Presentation slides are now available for most sessions. Click on the presentation title to view slides.
Cyber Evolution by Ted Schlein, a presentation of USF and The SunTrust Foundation Lecture Series
The Benefits of Social Science Research for Cybersecurity Panel
George Burruss of the University of South Florida
Cybersecurity pros often focus on the technical causes and solutions for cybercrime, but what about the human factor? How can we use our knowledge of criminal behavior and motivation to help combat cybercrime?
Hacking the Supply Curve for Cybersecurity Talent
Douglas Logan, US Cyber Challenge
The cybersecurity industry is in drastic need of highly skilled talent. How can we identify, train, and assess new talent? What are employers--and employees--looking for?
Behavioral Aspects/Human Elements: Cybersecurity Violations in Crowdsourcing
Gert-Jan de Vreede and Agnieszka Onuchowska, University of South Florida
Crowdsourcing can be an effective problem-solver, but the practice is increasingly falling victim to disruptive elements. Explore the threats to crowdsourcing and ways to mitigate those threats.
Who is the "Weakest Link" in the US Mortgage Industry Cyber Supply Chain?
Juliet Okafor, JD, Fortress Information Security
The mortgage industry trades massive amounts of sensitive personal data. Hear the shocking results of one team's study of the cyber risks posed by the mortgage industry supply chain.
Building and Analyzing Secure Cloud Architectures and Ecosystems Using Software Patterns
Dr. Eduardo Fernandez-Buglioni, Florida Atlantic University
Patterns abstract good practices to define models that can be used to build new systems and evaluate existing systems. Learn how to create a catalog of security and misuse patterns, integrate these patterns into a security reference architecture, and extend that SRA to the cloud's ecosystem.
Classifying Phishing URLs Using Deep Recurrent Neural Networks
Sergio Villegas, Easy Solutions, Inc.
Examine the astounding results that Villegas and his team achieved when they used URLs as input to machine learning models to predict whether a site might be a phishing site.
How do we get "Left of Boom?"
Michael Pepin of NC4 Soltra
When faced with a cyberattack, we react. How can we get from being reactive to proactive using Cyber Threat Intelligence (CTI)?
The Cloud: An Opportunity to Revisit Security
Kerry Long, IARPA
Large commercial clouds are changing the way organizations perform computing tasks and inspiring impressive innovations. Cybersecurity innovations, however, are less impressive. How can we use the cloud to reinvent cybersecurity?