Recent Talks
- 2017-10-09: Hacking the coginitive system - Deception in CyberWarfare - All CyberWar is Based on Deception?
- 2017-06-12: Kennedy Space Center: Cyber Warfare - the BIG picture
- 2016-08-29: HTCIA Keynote: FBI v. Apple - The Equities Issue
- 2016-03-24: The Cyber Silk Road - Risks and Rewards
- 2016-03-16: Big Data and Cyber Security
- 2016-01-04 IFIP TC11 New Delhi - Generalizations to Travel Time Consistency Checking
2015-07-20 TakeDownCon Talk Slides
- 2015-03-16 Fearless Security: Information Sharing (small)
(med)
(big)
(YouTube)
- 2015-01-20 Fearless Security: Standards of Practice in Context - Part 2 - how we are applying it (small)
(med) (big)
(1080p)
(youtube)
- 2014-12-09 Fearless Security: Standards of Practice in Context - Part 1 - some examples (small)
(med) (big)
(1080p)
(youtube)
- 2014-11-04 Fearless Security: Technical Security Architecture - Structure and Content (small)
(med) (big)
(1080p)
- 2014-10-07 Fearless Security: Technical Security Architecture - Behavior and Perception (small)
(med) (big)
(1080p)
- 2014-09-24 Developing a global standard of practice supported by the science of information protection, Keynote Address Beijing, China
- 2014-09-25 Beijing, China, Digital diplomatics, consistency analysis, and digital forensics
- 2014-09-17 SARA and Standards of Practice - The ICS-ISAC SARA Conference
- 2014-09-08 Fearless Security: Technical Security Architecture - Process and Data State (small)
(med) (big)
(1080p)
- 2014-09-02 Webster Lab 1 (small)
(med) (big)
(1080p)
- 2014-08-20 Webster Man in the Middle Lab (small)
(med) (big)
(1080p)
- 2014-08-11 Fearless Security: Technical Security Architecture - Lifecycles and Context (Small)
(Med)
(Large)
(1080p)
- 2014-08-03 Webster Cyber Explorers Overview and Prospectus (small)
(med) (big)
(1080p)
- 2014-08-03 Webster CyberLab Access (small)
(med) (big)
- 2014-07-17 Webster CyberLAb Architecture (small)
(med) (big)
- 2014-07-14 Fearless Security: Technical Security Architecture - Inventory, Workflow, and Metadata (small)
(med) (big)
- 2014-07-10 K4 - Decision-making for Investors (small)
(med) (big)
- 2014-06-16 Fearless Security: Technical Security Architecture Overview (small)
(med) (big)
- 2014-06-11 K4 - Decision Making For Investors (small)
(med) (big)
- 2014-05-12 Fearless Security: Control Architecture (small)
(med) (big)
- 2014-04-17 The Webster CyberLab DDoS demonstration (small)
(med) (big)
- 2014-04-14 Governance (small)
(med) (big)
- 2014-03-10 Risk Management - There are some subtleties (small)
(med) (big)
- 2014-02-10 Risk Management Concepts (small)
(med) (big)
- 2014-01-23 Decider Introduction (small)
(med) (big)
- 2014-01-20 Fearless Security - Duty to Protect (small)
(med) (big)
- 2013-12-16 Fearless Security - Understanding your business (small)
(med) (big)
- 2013-11-14 Digital diplomatics and forensics - Going forward on a global basis - Paris, Digital Diplomatics talk
- 2013-11-11 Fearless Security - The Basics (cell)
(med) (big)
- 2013-11-11 Fearless Security - The Basics (slides)
- 2013-09-11 50 CyberSecurity Myths and What To Do About Them - DARPA CyberSecurity Forum
- 2013-05-22 Building a new scientific theory and practice of digital forensics - 1st International Summit of Digital Forensics Keynote Address
- 2013-02-11 The need for science and engineering disciplines to move the information protection field forward - CMU CyLab Invited Speaker
- 2012-11-15 Distributed Denial of Services - San Francisco Electronic Crimes Task Force
- 2012-10-17 Separation Technology Options - Separation Management Decisions - Industrial Control Systems Joint Working Group
- 2012-09-21 The Future of Digital Forensics - 1st Chinese Conference on Digital Forensics
- 2012-05-25 Forensic Methods for Detecting Insider Turning Behaviors - IEEE WRIT
- 2012-01-24 Detection of Insider Turning Behaviors with Forensic Methods - DoD CyberCrime
- 2011-10-26 - Using architectural analysis tools for better protection decisions
- 2011-09-29 - Security Reference Architecture Frameworks - An Approach for the Energy Sector
- 2011-09-22 - ICS Security Architecture - Where Worlds Collide - SecureWorld
- 2011-06-28 - Securing the Mobile Enterprise - Mobile Computing Summit 2011 - Security Workshop
- 2011-06-15 - Keynote on the Science of Security - Bogota
- 2011-06-14 - Challenges to Digital ForensicEvidence - Short Course - Bogota
- 2011-05-25 IEEE Oakland Conference: The need for and progress in science for information protection and digital forensics
