Friday, December 14, 2018 — 12:00 PM to 4:00 PM EST

As part of the Cybersecurity and International Affairs Workshops by the Cybersecurity and Privacy Institute and the Balsillie School of International Affairs

Friday, December 7, 2018 — 12:00 PM to 4:00 PM EST

As part of the Cybersecurity and International Affairs Workshops by the Cybersecurity and Privacy Institute and the Balsillie School of International Affairs

Monday, November 26, 2018 — 10:30 AM EST

N. Asokan, Department of Computer Science
Aalto University, Finland

Friday, November 23, 2018 — 12:00 PM to 4:00 PM EST

As part of the Cybersecurity and International Affairs Workshops by the Cybersecurity and Privacy Institute and the Balsillie School of International Affairs

Friday, November 9, 2018 — 12:00 PM to 4:00 PM EST

As part of the Cybersecurity and International Affairs Workshops by the Cybersecurity and Privacy Institute and the Balsillie School of International Affairs

Friday, November 2, 2018 — 2:30 PM EDT

Nate Cardozo, Electronic Frontier Foundation

Thursday, November 1, 2018 — 6:30 PM to 9:00 PM EDT

Join President and Vice-Chancellor Feridun Hamdullahpur for a panel discussion on the far-reaching field of Cybersecurity & Privacy. This event will feature a panel of experts sharing their knowledge and understanding in the field of cybersecurity and privacy, followed by a Q&A session with the audience.

Monday, October 22, 2018 — 2:00 PM EDT

Text Anonymization with Differential Privacy

Ben Weggenmann, SAP Security Research 

Friday, September 28, 2018 — 10:00 AM to 2:30 PM EDT
Graphical representation of cybersecurity with a lock

Join us

On Friday, September 28 we will launch the new Cybersecurity and Privacy Institute.

Tuesday, September 25, 2018 — 3:00 PM EDT

Adam Molnar, Deakin University

Abstract

Tuesday, July 31, 2018 — 11:00 AM EDT

Vern Paxson, University of California, Berkeley / Corelight, Inc. / International Computer Science Institute

Tuesday, July 10, 2018 — 2:30 PM EDT

Matthew Finkel, The Tor Project

There are hundreds of millions of new "smart" mobile device users every year, but the mobile ecosystem and infrastructure are designed and built for optimizing convenience, not protecting the privacy of the user. From a design flaw in the Internet Protocol to an abundence of physical sensors, a mobile device may tell a third-party more information than the user intended or wanted. 

Monday, July 9, 2018 — 2:30 PM EDT

Chelsea Komlo, HashiCorp

​Privacy Enhancing Technology communities rely on the research community for help designing and validating protocols, finding potential attack vectors, and applying new technological innovations to existing protocols. However, while the research community has made significant progress studying projects such as Tor, the number of research outcomes that have actually been incorporated into privacy enhancing technologies such as The Tor Project is lower than the number of feasible and useful research outcomes. 

Thursday, June 28, 2018 — 2:30 PM EDT

Cecylia Bocovich, PhD candidate
David R. Cheriton School of Computer Science

S M T W T F S
31
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
1
2
3
  1. 2019 (13)
    1. October (5)
    2. September (1)
    3. August (1)
    4. June (1)
    5. May (1)
    6. March (1)
    7. January (3)
  2. 2018 (15)
    1. December (2)
    2. November (5)
    3. October (1)
    4. September (2)
    5. August (1)
    6. July (3)
    7. June (1)
  3. 2017 (1)