Day 1
8:00-9:00 — Registration & Breakfast
Time to wake up. Grab your badge, a warm cup of caffeine, and a seat.
9:00-09:30 — Opening Remarks
9:00-09:10 Welcome to CyberSEED by John Chandy/Laurent Michel
9:10-09:30 Cybersecurity Strategy for Connecticut by Arthur House
9:30-10:30 — Keynote
When Data Meets People by Rabia Chaudry
10:30-10:40 — Coffee Break
10:40-11:50 Machine Learning and the Holy Grail
10:40-11:00 Using Stylometry to Attribute Programmers and Writers by Rachel Greenstadt
11:00-11:20 How Unique is your Onion? An Analysis of the Fingerprintability of Tor Onion Services by Rebekah Overdorf
11:20-11:40 Opinionated Security – Using Machine Learning to Make Security Decisions by Carrie Gates
11:40-12:25 — Featured Talks I
A Safe-Route to Secure Routing: Status, Challenges and Directions for Secure Internet Routing by Amir Herzberg
12:25-1:30 — Lunch Break
Student Competitions Commence
1:30-3:30 — Featured Talks II
1:30-2:00 Post Quantum Cryptography by Brian LaMacchia
2:00-2:30 Innovations and Cybersecurity — Roles for the Private, Academic and Public Sectors by Donna Dodson
2:30-3:00 PUFs: The New School of Device Authentication by Jim Fahrny
3:00-3:30 Using ML and AI for defense and anticipating its use on offense by Oliver Tavakoli
3:30-3:40 — Coffee Break
3:40-4:40 Information Security: Modern Times
3:40-4:00 Reusable Iris Authentication by Ben Fuller
4:00-4:20 Estonian e-Residency and Blockchain by Clare Sullivan
4:20-4:40 Backpage and Bitcoin: Uncovering Human Traffickers by Sadia Afroz
4:40-5:00 — Closing Remarks
State of the student competitions, announcements, logistics etc.
5:00-6:00 — Networking Hour
6:00-8:00 — Reception
Day 2
8:00-9:00 — Registration & Breakfast
Time to wake up, grab caffeine, and a seat.
9:00-9:10 Student Competition Update
While everyone has been sleeping, what have the students been up to?
9:10-09:40 — Featured Talks III
9:10-09:40 The Future of Cloud Security Is Advanced Virtualization by Tom Gillis
9:40-11:00 How I Learnt to Stop Worrying and Love the IoT
9:40-10:00 How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles by Kirill Levchenko
10:00-10:20 Economic and Organizational Impacts on Industrial Security by Robert Albach
10:20-10:40 Battling the Epidemic of Insecure Smart Home Products Using Machine Learning by Leon Kuperman
10:40-11:00 IoT Security and OCF: The Role of Standards by Mark Walker
11:00-12:00 Privacy: A New Hope
11:00-11:20 Do You See What I See? Differential Treatment of Anonymous Users by Damon McCoy
11:20-11:40 Privacy and Information Security: The Evolving Threat of Proximity Data by Mike Fong
11:40-12:00 Why our email is still being read by others, and how we can stop it by Joe Naegele
12:00-1:00 — Lunch Break
1:00-2:00 Cybersecurity & Diversity
1:00-1:20 Gender and CyberSecurity by Winifred Poster
1:20-1:40 Mental Models of Older Adults by L. Jean Camp
1:40-2:00 Comcast Neurodiversity Initiative by Arash Esmaili Zaghi
2:00-3:00 — Conclusion
2:00-2:20 Updates on what CSI has been up to
2:20-2:40 Prizes and announcements for student competition winners
2:40-3:00 Closing logistical announcements, thank you, etc.