Go Directly to Page Content
Go Directly to Site Search
Go Directly to Site Navigation
ITS Safe Computing

Events

Dissonance

Conversations at the confluence of technology, policy, privacy, security, and law.

Dissonance is a new U-M speaker series that seeks to explore of technology, law, privacy and security from a global and national perspective to increase university-wide multidisciplinary discourse and support university initiatives related to data science.

SUMIT

The Security at University of Michigan IT (SUMIT) conference is an annual symposium hosted every October during National Cyber Security Awareness Month by the University of Michigan to raise awareness and educate the community about cyber security. SUMIT presents a rare opportunity to hear nationally recognized experts discuss the latest cyber security trends and threats at no cost.

Recordings of Previous SUMITs

  • SUMIT_2015
    SUMIT_2015 was held on October 22, 2015 at Rackham Auditorium on the University of Michigan campus. The agenda featured panel discussions, poster sessions, and more.

  • SUMIT_2014
    • A Government CISO's Remarkable Journey: Surprising Stories from South Africa to Michigan
    • Hacker's Bazaar: Markets for Cybercrime Tools and Stolen Data
    • Connected Vehicle Security and Privacy
    • National Cybersecurity Challenges and NIST

  • SUMIT_2013
    • Your server's remote backdoor (IPMI)
    • Protecting data on iOS devices
    • The Computer Fraud and Abuse Act
    • Fort Disco case study
    • Remote access tools used for spying
    • Mitigating EMI signal attacks against analog sensors
    • Security defense in depth

  • SUMIT_2012
    • National security legislation
    • Cyber security
    • Governing cyber crime
    • The Michigan Cyber Range
    • Law enforcement surveillance

  • SUMIT_2011
    • Smart grid security
    • Cyber criminals
    • The future of the Fourth Amendment in the context of digital evidence
    • Smartphone security (don't root robots)

  • SUMIT_2010
    • CLOUDINOMICON
    • Four types of lock
    • Cloud computing history
    • Scenes from the cyberwar between China and the U.S.
    • Cybersecurity as a national imperative

  • SUMIT_2009
    • Cybercrime
    • Tricks for defeating SSL
    • New school of information security
    • Catching a spammer
    • Cold-boot attacks against disk encryption

  • SUMIT_2008
    • IT data visualization
    • DNS threats case study
    • A routed man-in-the-middle attack
    • Computer security myths and mistakes

  • SUMIT_2007
    • Measuring security
    • Secure coding
    • The jihadi cyberterror threat
    • Information security and privacy in academic settings
    • Integrating security into a consumer-oriented OS

  • SUMIT_2006
    • Anti-phishing
    • Changing threats
    • Lock picking
    • US-CERT
    • Botnet case study
    • Network security
    • Security development lifecycle

  • SUMIT_2005
    • IT security legal issues
    • Current threats
    • Google hacking
    • Trends in large-scale and worm attacks
    • Symbian malware