Video-recorded
Complete List
December 2020. Phishing and Social Influence. Google Summit
October 2020. Keynote Speaker at the Brazilian Symposium on Cyber Security and Privacy 2020: Why Even Experienced and Highly Intelligent Developers Write Vulnerable Code and What We Should Do about It
August 2020. Alachua County Webinar. Cybersecurity Fundamentals – Deconstructing the Phishing Campaigns that Target Gmail Users. With Elie Bursztein, Google.
October 2019. Hacker 2 Hacker Conference, Sao Paulo, Brazil. Deconstructing the Phishing Campaigns that Target Gmail Users. With Elie Bursztein, Google.
August 2019. Black Hat 2019, Las Vegas, NV. Deconstructing the Phishing Campaigns that Target Gmail Users. With Elie Bursztein, Google.
June 2019 Annual Interdisciplinary Symposium in Decision Neuroscience. Cyber Social Engineering from a Neuro-Psychological Perspective.
April 2019. TEDx University of Florida. Did Evolution Hardwire Us to be Phished? Video at https://www.youtube.com/watch?v=7cm_TZJ5NXg. 3K+ views.
January 2019. USENIX ENIGMA 2019. Why Even Experienced Developers Write Vulnerable Code and What We Should Do About It. Video at https://www.youtube.com/watch?
time_continue=2&v=PgMQJ7NIbio
November 2018. University of Porto, Portugal. FAROS: Illuminating In-Memory Injection Attacks via Provenance-based Whole System Dynamic Information Flow Tracking.
October 2018. Keynote speaker at the Brazilian Symposium on Cyber Security and Privacy 2018. Cyber Deception and Social Engineering: Why Will These Attacks be the Most Devastating of the Next Decade?
August 2018. International Cyber Deception Workshop 2018. Why You Should Care About Older Adults Susceptibility to Phishing – Implications for Corporate Security and
Democracy.
June 2018. Federal University of Minas Gerais (UFMG) Brazil. FAROS: Illuminating In-Memory Injection Attacks via Provenance-based Whole System Dynamic Information Flow Tracking.
June 2018. Federal University of Parana (UFPR) Brazil. FAROS: Illuminating In-Memory
Injection Attacks via Provenance-based Whole System Dynamic Information Flow
Tracking.
February 2018. FICS Annual Cyber Security Conference. Why You Should Care About Older Adults Susceptibility to Phishing: Implications for Corporate Security and Democracy.
February 2018. MIT Lincoln Laboratory. FIRMA: Personalized Continuous Authentication.
January 2018. Federal Trade Commission (FTC). Washington, DC. Cyber Social Engineering: Why You Should Care and Implications for Democracy.
October 2017. Computing Community Consortium (CCC)- Computing Research: Addressing National Priorities and Societal Needs 2017. Washington, DC. Cyber Social
Engineering: Why You Should Care and Implications for Democracy. Video at
https://www.youtube.com/watch?time_continue=2658&v=L8ncVOK7dVo)
October 2017. Swiss Cyber Storm 2017. Luzern Switzerland. Susceptibility of C-Level Management to Spear Phishing.
January 2017. Cisco Systems, Santa Clara, CA. Leveraging Uncertainty for System Security and Software Resilience.
January 2017. USENIX ENIGMA Conference. Security For Vulnerable Populations –
On the Interplay of Weapons of Influence and Life Domains in Predicting
Older Adults Susceptibility to Spear-Phishing Emails. Video at
https://www.youtube.com/watch?v=fML_2eGKDjs&feature=youtu.be
October 2016. National Science Foundation – SPSQ Reducing Software Defects and Vulnerabilities Workshop. Looking at Software Vulnerabilities from a Psychological Standpoint.
July 2016 Department Informatik, Friedrich-Alexander Universität Erlangen-Nürnberg, Germany. How Heuristics Explain Software Vulnerabilities and How Priming Can Illuminate Developer’s Blind Spots.
April 2016. US-Brazil Workshop on Cyber Security and Privacy. Dissecting Spear Phishing Emails: On the Interplay of User Age, Weapons of Influence, and Life Domains in Predicting Phishing Susceptibility.
February 2016. Florida Institute for Cyber Security Annual Conference. Inconsistent Deception at the Operating System Level as Adjuvant Therapy Against Advanced Persistent Threats.
November 2015. National Academy of Sciences, Distinctive Voices Program. Cyber
Security and the Human Factors Behind It. Video at:
https://www.youtube.com/watch?v=sV3yzONL2KY
October 2015. SwitchOn Workshop, Sao Paulo, Brazil. Cyber Security and the Human Factors Behind It.
October 2014. Answering questions about Cyber Security from a broad audience, live on University of Florida TV: https://www.youtube.com/watch?v=PiY-ZcfBYvI
May 2015. II GREPSEC: A NSF and CRA-W/CDC Supported Workshop for Women and
Underrepresented Groups Interested in Computer Security Research. The Case for
Less Predictable Operating System Behavior.
April 2015. MIT Lincoln Lab. Interdisciplinary Computer Security: From Understanding Psychological Weapons of Influence in Spear Phishing Emails to Unpredictable Operating
Systems.
October 2013. University of Central Florida/Department of EECS. Secure and Holistic Coexistence with Kernel Extensions – A Immune System-inspired Approach.
July 2013. AT&T Research New York. Secure and Holistic Coexistence with Kernel Extension – A Immune System-inspired Approach.
May 2013. NSF/CISE CAREER Proposal Writing Workshop at the University of Texas at Arlington. Leveraging your Strengths and Challenges into a Winning Proposal
(http://crewman.uta.edu/NSF-CAREER-Workshop2013/).
November 2012. Brown University/CS Department. Holographic Vulnerability Studies: Vulnerabilities as Fractures of Interpretation as Information Flows Across Abstraction Boundaries.
October 2012. NSF Workshop for Aspiring PIs in Secure and Trustworthy Cyberspace, Raleigh NC. My SaTC Funded Research, How I got There and Future. Slides and video at: http://dimacs.rutgers.edu/Workshops/Aspiring/program.html.
May 2012. University of New Mexico/CS Department. OS-Virtual Machine Collaboration: Improving Introspection to Bridge the Semantic Gap.
March 2012. NSF CISE CAREER Workshop at Drexel University. Leveraging
your Strengths and Challenges into a Winning Proposal. http://dasl.mem.drexel.edu/nsfcise2012/index.html
April 2011. Colby College/CS Department. OS-Virtual Machine Collaboration: Improving Introspection to Bridge the Semantic Gap.