Archive
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Affiliation shown is the affiliation at the time the talk was given.
![Building the Next Generation Cybersecurity Workforce: Progress and Challenges](/assets/video/secsem/images/secsem_20220112_full.jpg)
Building the Next Generation Cybersecurity Workforce: Progress and Challenges
Melissa Dark - DARK Enterprises, Inc.
![Leading Trends and Emerging Technologies for Cybersecurity in 2022](/assets/video/secsem/images/secsem_20220119_full.jpg)
Leading Trends and Emerging Technologies for Cybersecurity in 2022
Chuck Brooks - Georgetown University
![Critical Infrastructure Resilience Hinges on Cyber-Physical Convergence](/assets/video/secsem/images/secsem_20220126_full.jpg)
Critical Infrastructure Resilience Hinges on Cyber-Physical Convergence
Dr. David Mussington - Cybersecurity and Infrastructure Security Agency (CISA)
![Robust Collective Cyber Power across Consolidated Democracies](/assets/video/secsem/images/secsem_20220209_full.jpg)
Robust Collective Cyber Power across Consolidated Democracies
Dr. Chris C. Demchak - US Naval War College
![The Evolution of Cybersecurity and its Role in the International System](/assets/video/secsem/images/secsem_20220302_full.jpg)
The Evolution of Cybersecurity and its Role in the International System
Samuel Visner - MITRE Labs
![Challenges at the NIST National Cybersecurity Center of Excellence](/assets/video/secsem/images/secsem_20220323_full.jpg)
Challenges at the NIST National Cybersecurity Center of Excellence
Bill Newhouse - National Institute of Standards and Technology (NIST)
![Automated Function Boundary Detection in Stripped Binaries](/assets/video/secsem/images/secsem_20220406_full.jpg)
Automated Function Boundary Detection in Stripped Binaries
Jim Alves-Foss - University of Idaho
![Enabling a Practically Secure Mobile Networked System](/assets/video/secsem/images/secsem_20220420_full.jpg)
Enabling a Practically Secure Mobile Networked System
Dr. Guan-Hua (Scott) Tu - Michigan State University
![Securing Connected Devices – Challenge and Opportunities](/assets/video/secsem/images/secsem_20220427_full.jpg)
Securing Connected Devices – Challenge and Opportunities
Máire O'Neill - Queen's University Belfast
!["With great power comes great responsibility" – Responsible Cybersecurity Innovations and Investments for Cloud Computing](/assets/video/secsem/images/secsem_20220921_full.jpg)
"With great power comes great responsibility" – Responsible Cybersecurity Innovations and Investments for Cloud Computing
Abhilasha Bhargav-Spantzel & Sonnie Ebikwo - Microsoft
![Adaptive Multi-Factor Authentication & Cyber Identity](/assets/video/secsem/images/secsem_20220928_full.jpg)
Adaptive Multi-Factor Authentication & Cyber Identity
Dipankar Dasgupta - The University of Memphis
![Stop Selling Cybersecurity Short!: Cybersecurity as a Component of National Power](/assets/video/secsem/images/secsem_20221012_full.jpg)
Stop Selling Cybersecurity Short!: Cybersecurity as a Component of National Power
David C. Benson - United States Air Force
![Security and Privacy in the Cyber-physical World](/assets/video/secsem/images/secsem_20221026_full.jpg)
Security and Privacy in the Cyber-physical World
Ning Zhang - Washington University in St. Louis
![Data, Privacy---and the Interactions Between Them](/assets/video/secsem/images/secsem_20221109_full.jpg)
Data, Privacy---and the Interactions Between Them
Christine Task - Knexus Research Corporation
![Making Cybersecurity Reliable and Cybersecurity Careers Rewarding](/assets/video/secsem/images/secsem_20221116_full.jpg)
Making Cybersecurity Reliable and Cybersecurity Careers Rewarding
Brian Barnier & Prachee Kale - Think.Design.Cyber
![Fast and Reliable Formal Verification of Smart Contracts with the Move Prover](/assets/video/secsem/images/secsem_20221130_full.jpg)
Fast and Reliable Formal Verification of Smart Contracts with the Move Prover
Meng Xu - University of Waterloo
![Users Are Not Stupid: Six Cybersecurity Pitfalls Overturned](/assets/video/secsem/images/secsem_20221207_full.jpg)
Users Are Not Stupid: Six Cybersecurity Pitfalls Overturned
Julie Haney - National Institute of Standards and Technologies
Ways to Watch
![YouTube](/assets/images/youtube_200.png)