Previous Webinars & Events
Data Privacy in Arlington County, Virginia
CSPRI Discussion: Blockchain Capabilities for Disaster Risk Reduction Management - Part 6
CSPRI Webinar: Colonial and DC MPD Hacks
Closing the Gap Women Veterans > Cybersecurity Careers
CSPRI Discussion: Blockchain Capabilities for Disaster Risk Reduction Management - Part 5
CSPRI Discussion: Blockchain Capabilities for Disaster Risk Reduction Management - Part 4
CSPRI Webinar: Building Cybersecurity Resilience
CSPRI Discussion: Blockchain Capabilities for Disaster Risk Reduction Management - Part 3
CSPRI Discussion: Blockchain Capabilities for Disaster Risk Reduction Management - Part 2
CSPRI Discussion: Blockchain Capabilities for Disaster Risk Reduction Management - Part 1
Webinar: According to Shakespeare, "Every Cloud Engenders Not a Storm"
Webinar: Cybersecurity Across Borders
Closing the Gap: DoD Conference on Re-Entry for Women Veterans into Cybersecurity Careers
CyberMED 2020: Cybersecurity Informed Consent - a New Paradigm
NIST AI Series: Bias in AI Workshop
CSPRI Webinar: The Benefits of a Diverse Cybersecurity Workforce
CSPRI Webinar: Case Study of World's largest Cyber-Heist at Central Bank of Bangladesh
DoD’s Cybersecurity Maturity Model Certification (CMMC) and The Risk Management Framework (RMF) in support of government agencies
CSPRI Webinar: Building Cybersecurity Resilience
Leveraging the Cloud to Automate Threat Detection, Hunting and Mitigation Using Frameworks like the NIST CSF and MITRE ATT&CK
The ability to deliver advanced cyber-attacks, once the domain of nation states, has been democratized and are now pervasive.
Blockchain Technologies and Applications: Concept, Initiatives, Status, Problems, and Potential Solutions
Blockchain technologies and their applications are very popular, but in the last several years there are also many problems and obstacles for their broader adoption.
Cybersecurity for Connected and Automated Vehicles
The Journey to Rational Cybersecurity
Cybersecurity is in chaos. Despite increased spending, organizations keep exposing known vulnerabilities. Attackers keep penetrating defenses all too easily.
Opportunities to Get Involved in the Blockchain and Ethereum Community
IoT Security and TRUSTICA Framework
The intent of this and future Cyber Security and Privacy Research Institute (CSPRI) lunches is to provide glimpses of the vibrant security and privacy private sector in the Washington region to GW
NovaInfosec Meetup
May 18, 6:00 p.m. – 9:00 p.m.
Lost Rhino Brewing Co.,
21730 Red Rum Drive #142,
Ashburn, VA, 20147.
Ransomware: Understanding the Threat and Exploring Solutions
Date: Wednesday, May 18, 2016
Time: 03:00 PM
Location: Dirksen Senate Office Building 226
Presiding: Chairman Graham
Smartphones Issues and Data in Apps and the Cloud…or your Next Level of Evidence
Cybersecurity Law Institute
May 25-26, 2016
Georgetown University Law Center
Hart Auditorium, McDonough Hall
CharmSec Meetup
May 19, 7:00 p.m. – 11:00 p.m.
Little Havana,
1325 Key Highway
Baltimore, MD, 21230.
More information.
ISSA NoVa Meetup: Systems Security Engineering, The Path to More Trustworthy and Resilient Systems
May 19, 5:30 p.m. – 8:00 p.m.
Marymount University
2807 N, Glebe Road
Arlington, VA, 22207
How can we enable privacy in an age of big data analytics?
May 19, 12 noon - 1 pm
National Science Foundation, Stafford I, Room 110.
More information
Broader Implications of Apple vs. the FBI for Cyber Security and Privacy
In a GW University Seminar on Internet Freedom and Governance, CSPRI hosted experts in law, policy and academia to discuss the implications of the ongoing Apple v.
Is America Ready to Vote on the Internet?
There are at least two major forces tugging at the success of new, modern electronic systems that will take advantage of all society knows about technology. One is the desire for an easy syst
Legal and Technical Implications of Recent and Future Data Breaches
Recently Master Card and Visa announced a data breach at one of their payment processor companies that compromised 1.5 million credit card numbers and associated information.
Developing the Cyber Security Workforce - Different Perspectives
The Cyber Domain: Global Digital Commons or Free Fire Zone?
The End of K Street Deals?: Is Netizen Direct Lobbying the New Norm?
Wikipedia and other Web sites “went dark” and Google covered up its logo with a big black “censored” rectangle on January 18, 2012 to protest the Stop Online Piracy Act (SOPA) and the Protect Intel
What GW (and Other Universities) Don't Teach You About Medical Record Cyber Security and Privacy
nformation security in the health care industry has almost always been viewed as an impediment to productivity.