Seminars

Next Seminar

Scholarship Opportunities for Cybersecurity Students

Assefaw Gebremedhin

Dr. Assefaw Gebremedhin, Associate Professor

School of Electrical Engineering and Computer Science, Washington State University

March 24, 1:10 – 2:00 PM Pacific

Upcoming Seminars

  • April 7
  • April 21

Previous Seminars

March 3, 2026

Beyond the Harm Principle: What Students Can Teach Us About Cyber-Sanctity

Dr. Sherri Lynn Conklin

Washington State University

February 17, 2026

Securing Machine Learning: Evolving Threats, Attacks, and Defenses

Dr. Steve Wang

University of Idaho

February 3, 2026

Machine Learning to Evaluate Governance, Risk, and Compliance Associated with Large Language Models

Dr. Upakar Bhatta

Central Washington University

November 18, 2025

CySER Student Experiences in VICEROY’s MAVEN and ENVOY Internships

CySER logo with clear background

Collin Bale

Caitlyn Boyd

Adam Caudle

William Fralia

Washington State University

October 28, 2025

Post-Quantum Cryptography in Practice: From Standards to Systems

Dr. Ishaani Priyadarshini

Washington State University

October 14, 2025

How Can Blockchain Enhance Trust in Digital Forensics and Evidence?

Dr. Asma Jodeiri Akbarfam

Washington State University

September 30, 2025

Cyber-physical system recovery from sensor attacks

Dr. Mengyu Liu

Washington State University

April 15, 2025

Securing Washington State Energy Critical Infrastructure

Elizabeth King

Washington State Department of Commerce

April 1, 2025

Operational Technology Cybersecurity in the Chemical Process Industries: Implications of Compromised Distributed Control Systems and Safety Instrumented Systems

Peyton Richmond

Lamar University

March 18, 2025

Practical Cybersecurity Defenses for Organizations of Any Size

Photo of Frank Harrill

Frank Harrill

Schweitzer Engineering Laboratories

March 4, 2025

Emerging Technologies for Cyber-Physical Power System Security

Muhammad Ismail

Tennessee Technological University

February 25, 2025

CyberCorps Scholarship for Service Program at WSU: Developing the Next-Generation Cyber Workforce

Assefaw Gebremedhin

Assefaw Gebremedhin

Washington State University

February 11, 2025

Are Machine Learning Detectors Sufficient? Exploring Cyberattacks and Defense Strategies in Smart Grids

Bo Liu

Washington State University

November 19, 2024

The Importance of Creating a Physical and Digital Identity Strategy to Combat Fraud

Jaime Rojas

Experian

November 5, 2024

Securing our Critical Infrastructure – Who is CISA and how can we help?

Daniel Brown

Cybersecurity and Infrastructure Security Agency

October 22, 2024

Building Trust in an Untrustworthy World

Jess Smith

Pacific Northwest National Laboratory

October 8, 2024

Does Space AI Security Matter?
Unlocking Privacy-Preserving Federated LEO Satellite Learning for Border Threat Detection

Mohamed Elmahallawy

Washington State University

October 1, 2024

Correctness and Verification Using Software Contracts

Thomas Gilray

Washington State University

April 15, 2024

From Phishing to Floods: Effective and Timely Risk Communication Messages are Imperative

Ann Marie Reinhold

Montana State University

April 1, 2024

Interprocedural Binary Analysis

Matt Revelle

Montana State University

March 18, 2024

Mathematics for Cyber Security

Emilie Purvine

Pacific Northwest National Laboratory

March 4, 2024

Hierarchical Software Quality Assurance

Clemente Izurieta

Clemente Izurieta

Montana State University

February 19, 2024

Why Bits Take Bytes Out of Your Mission

Erich Devendorf

Air Force Research Laboratory

February 5, 2024

Industrial Cybersecurity: Ask Different Questions

Andrew Ginter

Andrew Ginter

Waterfall Security Solutions

November 27, 2023

Hardware Security

Shih-Lien (Linus) Lu

Washington State University

November 13, 2023

Cryptography in the Presence of Quantum Computing: New Opportunities and Research Directions

