Next Seminar
Scholarship Opportunities for Cybersecurity Students
Dr. Assefaw Gebremedhin, Associate Professor
School of Electrical Engineering and Computer Science, Washington State University
March 24, 1:10 – 2:00 PM Pacific
Upcoming Seminars
Previous Seminars
Spring 2026
March 3, 2026
Beyond the Harm Principle: What Students Can Teach Us About Cyber-Sanctity
February 17, 2026
Securing Machine Learning: Evolving Threats, Attacks, and Defenses
February 3, 2026
Machine Learning to Evaluate Governance, Risk, and Compliance Associated with Large Language Models
Fall 2025
November 18, 2025
CySER Student Experiences in VICEROY’s MAVEN and ENVOY Internships
October 28, 2025
Post-Quantum Cryptography in Practice: From Standards to Systems
October 14, 2025
How Can Blockchain Enhance Trust in Digital Forensics and Evidence?
September 30, 2025
Cyber-physical system recovery from sensor attacks
Spring 2025
April 15, 2025
Securing Washington State Energy Critical Infrastructure
April 1, 2025
Operational Technology Cybersecurity in the Chemical Process Industries: Implications of Compromised Distributed Control Systems and Safety Instrumented Systems
March 18, 2025
Practical Cybersecurity Defenses for Organizations of Any Size
March 4, 2025
Emerging Technologies for Cyber-Physical Power System Security
February 25, 2025
CyberCorps Scholarship for Service Program at WSU: Developing the Next-Generation Cyber Workforce
February 11, 2025
Are Machine Learning Detectors Sufficient? Exploring Cyberattacks and Defense Strategies in Smart Grids
Fall 2024
November 19, 2024
The Importance of Creating a Physical and Digital Identity Strategy to Combat Fraud
November 5, 2024
Securing our Critical Infrastructure – Who is CISA and how can we help?
October 22, 2024
Building Trust in an Untrustworthy World
October 8, 2024
Does Space AI Security Matter? Unlocking Privacy-Preserving Federated LEO Satellite Learning for Border Threat Detection
October 1, 2024
Correctness and Verification Using Software Contracts
Spring 2024
April 15, 2024
From Phishing to Floods: Effective and Timely Risk Communication Messages are Imperative
April 1, 2024
Interprocedural Binary Analysis
March 18, 2024
Mathematics for Cyber Security
March 4, 2024
Hierarchical Software Quality Assurance
February 19, 2024
Why Bits Take Bytes Out of Your Mission
February 5, 2024
Industrial Cybersecurity: Ask Different Questions
Fall 2023
November 13, 2023
Cryptography in the Presence of Quantum Computing: New Opportunities and Research Directions
October 30, 2023
My Journey through IT and Cybersecurity
October 16, 2023
Peeking Through the Keyhole: Exploring Web-Based Privacy-Invasive Attacks
October 9, 2023
The Darkening Tide of Digital Repression and the Risks of Journalistic Reluctance
September 18, 2023
Securing our Critical Infrastructure – Who is CISA and how can we help?
Spring 2023
April 17, 2023
Cyber Overview and Opportunities of the Air Force Research Laboratory and Information Directorate
April 3, 2023
Structural Graph representation learning for National Security Applications and Beyond
March 20, 2023
Exploring Platform Reboot as a Security Measure for Cyber-Physical Systems
February 20, 2023
Cybersecurity and Quantum Computation in Control of Cyberphysical Systems for Next-Generation Manufacturing
February 6, 2023
Behavioral Security Research in Information Systems
Fall 2022
December 12, 2022
Sustainable Defenses against Evolving Malware in the Android Ecosystem: A Manifesto
November 28, 2022
Data and Related Issues in Applying Machine Learning to Cyber Security
November 14, 2022
WebAuthn: How Passwordless Authentication Works
October 17, 2022
Fall Seminar Series Kick-off: Updates From Partner Institutions
Spring 2022
May 2, 2022
Cybersecurity for the Operational Technology Environment
April 18, 2022
The Cyber Threat Landscape – The FBI’s Perspective
April 4, 2022
Cyber Security Operations on the Front Line
March 21, 2022
Flexible and Adaptive Malware Identification Using Techniques from Biology
March 7, 2022
Purposeful Design – Defending Critical Infrastructure
February 7, 2022
Can you hack it? Starting your own company
January 10, 2022
Deepfakes and Cybersecurity Concerns
Fall 2021
November 29, 2021
Hierarchical Software Quality Assurance Approach to Leveraging Existing Technologies and Building Quality Gates
October 25, 2021
Probabilities, Percentages, and Professions of Performance
October 11, 2021
CySER Overview and Machine Learning