Seminars

April 15, 2024

From Phishing to Floods: Effective and Timely Risk Communication Messages are Imperative

Ann Marie Reinhold

Montana State University

April 1, 2024

Interprocedural Binary Analysis

Matt Revelle

Montana State University

March 18, 2024

Mathematics for Cyber Security

Emilie Purvine

Pacific Northwest National Laboratory

March 4, 2024

Hierarchical Software Quality Assurance

Clemente Izurieta

Clemente Izurieta

Montana State University

February 19, 2024

Why Bits Take Bytes Out of Your Mission

Erich Devendorf

Air Force Research Laboratory

February 5, 2024

Industrial Cybersecurity: Ask Different Questions

Andrew Ginter

Andrew Ginter

Waterfall Security Solutions

November 27, 2023

Hardware Security

Shih-Lien (Linus) Lu

Washington State University

November 13, 2023

Cryptography in the Presence of Quantum Computing: New Opportunities and Research Directions

Feng-Hao Liu

Washington State University

October 30, 2023

My Journey through IT and Cybersecurity

Shaun Marquardt

Office of the Washington State Auditor

October 16, 2023

Peeking Through the Keyhole: Exploring Web-Based Privacy-Invasive Attacks

Xu Lin

Washington State University

October 9, 2023

The Darkening Tide of Digital Repression and the Risks of Journalistic Reluctance

Jennifer Henrichsen

Washington State University

September 18, 2023

Securing our Critical Infrastructure – Who is CISA and how can we help?

Daniel Brown

Cybersecurity and Infrastructure Security Agency

April 17, 2023

Cyber Overview and Opportunities of the Air Force Research Laboratory and Information Directorate

Sonja Glumich

Sonja Glumich

AFRL/RI – USAF

April 3, 2023

Structural Graph representation learning for National Security Applications and Beyond

Edoardo Serra

Edoardo Serra

Boise State University

March 20, 2023

Exploring Platform Reboot as a Security Measure for Cyber-Physical Systems

Monowar Hasan

Monowar Hasan

Washington State University

February 20, 2023

Cybersecurity and Quantum Computation in Control of Cyberphysical Systems for Next-Generation Manufacturing

Helen Durand

Helen Durand

Wayne State University

February 6, 2023

Behavioral Security Research in Information Systems

Robert Crossler

Robert Crossler

Washington State University

December 12, 2022

Sustainable Defenses against Evolving Malware in the Android Ecosystem: A Manifesto

Haipeng Cai

Haipeng Cai

Washington State University

November 28, 2022

Data and Related Issues in Applying Machine Learning to Cyber Security

James Halvorsen

James Halvorsen

Washington State University

November 14, 2022

WebAuthn: How Passwordless Authentication Works

Portrait placeholder

Slater Weinstock

Casaba Security

October 17, 2022

Fall Seminar Series Kick-off: Updates From Partner Institutions

CySER logo

CySER PIs

Partner Institutes

May 2, 2022

Cybersecurity for the Operational Technology Environment

Portrait placeholder

Cory Baker

Idaho National Laboratory

April 18, 2022

The Cyber Threat Landscape – The FBI’s Perspective

Portrait placeholder

Kevin Brennan

Federal Bureau of Investigation

April 4, 2022

Cyber Security Operations on the Front Line

Karl Scheuerman

Karl Scheuerman

Crowdstrike

March 21, 2022

Flexible and Adaptive Malware Identification Using Techniques from Biology

Elena Peterson

Elena Peterson

Pacific Northwest National Laboratory

March 7, 2022

Purposeful Design – Defending Critical Infrastructure

Charles Carroll

Charles Carroll

Schweitzer Engineering Laboratories

February 7, 2022

Can you hack it? Starting your own company

Bryson Bort

Bryson Bort

Scythe

January 10, 2022

Deepfakes and Cybersecurity Concerns

Deborah Wells

Deborah Wells

Central Washington University

November 29, 2021

Hierarchical Software Quality Assurance
Approach to Leveraging Existing Technologies and
Building Quality Gates

Clemente Izurieta

Clemente Izurieta

Montana State University

November 8, 2021

Cyberhawks and Beyond

Matthew Boehnke

Matthew Boehnke

Columbia Basin College

October 25, 2021

Probabilities, Percentages, and Professions of Performance

Jim Alves-Foss

Jim Alves-Foss

University of Idaho

October 11, 2021

CySER Overview and Machine Learning

Assefaw Gebremedhin

Assefaw Gebremedhin

Washington State University

September 16, 2021

Cybersecurity Panel

CySER logo

Schweitzer Engineering Laboratories

Washington State University