Feng-Hao Liu

Washington State University

October 30, 2023

My Journey through IT and Cybersecurity

Shaun Marquardt

Office of the Washington State Auditor

October 16, 2023

Peeking Through the Keyhole: Exploring Web-Based Privacy-Invasive Attacks

Xu Lin

Washington State University

October 9, 2023

The Darkening Tide of Digital Repression and the Risks of Journalistic Reluctance

Jennifer Henrichsen

Washington State University

September 18, 2023

Securing our Critical Infrastructure – Who is CISA and how can we help?

Daniel Brown

Cybersecurity and Infrastructure Security Agency

April 17, 2023

Cyber Overview and Opportunities of the Air Force Research Laboratory and Information Directorate

Sonja Glumich

Sonja Glumich

AFRL/RI – USAF

April 3, 2023

Structural Graph representation learning for National Security Applications and Beyond

Edoardo Serra

Edoardo Serra

Boise State University

March 20, 2023

Exploring Platform Reboot as a Security Measure for Cyber-Physical Systems

Monowar Hasan

Monowar Hasan

Washington State University

February 20, 2023

Cybersecurity and Quantum Computation in Control of Cyberphysical Systems for Next-Generation Manufacturing

Helen Durand

Helen Durand

Wayne State University

February 6, 2023

Behavioral Security Research in Information Systems

Robert Crossler

Robert Crossler

Washington State University

December 12, 2022

Sustainable Defenses against Evolving Malware in the Android Ecosystem: A Manifesto

Haipeng Cai

Haipeng Cai

Washington State University

November 28, 2022

Data and Related Issues in Applying Machine Learning to Cyber Security

James Halvorsen

James Halvorsen

Washington State University

November 14, 2022

WebAuthn: How Passwordless Authentication Works

Portrait placeholder

Slater Weinstock

Casaba Security

October 17, 2022

Fall Seminar Series Kick-off: Updates From Partner Institutions

CySER logo

CySER PIs

Partner Institutes

May 2, 2022

Cybersecurity for the Operational Technology Environment

Portrait placeholder

Cory Baker

Idaho National Laboratory

April 18, 2022

The Cyber Threat Landscape – The FBI’s Perspective

Portrait placeholder

Kevin Brennan

Federal Bureau of Investigation

April 4, 2022

Cyber Security Operations on the Front Line

Karl Scheuerman

Karl Scheuerman

Crowdstrike

March 21, 2022

Flexible and Adaptive Malware Identification Using Techniques from Biology

Elena Peterson

Elena Peterson

Pacific Northwest National Laboratory

March 7, 2022

Purposeful Design – Defending Critical Infrastructure

Charles Carroll

Charles Carroll

Schweitzer Engineering Laboratories

February 7, 2022

Can you hack it? Starting your own company

Bryson Bort

Bryson Bort

Scythe

January 10, 2022

Deepfakes and Cybersecurity Concerns

Deborah Wells

Deborah Wells

Central Washington University

November 29, 2021

Hierarchical Software Quality Assurance
Approach to Leveraging Existing Technologies and
Building Quality Gates

Clemente Izurieta

Clemente Izurieta

Montana State University

November 8, 2021

Cyberhawks and Beyond

Matthew Boehnke

Matthew Boehnke

Columbia Basin College

October 25, 2021

Probabilities, Percentages, and Professions of Performance

Jim Alves-Foss

Jim Alves-Foss

University of Idaho

October 11, 2021

CySER Overview and Machine Learning

Assefaw Gebremedhin

Assefaw Gebremedhin

Washington State University

September 16, 2021

Cybersecurity Panel

CySER logo

Schweitzer Engineering Laboratories

Washington State University