Agenda – October 2017

Day 1

08:00-9:00 – Registration & Breakfast

Time to wake up. Grab your badge, a warm cup of caffeine, and a seat.

09:00-09:30 – Opening Remarks

09:00-09:10 Welcome to CyberSEED by John Chandy/Michael Laurent

09:10-09:30 Cybersecurity Strategy for Connecticut by Arthur House

09:30-10:30 – Keynote

When Data Meets People by Rabia Chaudry

10:30-10:40 – Coffee Break

10:40-11:50 – Machine Learning and the Holy Grail

10:40-11:00 Using Stylometry to Attribute Programmers and Writers by Rachel Greenstadt

11:00-11:20 How Unique is your .Onion? An Analysis of the Fingerprintability of Tor Onion Services by Rebekah Overdorf

11:20-11:40 Opinionated Security - Using Machine Learning to Make Security Decisions by Carrie Gates

11:40-12:25 – Featured Talks I

A Safe-Route to Secure Routing: Status, Challenges and Directions for Secure Internet Routing by Amir Herzberg

12:25-13:30 – Lunch Break

Student Competitions Commence

13:30-15:30 – Featured Talks II

13:30-14:00 Post Quantum Cryptography by Brian Malacchia

14:00-14:30 Innovations and Cybersecurity – Roles for the Private, Academic and Public Sectors by Donna Dodson

14:30-15:00 PUFs: The New School of Device Authentication by Jim Fahrny

15:00-15:30 Using ML and AI for defense and anticipating its use on offense by Oliver Tavakoli

15:30-15:40 – Coffee Break

15:40-16:40 – Information Security: Modern Times

15:40-16:00 Reusable Iris Authentication by Ben Fuller

16:00-16:20 Estonian e-Residency and Blockchain by Clare Sullivan

16:20-16:40 Backpage and Bitcoin: Uncovering Human Traffickers by Sadia Afroz

16:40-17:00 – Closing Remarks

State of the student competitions, announcements, logistics etc.

17:00-18:00 – Networking Hour

18:00-20:00 – Reception

Day 2

8:00-9:00 – Registration & Breakfast

Time to wake up, grab caffeine, and a seat.

9:00-9:10 Student Competition Update

While everyone has been sleeping, what have the students been up to?

09:10-09:40 – Featured Talks III

The Future of Cloud Security Is Advanced Virtualization by Tom Gillis

09:40-10:40 – How I Learnt to Stop Worrying and Love the IoT (Ahmad Douglas)

09:10-09:30 How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles by Kirill Levchenko

09:30-09:50 TBD by Robert Albach

09:50-10:10 Battling the Epidemic of Insecure Smart Home Products Using Machine Learning by Leon Kuperman

10:40-11:00 Coffee Break

Get some coffee, stretch, and recharge

11:00-12:00 – Privacy: A New Hope

11:00-11:20 Do You See What I See? Differential Treatment of Anonymous Users by Damon McCoy

11:20-11:40 Privacy and Information Security: The Evolving Threat of Proximity Data by Mike Fong

11:40-12:00 Why our email is still being read by others, and how we can stop it by Joe Naegele

12:00-13:00 – Lunch Break

13:00-14:00 – Cybersecurity & Diversity

13:00-13:20 Gender and CyberSecurity by Winifred Poster

13:20-13:40 Mental Models of Older Adults by L. Jean Camp

13:40-14:00 Comcast Neurodiversity Initiative by Arash Esmaili Zaghi

14:00-15:00 – Conclusion

14:00-14:20 Updates on what CSI has been upto

14:20-14:40 Prizes and announcements for student competition winners (by Jim Farhny/VG)

14:40-15:00 Closing logistical announcements, thank you, etc.