|
Today we talk with Kim Milford, who leads the Research and Education Networks Information Sharing and Analysis Center (REN-ISAC) at Indiana University. We'll dive into the SolarWinds Hack that…
|
|
Dr. Efthymiopoulos is an Associate Professor of International Security and Strategy and former Dean of the College of Security and Global Studies, at the American University in the Emirates. He holds…
|
|
Ms. Stifel is an attorney and the founder of Silicon Harbor Consultants, a firm that provides strategic cybersecurity operations and policy counsel. She currently serves as Cybersecurity Policy…
|
|
Ms. Past is a cyber-defense and strategic communication professional. She currently serves as Chief Research Officer of the cybersecurity branch of the Estonian Information System Authority. She has…
|
|
|
|
Optimal Investment in Cybersecurity (Alex Alexeev, Prof. Kerry Krutilla) Link to paper: http://dlc.dlib.indiana.edu/dlc/bitstream/handle/10535/10289/Optimal%20Investment%20in%20Cybersecuri...
|
|
Advancing the Science of Cybersecurity Risk Assessment through Holistic, Dynamic Modeling (Prof. Diane Henshel, Mariana Cains, & Alex Alexeev)
|
|
Sometimes Three Rights Really Do Make a Wrong: Measuring Cybersecurity and Simpson’s Paradox (Prof. Eric Jardine, Virginia Polytechnic Institute & State University)
|
|
Official Welcome by IU Provost Lauren Robel
|
|
Emanations of the Informational State: Cyber Operations and the Difficulties (Prof. Sandra Braman, Texas A&M). Link:…
|
|
What Might Have Been and Could Still Be – TPP’s Potential to Encourage an Open Internet and Digital Rights (Prof. Susan Ariel Aaronson, George Washington University)
|
|
Too-Big-To-Fail 2.0: Cybersecurity & Online Platforms (Prof. Nizan Geslevich Packin, City University of New York)
|
|
This talk examines Russia’s evolving information strategy abroad, examining the variety of different tools now being used to try to influence the domestic political discourse and media space of…
|
|
Becoming an Information Security Engineer (Ashwin J. Mathew, Packet Clearing House)
Discussant: Prof. Barbara Cherry (IU)
|
|
Security of the Internet of Things: The Roles of Market Forces, Regulations and
Technology (Prof. Nir Kshetri, University of North Carolina at Greensboro)
Discussant: Worku Gedefa Urgessa…
|
|
Welcome from Prof. Scott Shackelford; Welcome from Federica Carugati, Ostrom Workshop Associate Director, & Introductions; Initial Brainstorming Session: Big Issues in Cybersecurity and…
|
|
|
|
Birch Bayh Lecture Series
|
|
|
|
|