200115_full.jpg)
Contactless Control Flow Monitoring via Electromagnetic Emanations
Sriharsha Etigowni - Purdue University
![Immersive Virtual Insanity: Exploring Immersive Virtual Reality Security and Forensics](/assets/video/secsem/images/secsem_20200129_full.jpg)
Immersive Virtual Insanity: Exploring Immersive Virtual Reality Security and Forensics
Abe Baggili - University of New Haven
![Automated Reasoning of Security and Privacy of Cellular Networks](/assets/video/secsem/images/secsem_20200205_full.jpg)
Automated Reasoning of Security and Privacy of Cellular Networks
Syed Rafiul Hussain - Purdue University
![Security, Ethics and the End of the World as We Know It](/assets/video/secsem/images/secsem_20200219_full.jpg)
Security, Ethics and the End of the World as We Know It
Doug Rapp - Delta Research & Cyber Leadership Alliance
![Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps](/assets/video/secsem/images/secsem_20200226_full.jpg)
Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps
Yuhong Nan - Purdue University
![Security and Privacy of Connected Autonomous Vehicles](/assets/video/secsem/images/secsem_20200311_full.jpg)
Security and Privacy of Connected Autonomous Vehicles
Vireshwar Kumar - Purdue University
![Everyone Wants to Help You: Understanding the Issues and Surviving with a Multitude of Regulatory Authorities](/assets/video/secsem/images/secsem_20200415_full.jpg)
Everyone Wants to Help You: Understanding the Issues and Surviving with a Multitude of Regulatory Authorities
Leon Ravenna - KAR Global
![Public Sector Cyber Security 2020: Challenges and Rewards](/assets/video/secsem/images/secsem_20200422_full.jpg)
Public Sector Cyber Security 2020: Challenges and Rewards
Bruce Coffing - City of Chicago
![Proactive Endpoint and Network Security Operations. Detecting the Unknown Known](/assets/video/secsem/images/secsem_20200429_full.jpg)
Proactive Endpoint and Network Security Operations. Detecting the Unknown Known
Corey Maypray - Eli Lilly
![A Principled Approach to Cybersecurity Engineering](/assets/video/secsem/images/secsem_20200617_full.jpg)
A Principled Approach to Cybersecurity Engineering
Sami Saydjari - Cyber Defense Agency, Inc.
![Election Security in the Age of COVID-19: Risk Management in the face of a "Perfect Storm"](/assets/video/secsem/images/secsem_20200701_full.jpg)
Election Security in the Age of COVID-19: Risk Management in the face of a "Perfect Storm"
Jim Richberg - Fortinet
![Cyber Security of Control Systems: The Second Coming of the Maginot Line](/assets/video/secsem/images/secsem_20200715_full.jpg)
Cyber Security of Control Systems: The Second Coming of the Maginot Line
Joe Weiss - Applied Control Systems, LLC
![The Ghost in the Machine: Reconciling AI and Trust in the Connected World](/assets/video/secsem/images/secsem_20200722_full.jpg)
The Ghost in the Machine: Reconciling AI and Trust in the Connected World
Sam Curry and Alon Kaufman - Cybereason / Duality Technologies
![Flexible and Adaptive Malware Identification Using Techniques from Biology](/assets/video/secsem/images/secsem_20200819_full.jpg)
Flexible and Adaptive Malware Identification Using Techniques from Biology
Elena Peterson - Pacific Northwest National Laboratory
![From Compliance in the Classroom to Compliance on the Street, Important Lessons That Every Cybersecurity Professional Must Know](/assets/video/secsem/images/secsem_20200826_full.jpg)
From Compliance in the Classroom to Compliance on the Street, Important Lessons That Every Cybersecurity Professional Must Know
Jeremiah Sahlberg - Tevora
![Dramatically Reducing Attack Surface Using Integrity MAC Security Kernel](/assets/video/secsem/images/secsem_20200902_full.jpg)
Dramatically Reducing Attack Surface Using Integrity MAC Security Kernel
Roger Schell - AESec Corporation
![Authentication: Behind The Scenes When You Click "Check Out"](/assets/video/secsem/images/secsem_20200916_full.jpg)
Authentication: Behind The Scenes When You Click "Check Out"
Warda Zahid Khan - Mastercard
![From Machine Learning Threats to Machine Learning Protection Requirements](/assets/video/secsem/images/secsem_20201007_full.jpg)
From Machine Learning Threats to Machine Learning Protection Requirements
Michael Clark - Riverside Research
![The Pod People Campaign: Driving User Traffic via Social Networks](/assets/video/secsem/images/secsem_20201014_full.jpg)
The Pod People Campaign: Driving User Traffic via Social Networks
Courtney Falk - GoDaddy
![NUTS: eNcrypted Userdata Transit & Storage; Viewing Data as an Endpoint™ (DaaE) using Structured Cryptography](/assets/video/secsem/images/secsem_20201028_full.jpg)
NUTS: eNcrypted Userdata Transit & Storage; Viewing Data as an Endpoint™ (DaaE) using Structured Cryptography
Yoon Auh - NUTS Technologies
![Results from the Field: Cybersecurity in Nonprofits and Why it Matters](/assets/video/secsem/images/secsem_20201104_full.jpg)
Results from the Field: Cybersecurity in Nonprofits and Why it Matters
Kelley Misata - Sightline Security
![Improving the Accuracy of Blocklists by Aggregation and Address Reuse Detection](/assets/video/secsem/images/secsem_20201118_full.jpg)
Improving the Accuracy of Blocklists by Aggregation and Address Reuse Detection
Sivaram Ramanathan - University of Southern California
![Maximizing Cyber Deception to Improve Security: An Empirical Analysis](/assets/video/secsem/images/secsem_20201202_full.jpg)
Maximizing Cyber Deception to Improve Security: An Empirical Analysis
Kimberly Ferguson-Walter - Laboratory for Advanced Cybersecurity Research, NSA Research
Ways to Watch
![YouTube](/assets/images/youtube_200.png)