Go Directly to Page Content
Go Directly to Site Search
Go Directly to Site Navigation
ITS Safe Computing

IT Security Events

SUMIT_14 Logo

SUMIT

The Security at University of Michigan IT (SUMIT) conference is an annual symposium hosted every October during National Cyber Security Awareness Month by the University of Michigan to raise awareness and educate the community about cyber security. SUMIT presents a rare opportunity to hear nationally recognized experts discuss the latest cyber security trends and threats at no cost.

Video recordings, slides, and other information about past SUMIT conferences is available here:

  • SUMIT 2013
    • Your server's remote backdoor (IPMI)
    • Protecting data on iOS devices
    • The Computer Fraud and Abuse Act
    • Fort Disco case study
    • Remote access tools used for spying
    • Mitigating EMI signal attacks against analog sensors
    • Security defense in depth
  • SUMIT 2012
    • National security legislation
    • Cyber security
    • Governing cyber crime
    • The Michigan Cyber Range
    • Law enforcement surveillance
  • SUMIT 2011
    • Smart grid security
    • Cyber criminals
    • The future of the Fourth Amendment in the context of digital evidence
    • Smartphone security (don't root robots)
  • SUMIT 2010
    • CLOUDINOMICON
    • Four types of lock
    • Cloud computing history
    • Scenes from the cyberwar between China and the U.S.
    • Cybersecurity as a national imperative
  • SUMIT 2009
    • Cybercrime
    • Tricks for defeating SSL
    • New school of information security
    • Catching a spammer
    • Cold-boot attacks against disk encryption
  • SUMIT 2008
    • IT data visualization
    • DNS threats case study
    • A routed man-in-the-middle attack
    • Computer security myths and mistakes
  • SUMIT 2007
    • Measuring security
    • Secure coding
    • The jihadi cyberterror threat
    • Information security and privacy in academic settings
    • Integrating security into a consumer-oriented OS
  • SUMIT 2006
    • Anti-phishing
    • Changing threats
    • Lock picking
    • US-CERT
    • Botnet case study
    • Network security
    • Security development lifecycle
  • SUMIT 2005
    • IT security legal issues
    • Current threats
    • Google hacking
    • Trends in large-scale and worm attacks
    • Symbian malware