- 2011-02-14 MiniMetriCon: How to Tell When an Insider is About to Go Bad
- 2011-02-14 MiniMetriCon: Metrics for Digital Forensics
- 2011-01-31 IFIP Conference Slides
- 2010-09-13 NeFX Workshop - Slides
- 2010-09-14 NeFX Workshop - Digital Forensic Evidence Examination - The State of the Science - and Where to Go From Here
- 2010-08-19 NPS - Recent and Hoped for Advances in Digital Forensics
- 2010-08-11 Power Grid Protection
- 2010-05-20 Forensic Fonts presented at SADFE
- 2010-02-02 Risk Management: There Are No Black Swans (for the Canadian Bankser's Association)
- 2010-01-07 Attribution of Messages to Sources in Digital Forensics
- 2010-01-04 The Science of Digital Forensic Evidence Examination
- 2009-10-06 The Forensics Show: Challenges to Digital Forensic Evidence
- 2009-08-25 HTCIA talk: Challenges to Digital Forensic Evidence
- 2009-08-25 HTCIA talk: What you See is NOT What you Get
- 2009-08-24 HTCIA talk: Bulk Email Forensics
- 2009-08-06 Radio show (Mytechnologylawyer.com - audio only)
- 2009-07-30 Catalyst Presentation - There are no Black Swans in Security
- 2009-07-24 IEEE Workshop on Digital Forensics - Analysis of Redundant Traces for Consistency
- 2009-05-19 IEEE Oakland Conference Short Talk - Information Physics
- 2009-05-21 - Two models of digital forensic examination - SADFE Oakland
- 2009-05-11 Computer Viruses - Then, Now, and Then Again, EICAR Keynote
- 2009-04-20 Metrics for Digital Forensics - MiniMetriCon
- 2009-01-26 Email Forensics - HICSS 2009
- 2008-04-11 Decision Support Systems for Security - RSA Conference
- 2008-04-07 Metrics for Digital Forensics - MiniMetriCon
- 2008-03-06 Fitting Information Security into the Business
- 2008-02-28 1996 DCA presentation used for...
- 2008-02-28 2008 ISOI DCA presentation - DCAs then and now
- 2008-01-28 Kyoto 2008 presentation on digital forensics
- 2006-02-28 Challenges to Digital Forensic Evidence - CyberCrime Summit
- 2005-11-14 Security Metrics talk at CSI on 2005-11-14
- 2002-08-27 Hostile Code DARPA Workshop Talk
- 2002-05-13 EXE Wrappers - IEEE Oakland Conference (posted 2002/05/08)
- 2002-05-13 Secure Bootable CDs - IEEE Oakland Conference (posted 2002/05/08)
- 2002-05-13 SecureLink - IEEE Oakland Conference (posted 2002/05/08)
- 2002-05-13 The Mathematics of Shredding - IEEE Oakland Conference (posted 2002/05/08)
- 2002-05-13 Progress in Deception - IEEE Oakland Conference (posted 2002/05/08)
- 2002-02-20 CyberTerrorism Conference
- 2002-02-03 CyberCrime Conference - Keynote
- 2001-04-27 Mytrle Beach Conference - Keynote
- UNH HIPAA Presentation
- 2000-11-?? I Know More About Your Organization Than You Do!, CSI Network Security Conference, Chicago, November, 2000
- 2000-11-?? Issues in Cyber Defense and the Need for Industry/ University Collaboration
Guest Lecture at the University of Nebraska, Omaha, NE
- 2000-06-12 Controlling Large-Scale Deceptions - CSI NetSec '00 San Francisco
- 2000-05-16 Government Technology Conference Sacramento, CA
- 2000 HTCIA - Part 1 - New Jersey, 2000
- 2000 HTCIA - Part 2 - New Jersey, 2000
- 2000 HTCIA - Part 3 - New Jersey, 2000
- 2000 HTCIA - Part 4 - New Jersey, 2000
- 1999 Worker Monitoring - Comdex 1999, Las Vegas, NV
- Cyber-Terrorism Threats, Vulnerabilities, Consequences & Emerging/Future Defense Technologies
- Jane's Defense Weekly Conference on Cyber-Terrorism in Washington, DC
- 1999 50 Ways to defeat your PKI and other Cryptosystems - CSI 99 Annual Conference in Washington DC
- 1999 The Increasing Role of Deception in Information Protection - CSI 99 Annual Conference in Washington DC
- 1999 NIST 99 Conference Presentation
- (text-only version)
Fred Cohen's part of the session at NIST99 on vulnerability assessment
(primarily friendly hacking)
- 1998-10-15 Scenario-Based Training
- (text-only version)
Fred Cohen's talk to the CAISSWG about the use of
scenario-based games for training, policy development, and strategic
support.
- 1997-11-17 The Network Game: A New Approach
- (text-only version)
Fred Cohen's talk on the use of games for policy development and employee
training at the 24th Annual Computer Security Conference and Exhibition
in Washington, D.C.
- 1997-11-06 New Directions in Information
Protection - (text-only
version) Fred Cohen's keynote address to the 14th World Confreence
on Computer Security, Audit, and Control in London, England
- 1995 The How and Why of Organizational
Information Protection - (text-only
version) Fred Cohen's keynote address at
the Computer Security Establishment Annual Conference in Toronto, Canada.