19 October 2017 | Invited Talk Comcast/UConn CyberSEED Conference, Hartford, CT, USA |
20-22 October 2015 | Multiple Invited Talks and Panels Dell World, Austin, TX, USA |
27 May 2015 | Mainstage Panel: Security Within
Dell Dell Annual Analyst Conference (DAAC), Austin, TX, USA |
13 May 2015 | Invited Talk: Data Is the New
Currency CenterPoint Energy Innovation Day, Houston, TX, USA |
27 March 2015 | Invited Talk: The Detection and
Prevention of Insider Threat Women in Cyber Security (WiCyS) Conference, Atlanta, GA, USA |
29 October 2014 | Keynote Panel: Digital Privacy and Cybersecurity: A 21st Century Journey or Illusion? Internet2’s 2014 Technology Exchange, Indianapolis, IN, USA |
17 October 2014 | Invited Talk: grep visualizations
/var/logs/unused B-Sides Raleigh, Raleigh, NC, USA |
13 May 2014 | Invited Talk: Visualizations and
Sys Admins Don’t Mix! Big Data Visualization Meetup, Santa Clara, CA, USA |
19 February 2014 | Invited Talk: Data is the New
Currency Data Privacy Day, Halifax, NS, Canada |
6 June 2013 | Keynote: Tech Transfer in the
Trenches 22nd Australian Software Engineering Conference, Melbourne, Australia |
11 April 2012 | Invited Talk: Security: Computing
in an Adversarial Environment ACM Webinar, Virtual |
1 March 2012 | Keynote: Protecting Business in the
New World Order RSA Conference, San Francisco, CA, USA |
11 November 2011 | Plenary Panel: Partnering with Executive Leaders for Shared Vision and Career Growth Grace Hopper Celebration of Women in Computing, Portland, OR, USA |
23 October 2010 | Invited Talk: Technology Trends for the
Future, and Their Implications Ontario Celebration of Women in Computing 2010, Kingston, ON, Canada |
25 August 2010 | Workshop on Insider Threats: Strategies for Prevention, Mitigation, and Response, Schloss Dagstuhl, Germany |
29 July2010 | Invited Talk: Applying Visualization to
Security Information Burton Group's Catalyst Conference North America 2010, San Deigo, USA |
17 May 2010 | CA World, Las Vegas, USA |
19 September 2009 | Keynote: Usability Challenges in the
Security Domain: Is Security a Special Case? 3rd India International HCI Conference, Bangalore, India |
15 September 2009 | Invited Talk: Technology Trends for the
Future, and Their Implications for Governance and Privacy Second International Symposium on Global Information Governance , Prague, Czech Republic |
16 June 2009 | ISSNet NSERC Strategic Network Grant on CyberSecurity, Carleton University, Canada |
11 June 2009 | CA Council for Technical Excellence, Los Angeles, USA |
22 April 2009 | CA Architect's Conference, Islandia, NY, USA |
18 February 2009 | Digital Security Lab, Carleton University, Canada |
12 February 2009 | Software Security Lab, University of California Irvine, USA |
20 January 2009 | Security Research Group, University of California Davis, USA |
20 July 2008 | Workshop on Countering Insider Threats, Schloss Dagstuhl, Germany |
12 March 2008 | Information Security Group, Istituto di Informatica e Telematica (IIT), National Research Council (C.N.R.), Pisa, Italy |
5 March 2008 | Pacific Northwest National Laboratory, Richland, USA |
22 February 2008 | Department of Electrical Engineering and Computer Science, United States Military Academy, West Point, USA |
13 February 2008 | Security Research Group, Columbia University, USA |
25 April 2007 | Information Systems and Internet Security Laboratory, Polytechnic University, USA. |
27 November 2006 | CMU Usable Privacy and Security Laboratory, Carnegie Mellon University, USA. |
9 May 2006 | MITACS Digital Security Seminar Series, Carleton University, Canada. |
23 March 2006 | IBM Centers for Advanced Studies, Toronto, Canada. |
28 October 2005 | Information Networking Institute, Carnegie Mellon University, USA. |
27 January 2005 | DETER Project Meeting, UC Berkeley, USA. |
19 August 2004 | Department of Computer Science, University of South Carolina, USA. |
23-24 March 2004 | CERIAS Security Symposium, Purdue University, USA. |
12 November 2003 | Security Seminar, The Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University, USA. |
21 July 2003 | Data Privacy Lab, Carnegie Mellon University, USA. |
10 July 2001 | IBM Canada Centre for Advanced Studies, Canada. |
Videos:
Blogs: