Come face to face with real solutions
Meet academic and industry leaders for intimate discussions about new cyber threats, trends and technologies.
The Cybersecurity Lecture Series at Georgia Tech is a free, open-to-the-public, one-hour presentation offered each Friday, featuring thought leaders who are advancing the field of cybersecurity. Meet executives from Fortune 500 companies, researchers from federal intelligence agencies, as well as university faculty and students sharing their latest discoveries. Lectures are open to all -- students, faculty, industry, government, or simply the curious. Students may register for credit under seminar course CS-8001-INF.
-
Sign up for alerts.
-
Inquire about speaking.
-
Sponsor the series.
Spring 2021 Virtual Lecture Schedule
March
Past Lectures
2021 Spring Semester
"Grid Cybersecurity Strategy in an Attacker-Defender Model"
Yu-Cheng Chen - Ph.D. student at Georgia Institute of Technology in the School of Electrical and Computer Engineering
2020 Fall Semester
2020 Spring Semester
Past Lectures
Video and slides are available from speakers who permitted their presentations to be shared. Recordings are provided as a courtesy of the Georgia Tech Library System.
Thank You to Our Spring '18 Speakers
"The Scalability of Vulnerability Analysis"
Kennon Bittick, CIPHER Lab, Georgia Tech Research Institute [Video]
"Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC"
Shan Chen, School of Computer Science, Georgia Tech
"Clash of Cultures" Privacy and the Internet" [Video]
Ted Claypoole, Womble Bond Dickinson LLP
"Insight from an Alumnus"
Paul Everton, MailControl
"I made the very model, but the model was too general: Modeling every cyber vegetable, animal, and mineral"
David Jakob Fritz, Sandia National Laboratories
"Hacking Data-Flow for Turing-Complete Attacks" [Video]
Hong Hu, School of Computer Science, Georgia Tech
"Automated In-memory Malware/rootkit Detection via Binary Analysis and Machine Learning" [Video]
Malachi Jones, Booz Allen Dark Labs
"Enterprise Security at Georgia Tech" [Video]
Kyle Koza, Office of Information Technology, Georgia Tech
"Revocations Are Dead, Long Live Revocations" [Video]
Dave Levin, University of Maryland
"Towards Measuring the Effectiveness of Telephony Blacklists" [Video]
Sharbani Pandit, School of Computer Science, Georgia Tech
"What Do CISOs Do All Day?" [Video]
Jerry Perullo, InterContinental Exchange, Inc.
"Convicted by Memory: Recovering Spatial-Temporal Digital Evidence from Memory Images" [Video]
Brendan Saltaformaggio, School of Electrical & Computer Engineering, Georgia Tech
"Solving the Biggest Problems" [Video]
Joshua C. Sorenson, Delta Air Lines
"rtCaptcha: Video, Voice, and Smarts for Secure Authentication" [Video]
Erkam Uzun, School of Computer Science, Georgia Tech
Thank You to Our Fall '17 Speakers
“Out of Control: the expanded attack surface of control systems” [Video]
Raheem Beyah, Georgia Tech School of Electrical & Computer Engineering
"What Constitutes an Act of War in Cyberspace?" [Video]
Holly Dragoo, CIPHER Laboratory, Georgia Tech Research Institute
"Automatic Feature Engineering: Learning to Detect Malware by Mining the Scientific Literature" [Video]
Tudor Dumitras, assistant professor, University of Maryland
“The Domestic Benefits of Subversive Foreign Propaganda: The RT (Russia Today) News Network and Geopolitical Muckraking” [Video]
Hans Klein, Georgia Tech School of Public Policy
"Can Trust Be Delivered As a Service?"
Margaret Loper, Institute for Information Security & Privacy
"Tracing the Arc of Smartphone Application Security" [Video]
Patrick McDaniel, professor and director, Institute for Network and Security Research, The Pennsylvania State University
"Energy System Cybersecurity and Operational Reliability"
Sakis Meliopoulos, Institute for Information Security & Privacy
“What Can Social Science Contribute to Cybersecurity Attribution Research?”
