Archive
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Affiliation shown is the affiliation at the time the talk was given.
![Invisible Signatures: Device Fingerprinting in a Connected World](/assets/video/secsem/images/secsem_20240110_full.jpg)
Invisible Signatures: Device Fingerprinting in a Connected World
Sandhya Aneja - Marist College
![Enhancing Cybersecurity via Lessons Learned from the Evolution of Malware](/assets/video/secsem/images/secsem_20240124_full.jpg)
Enhancing Cybersecurity via Lessons Learned from the Evolution of Malware
Solomon Sonya - Purdue University
![Multifactor Authentication - The Problem, Recommendations, and Future Concerns](/assets/video/secsem/images/secsem_20240131_full.jpg)
Multifactor Authentication - The Problem, Recommendations, and Future Concerns
William Malik - Malik Consulting
![Tensor Decomposition Methods for Cybersecurity](/assets/video/secsem/images/secsem_20240207_full.jpg)
Tensor Decomposition Methods for Cybersecurity
Maksim Eren - Los Alamos National Laboratory
![On Security Operations for AI Systems](/assets/video/secsem/images/secsem_20240214_full.jpg)
On Security Operations for AI Systems
Jonathan (Jono) Spring - Cybersecurity and Infrastructure Security Agency (CISA)
![Stepping Through Cybersecurity Risk Management A Systems Thinking Approach](/assets/video/secsem/images/secsem_20240221_full.jpg)
Stepping Through Cybersecurity Risk Management A Systems Thinking Approach
Jennifer Bayuk - Jennifer L. Bayuk, LLC
![The Fault in Our Stars: How Reputation Systems Fail in Practice](/assets/video/secsem/images/secsem_20240306_full.jpg)
The Fault in Our Stars: How Reputation Systems Fail in Practice
Alejandro Cuevas - Carnegie Mellon University
![The Importance of Security by Design & The Importance of Including Cybersecurity Experts in Your Business Decisions](/assets/video/secsem/images/secsem_20240320_full.jpg)
The Importance of Security by Design & The Importance of Including Cybersecurity Experts in Your Business Decisions
Douglas Huelsbeck - DoD
![Secure Sourcing of COTS Products: A Critical Missing Element in Software Engineering Education](/assets/video/secsem/images/secsem_20240327_full.jpg)
Secure Sourcing of COTS Products: A Critical Missing Element in Software Engineering Education
Daniel Shoemaker - University of Detroit Mercy
![In Pursuit of Silent Flaws: Dataflow Analysis for Bugfinding and Triage](/assets/video/secsem/images/secsem_20240410_full.jpg)
In Pursuit of Silent Flaws: Dataflow Analysis for Bugfinding and Triage
Evan Sultanik - Trail of Bits
![Defining Trusted Artificial Intelligence for the National Security Space](/assets/video/secsem/images/secsem_20240424_full.jpg)
Defining Trusted Artificial Intelligence for the National Security Space
David Stracuzzi - Sandia National Laboratories
Ways to Watch
![YouTube](/assets/images/youtube_200.png)