Monday June 19:
- 8:30 am | Coffee
- 9:00 am | Welcome & Logistics
- 10:00 am | What Components are Inside a Computer? | Mark Sheldon
- 11:00 am | Break
- 11:15 am | Operating systems: Why Do We Need Them? | Mark Sheldon
- 12:00 pm | Lunch
- 1:15 pm | Lab: Permissions, Access Control, Command Line | Jared Chandler
- 2:00 pm | Break
- 2:30 pm | Cryptography and Crypto Policy | Susan Landau
- 3:30 pm | Lab: Password Cracking, Gaining Local Access
- 4:30 pm | Why Does Tech Matter? | Neil Richards
- 5:15 pm | Closing Remarks
Tuesday June 20:
- 8:30 am | Coffee
- 9:00 am | Networking and Protocols | Laurin Weissinger
- 10:00 am | Break
- 10:15 am | How Does the Internet Work? Technical Internet Governance | Laurin Weissinger
- 11:15 am | Break
- 11:30 am | Lab: SQL Injection Over Network | Jared Chandler
- 12:30 pm | Lunch
- 1:30 pm | You Don't Have Any Privacy | Susan Landau
- 2:30 pm | Break
- 2:45 pm | Lab: Traffic Monitoring; Interception MITM | Jared Chandler
- 3:45 pm | Break
- 4:00 pm | How to Protect Systems on the Internet | Andy Ellis
- 5:00 pm | Closing Remarks
Wednesday June 21:
- 8:30 am | Coffee
- 9:00 am | Coding and Code Security, e.g., Heartbleed | Scott Shapiro
- 10:00 am | Break
- 10:15 am | Why Attribution Isn't Hard -- and Why It Is? | Susan Landau, Laurin Weissinger, Scott Shapiro
- 11:15 am | Break
- 11:30 am | Lab: Compromising a System | Jared Chandler
- 12:30 pm | Lunch
- 1:30 pm | Securing AI -- A Practical Guide in Defense | Karly Winkler
- 2:30 pm | Break
- 2:45 pm | Lab: Using Cryptography | Jared Chandler
- 3:45 pm | Break
- 4:00 pm | Measuring Security: Why is it Hard? | kc Claffy
- 5:00 pm | Closing Remarks
Thursday June 22:
- 8:30 am | Coffee
- 9:00 am | Hardware Needs, Issues, and Errors, eg., Specter/Meltdown | Edlyn Levine
- 10:00 am | Break
- 10:15 am | Software, Licensing, and Security | Mikalai Birukou
- 11:15 am | Break
- 11:30 am | Managing Risk and Security | Laurin Weissinger
- 12:30 pm | Lunch
- 1:15 pm | Lab: Risk Exercise | Laurin Weissinger
- 2:15 pm | Closing Remarks