Events

The I3P holds frequent meetings, workshops and conferences to share its latest findings and to discuss new research directions with stakeholders. I3P workshops showcase research results and demonstrate new tools and technologies generated by the I3P’s research initiatives. The events also provide a venue for leading experts from the industry, government and research communities to share perspectives, discuss pressing challenges, inform policy and support collaborative movement toward solutions.

The I3P Webinar Series

These complimentary 30 minute webinars, which commence at noon ET on the 3rd Friday of each month, allow our colleagues a relaxed forum through which to share insight into their work and expertise.

Contact us to receive information on upcoming webinars.

I3P Webinar Recordings

  • May 2020: Countering Cyber Sabotage with INL’s Consequence-driven Cyber-informed Engineering (CCE); Andrew Bochman (Idaho National Laboratory): Listen
  • April 2020: Supply Chain Risk and Mitigation for IoT-enabled Infrastructure Systems; Junaid Farooq and Quanyan Zhu (New York University): Listen
  • March 2020: Computers and Elections: The Good, the Bad, and the Ugly; Matt Bishop (University of California at Davis): Listen
  • February 2020: Deterring IP Theft Through Automatically Generated Fake Documents; V.S. Subrahmanian (Dartmouth College): Listen
  • December 2019: Trust in Modern Security Architectures; Terry Oxford (Johns Hopkins University): Listen
  • November 2019: Lowering the Barriers to Industrial Control System Security with GRFICS; Raheem Beyah (Georgia Institute of Technology): Listen
  • October 2019: AIR LOCKS ARE SECURE; AIR GAPS ARE A MYTH, Michael Haney (University of Idaho): Listen
  • September 2019: Dictionary Attacks on Biometrics, Nasir Memon (New York University): Listen
  • May 2019: A Consequence-driven Approach to Understanding Cybersecurity Risks of Electric Vehicle Charging Infrastructure, John Smart and Richard Carlson (Idaho National Laboratory): Listen
  • April 2019: Phishing for Solutions: Are Cybersecurity Compliance Based Programs Working?, Terry Merz (Pacific Northwest National Laboratory): Listen
  • January 2019: Peeling the Onion’s User Experience Layer: Examining Naturalistic Use of the Tor Browser, Kevin Gallagher (New York University): Listen
  • December 2018: Featuring Squeezing: Detecting Adversarial Examples in Deep Neural Networks, Yanjun Qi (University of Virginia): Listen
  • November 2018: BlockCIS—A Blockchain-based Cyber Insurance System, Gabriele Ciocarlie (SRI International): Listen
  • October 2018: ATT&CKing the Status Quo: Improving Cyber Defense with MITRE ATT&CK, John Wunder (MITRE): Listen
  • September 2018:  Living in the Internet of Things, L. Jean Camp (Indiana University): Listen
  • April 2018: Rules and Regulations: Balancing AML Efforts and Data Protection (Christopher Allison and Ms. Lizzette Marrero, The George Washington University): Listen
  • March 2018: Cybersecurity Curricula 2017: The 1st Set of Global Cybersecurity Curricular Guidelines (Diana Burley, The George Washington University): Listen
  • February 2018: Blockchain: Clarifying the Hope from the Hype (Eliezer Kanal, Carnegie Mellon University): Listen
  • January 2018: Secure Remote Attestation of Embedded Systems and IoT Devices (Karim Eldefrawy, SRI International): Listen
  • December 2017:  Measuring Human Performance on a Network (Jennifer Cowley, Army Research Laboratory): Listen
  • November 2017:  The INSuRE (Information Security Research and Education) Project (John Springer, Purdue University): Listen
  • October 2017: Cybersecurity Response as a Public “Health” Problem (John Bay, Binghamton University): Listen
  • September 2017: Preventing Zero-Day Exploits of Memory Vulnerabilities with Guard Lines (Rachel Stonehirsch, Johns Hopkins University): Listen
  • May 2017:  Hook, Line, and Sinker: Studying the Fish to Combat Phishing Attacks (Kylie Molinaro, Johns Hopkins University and doctoral candidate at the University of Buffalo): Listen
  • April 2017: Usable Privacy Management for Online Interpersonal Interactions: Aligning Privacy Settings with Contextual Expectations  (Sameer Patil, Indiana University, Bloomington): Listen
  • March 2017:  The Internet of Risky Things: Trusting the Devices that Surrounds Us (Sean Smith, Dartmouth College): Listen
  • February 2017: From Cyber Situational Awareness to Adaptive Cyber Defense (Massimiliano Albanese, George Mason University): Listen
  • December 2016: The Power and Politics of Cybersecurity Budgets (Tiina Rodrigue, Department of Education and candidate in The George Washington University’s Executive Cyber Corps Doctoral program): Listen
  • November 2016: The Role of Behavioral Theory in Cybersecurity (David Balenson, SRI International): Listen
  • October 2016: E-Voting (Matt Bishop, University of California, Davis): Listen
  • September 2016: TRENDS IN CYBER LAW: What’s new in the legal and regulatory landscape? (Rhea Siers, The George Washington University): Listen
  • August 2016: Data Privacy in the Virtualized Cloud (Kartik Gopalan, Binghamton University): Listen

 

Please see Past Events for a partial list of The I3P’s prior engagements.