Agenda – October 2017

Day 1

8:00-9:00 — Registration & Breakfast
Time to wake up. Grab your badge, a warm cup of caffeine, and a seat.

9:00-09:30 — Opening Remarks
9:00-09:10 Welcome to CyberSEED by John Chandy/Laurent Michel
9:10-09:30 Cybersecurity Strategy for Connecticut by Arthur House

9:30-10:30 — Keynote
When Data Meets People by Rabia Chaudry

10:30-10:40 — Coffee Break

10:40-11:50 Machine Learning and the Holy Grail
10:40-11:00 Using Stylometry to Attribute Programmers and Writers by Rachel Greenstadt
11:00-11:20 How Unique is your Onion? An Analysis of the Fingerprintability of Tor Onion Services by Rebekah Overdorf
11:20-11:40 Opinionated Security – Using Machine Learning to Make Security Decisions by Carrie Gates

11:40-12:25 — Featured Talks I
A Safe-Route to Secure Routing: Status, Challenges and Directions for Secure Internet Routing by Amir Herzberg

12:25-1:30 — Lunch Break
Student Competitions Commence

1:30-3:30 — Featured Talks II
1:30-2:00 Post Quantum Cryptography by Brian LaMacchia
2:00-2:30 Innovations and Cybersecurity — Roles for the Private, Academic and Public Sectors by Donna Dodson
2:30-3:00 PUFs: The New School of Device Authentication by Jim Fahrny
3:00-3:30 Using ML and AI for defense and anticipating its use on offense by Oliver Tavakoli

3:30-3:40 — Coffee Break

3:40-4:40 Information Security: Modern Times
3:40-4:00 Reusable Iris Authentication by Ben Fuller
4:00-4:20 Estonian e-Residency and Blockchain by Clare Sullivan
4:20-4:40 Backpage and Bitcoin: Uncovering Human Traffickers by Sadia Afroz

4:40-5:00 — Closing Remarks
State of the student competitions, announcements, logistics etc.

5:00-6:00 — Networking Hour

6:00-8:00 — Reception


Day 2

8:00-9:00 — Registration & Breakfast
Time to wake up, grab caffeine, and a seat.

9:00-9:10 Student Competition Update
While everyone has been sleeping, what have the students been up to?

9:10-09:40 — Featured Talks III
9:10-09:40 The Future of Cloud Security Is Advanced Virtualization by Tom Gillis

9:40-11:00 How I Learnt to Stop Worrying and Love the IoT
9:40-10:00 How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles by Kirill Levchenko
10:00-10:20 Economic and Organizational Impacts on Industrial Security by Robert Albach
10:20-10:40 Battling the Epidemic of Insecure Smart Home Products Using Machine Learning by Leon Kuperman
10:40-11:00 IoT Security and OCF: The Role of Standards by Mark Walker

11:00-12:00 Privacy: A New Hope
11:00-11:20 Do You See What I See? Differential Treatment of Anonymous Users by Damon McCoy
11:20-11:40 Privacy and Information Security: The Evolving Threat of Proximity Data by Mike Fong
11:40-12:00 Why our email is still being read by others, and how we can stop it by Joe Naegele

12:00-1:00 — Lunch Break

1:00-2:00 Cybersecurity & Diversity
1:00-1:20 Gender and CyberSecurity by Winifred Poster
1:20-1:40 Mental Models of Older Adults by L. Jean Camp
1:40-2:00 Comcast Neurodiversity Initiative by Arash Esmaili Zaghi

2:00-3:00 — Conclusion
2:00-2:20 Updates on what CSI has been up to
2:20-2:40 Prizes and announcements for student competition winners
2:40-3:00 Closing logistical announcements, thank you, etc.