Milton Mueller, Georgia Tech School of Public Policy
"Call Me: Gathering Threat Intelligence on Telephony Scams to Detect Fraud" [Video]
Terry Nelms, Pindrop Security
"Security and Privacy Issues of Modern Web Browsers" [Video]
Nick Nikiforakis, Stony Brook University
“Modern Malware and Secure Techniques for Better Software” [Video]
Joel Odom, CIPHER Lab, Georgia Tech Research Institute
"Why Memory Corruption is Hard" [Video]
Mathias Payer, Purdue University
“The Non-Code Aspects of Cybersecurity and the Globalization of Criminal Evidence” [Slides] [Video]
Peter Swire, Institute for Information Security & Privacy
"Multi-stakeholder Network Security Concerns" [Article]
Tony Tauber, Comcast
Thank You to Our Spring '17 Speakers
"Human Computing for Handling Strong Corruptions in Authenticated Key Exchange" [Video]
Shan Chen, Ph.D. student, Georgia Tech, School of Computer Science
"Secure Data Outsourcing: Access Pattern Confidentiality in Outsourced Databases"
Alexander Degitz, Exchange Research Scholar, Georgia Tech
"On Trust Analysis for Microelectronics-Based Systems"
Brandon Eames, technical lead, Sandia National Laboratories
"Tagging and Tracking of Multi-level Host Events for Transparent Computing" [Video]
Mattia Fazzini, Ph.D. student, Georgia Tech, School of Computer Science
"Out of Control: Ransomware for Industrial Control Systems"
David Formby, Ph.D candidate, Georgia Tech, School of Electrical & Computer Engineering
"Cloak & Dagger: From Two Android Permissions to Complete Control of the UI Feedback Loop"
Yanick Fratantonio, Ph.D. candidate, University of California, Santa Barbara
"Protecting Computing Systems from Emerging Attacks"
Yeongjin Jang, Ph.D. candidate, Georgia Tech, School of Computer Science
"Defeating Advanced Memory-Error Exploits by Preventing Information Leaks"
Kangjie Lu, Ph.D. candidate, Georgia Tech, School of Computer Science
"Online Tracking: A 1-million-site Measurement and Analysis" [Video]
Arvind Narayanan, assistant professor of computer science, Princeton University
"Hardware-Based Security and Trust For IoT and Supply Chain Authentication" [Video]
James Plusquellic, professor of electrical engineering, University of New Mexico
"Exposing Cross-Channel Abuse in Converged Communications Infrastructure with Text-Messaging Scams" [Video]
Bharat Srinivasan, Ph.D. student, Georgia Tech, School of Computer Science
"Keyless Fuzzy Search for Data-based Access Control"
Tianxin Tang, Ph.D. student, Georgia Tech, School of Computer Science
NDSS'17 Conference Preview: "Enabling Reconstruction of Attacks on Users via Efficient Browsing Snapshots" [Video]
Phani Vadrevu, Ph.D. student, University of Georgia
Thank you to our Fall '16 Speakers
"Security Analytics: Bridging large-scale data collection and analysis with human factors to design better defenses" [Video]
Nicolas Christin, associate research professor, Carnegie Mellon University CyLab
"Towards Measuring and Mitigating Social Engineering Software Download Attacks" [Video]
Terry Nelms, Pindrop
"Myths of Computer Security"
Curtis Walker, Draper Laboratory
"Understanding, Alleviating and Exploiting Electro-Magnetic Side-Channel Signals" [Video]
Milos Prvulovic, professor, Georgia Tech School of Computer Science
"Breaking Kernel Address Space Layout Randomization (KASLR) with Intel TSX" [Video]
Yeongjin Jang, PhD student, Georgia Tech School of Computer Science
"Cryptographically Enforced Access Control for User Data in Untrusted Clouds" [Presentation Slides] [Video]
Frank Wang, PhD student, MIT & Cybersecurity Factory
"Managing Product Security and Integrity in a Global Supply Chain" [Video]
Yousef Iskander, hardware security researcher, and Dmitry Kuchynski, security principal, Cisco Security Group
"Automating Analysis and Exploitation of Embedded Device Firmware" [Presentation Slides]
Malachi G. Jones, embedded security researcher, Booz Allen Dark Labs
"Defending against Advanced Return-Oriented Programming Attacks" [Video]
Michalis Polychronakis, assistant professor, Stony Brook University
"Fault Injection as an Attack Vector Against Trustworthy Embedded Systems" [Video]
Patrick Schaumont, professor, Virginia Tech
"The Evolution of Modern Malware: Technology Trends and Motivations” [Video]
Chris Smoak, division chief, GTRI Cyber Technology & Information Security Laboratory
"Leveraging Information Symmetry and Asymmetry for Effective Cyber Defense” [Presentation Slides]
Jeff Reava, CISSP, CISM, CISA; director of information security operations, Jackson National Life Insurance Company
“ASwatch: An AS Reputation System to Expose Bulletproof Hosting ASes” [Video]
Maria Konte, post-doctoral fellow, Georgia Tech School of Computer Science
"The Evolution of Data Privacy: From Concept to Execution"
Ling Liu, professor, Georgia Tech School of Computer Science
Thank you to our Spring '16 speakers
Wenke Lee, professor, College of Computing
Stephen Pair, CEO, BitPay [Video]
Frank Wang, coordinator, The Cybersecurity Factory [Video]
Sivakumar "Siva" Raghupathy, director, CREATE-X
Adam Wenchel, VP for Security & Tech Analytics, Capital One [Video]
Kyle Grossman and Jim Schwoebel, co-founders, CyberLaunch
Tim Junio, co-founder and CEO, Qadium Inc.
And Graduate Students:
Byoungyoung Lee [Video]
Kangjie Liu
David Formby
Chengyu Song
and Ren Ding [Video]