Archive
2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Affiliation shown is the affiliation at the time the talk was given.
Building the Next Generation Cybersecurity Workforce: Progress and Challenges
Melissa Dark - DARK Enterprises, Inc.
Leading Trends and Emerging Technologies for Cybersecurity in 2022
Chuck Brooks - Georgetown University
Critical Infrastructure Resilience Hinges on Cyber-Physical Convergence
Dr. David Mussington - Cybersecurity and Infrastructure Security Agency (CISA)
Robust Collective Cyber Power across Consolidated Democracies
Dr. Chris C. Demchak - US Naval War College
The Evolution of Cybersecurity and its Role in the International System
Samuel Visner - MITRE Labs
Challenges at the NIST National Cybersecurity Center of Excellence
Bill Newhouse - National Institute of Standards and Technology (NIST)
Automated Function Boundary Detection in Stripped Binaries
Jim Alves-Foss - University of Idaho
Enabling a Practically Secure Mobile Networked System
Dr. Guan-Hua (Scott) Tu - Michigan State University
Securing Connected Devices – Challenge and Opportunities
Máire O'Neill - Queen's University Belfast
"With great power comes great responsibility" – Responsible Cybersecurity Innovations and Investments for Cloud Computing
Abhilasha Bhargav-Spantzel & Sonnie Ebikwo - Microsoft
Adaptive Multi-Factor Authentication & Cyber Identity
Dipankar Dasgupta - The University of Memphis
Stop Selling Cybersecurity Short!: Cybersecurity as a Component of National Power
David C. Benson - United States Air Force
Security and Privacy in the Cyber-physical World
Ning Zhang - Washington University in St. Louis
Data, Privacy---and the Interactions Between Them
Christine Task - Knexus Research Corporation
Making Cybersecurity Reliable and Cybersecurity Careers Rewarding
Brian Barnier & Prachee Kale - Think.Design.Cyber
Fast and Reliable Formal Verification of Smart Contracts with the Move Prover
Meng Xu - University of Waterloo
Users Are Not Stupid: Six Cybersecurity Pitfalls Overturned
Julie Haney - National Institute of Standards and Technologies