CERIAS Weekly Security Seminar - Purdue University
Technology Podcasts
CERIAS -- the Nation's top-ranked interdisciplinary academic education and research institute -- hosts a weekly cyber security, privacy, resiliency or autonomy speaker, highlighting technical discovery, a case studies or exploring cyber operational approaches; they are not product demonstrations, service sales pitches, or company recruitment presentations. Join us weekly...or explore 25 years of archives for the who's-who in cybersecurity.
Location:
United States
Description:
CERIAS -- the Nation's top-ranked interdisciplinary academic education and research institute -- hosts a weekly cyber security, privacy, resiliency or autonomy speaker, highlighting technical discovery, a case studies or exploring cyber operational approaches; they are not product demonstrations, service sales pitches, or company recruitment presentations. Join us weekly...or explore 25 years of archives for the who's-who in cybersecurity.
Language:
English
David Stracuzzi, Defining Trusted Artificial Intelligence for the National Security Space
Duration:00:51:26
Evan Sultanik, In Pursuit of Silent Flaws: Dataflow Analysis for Bugfinding and Triage
Duration:00:53:04
Daniel Shoemaker, Secure Sourcing of COTS Products: A Critical Missing Element in Software Engineering Education
Duration:00:56:42
Douglas Huelsbeck, The Importance of Security by Design & The Importance of Including Cybersecurity Experts in Your Business Decisions
Duration:00:55:23
Alejandro Cuevas, The Fault in Our Stars: How Reputation Systems Fail in Practice
Duration:01:01:01
Sanket Naik, Modern Enterprise Cybersecurity: A CISO perspective
Duration:00:59:32
Jennifer Bayuk, Stepping Through Cybersecurity Risk Management A Systems Thinking Approach
Duration:01:00:43
Jonathan (Jono) Spring, On Security Operations for AI Systems
Duration:01:05:24
Maksim Eren, Tensor Decomposition Methods for Cybersecurity
Duration:00:41:13
William Malik, Multifactor Authentication - The Problem, Recommendations, and Future Concerns
Duration:00:46:28
Solomon Sonya, Enhancing Cybersecurity via Lessons Learned from the Evolution of Malware
Duration:01:02:14
Leigh Metcalf, Grep for Evil
Duration:01:03:04
Sandhya Aneja, Invisible Signatures: Device Fingerprinting in a Connected World
Duration:00:54:45
Mu Zhang, Backtracking Intrusions in Modern Industrial Internet of Things
Duration:00:51:03
Robert Denz, Mind the Gap: Vulnerabilities and Opportunities for Cyber R&D at the Edge
Duration:00:49:53
Andy Ellis, How to Build and Measure a Corporate Security Program
Duration:00:54:51
Wen Masters, Cyber Risk Analysis for Critical Infrastructure
Duration:00:39:03
Steve Lipner, Thinking About the Future of Encryption
Duration:01:02:38
Courtney Falk, The Bride of the Pod People
Duration:00:59:48
Derek Dervishian, Fuzzing: Understanding the Landscape
Duration:00:55:16