Skip to main content


To view more alumni events, click here.

E2SHI’s Annual Symposium: Innovations in Managing Climate Risk
Apr 8 @ 12:00 pm – 1:30 pm

The Johns Hopkins Environment, Energy, Sustainability & Health Institute (E²SHI) invites you to an interactive session led by Pablo Suarez from the Red Cross/Red Crescent Climate Centre on climate change and disaster response, and to explore how to bridge science, policy and practice. The title of the presentation is “Innovations in Managing Climate Risk: Reimagining humanitarian and development work.”

Pablo SuarezA light lunch will be served starting at 11:45 am, and Michael Klag, Dean of the Bloomberg School of Public Health, will give opening remarks.

The symposium is free and open to all Johns Hopkins faculty, staff and students, as well as community members.

RSVP by April 5 to attend.

Details here.

JHUISI and COMPASS 2nd Annual Cyber Security Conference
Sep 10 @ 9:00 am – 3:30 pm

CybersecurityThe Johns Hopkins University Information Security Institute and Comprehensive Applied Security Solutions  will hold their 2nd Annual Senior Executive Cyber Security Conference from 9:30 a.m. to 3:30 p.m. on Thursday, Sept. 10 on the Johns Hopkins’ Homewood campus. This year’s focus is the controversial debate on information sharing and how it relates to consumer data privacy.

Featured Speakers:

Hodding Carter III, Renowned Journalist and Author, Co-author of After Snowden: Privacy, Secrecy, and Security in the Information Age
Ari Schwartz, Senior Director of Cybersecurity, National Security Council at the White House
Curtis Levinson, U.S. Cyber Defense Advisor to NATO and Private Consultant to firms such as Nike, Mercedes Benz, J.P. Morgan, and DuPont
Roberta Anderson, Partner and Co-Founder, K&L Gates LLP
Robyn Greene, Policy Council, Surveillance and Cyber Security Issues, New America Foundation
Michael Echols, Director, Joint Program Management Office National Protection and Program Directorate, Office of Cybersecurity and Communications, Department of Homeland Security
Bob Butler, Senior Advisor, The Chertoff Group
Matt Green, Research Professor, Johns Hopkins University Information Security Institute

Register here.

TechTalk | Post-exploit detection: How NOT to be owned for months
Apr 4 @ 6:30 pm – 7:30 pm
TechTalk | Post-exploit detection: How NOT to be owned for months @ APL Kossiakoff Center, Room K3-K4 | Laurel | Maryland | United States

NOTE: This talk has been rescheduled for April 4.

Please join us for our next TechTalk featuring network security expert and current Johns Hopkins Engineering student William Kupersanin. He will present “Post-exploit detection: How NOT to be owned for months.”

Participants can also attend online via live stream at

Abstract: Effectively defending a network from Advanced Persistent Threats (APTs) remains a difficult problem for enterprises, as evidenced by the large number of publicly documented network compromises. MITRE has been developing methods to detect APTs post-compromise more quickly. As part of our work, we developed an adversary model (ATT&CK™), and a suite of behavior-based analytics for detecting threats operating on a network, and an iterative method for developing future analytics.

ATT&CK™ is a model and framework for describing the actions an adversary takes while operating within an enterprise network. The model can be used to better characterize post-compromise adversary behavior with the goal of distilling the common behaviors across known intrusion activity into individual actions that an adversary may take to be successful. The techniques described in ATT&CK™ relate to observed APT intrusions, and are at a level of abstraction necessary for effectively prioritizing defensive investments and comparing host-based intrusion detection capabilities.

Bio: William Kupersanin is a Cyber Analyst with MITRE’s internal information security team and focuses on the development of analytics to detect adversarial behavior. He has over 20 years of experience in IT and network security. At MITRE, Kupersanin has supported various sponsors in the intelligence community and civilian government. Before coming to MITRE, Kupersanin worked in operational security at the U.S. Nuclear Regulatory Commission, developed ISP capabilities for a startup targeting developing nations, participated in the development of the University of Maryland’s initial cyber incident response capabilities, and has held various other cyber security related positions within the aerospace and educational sectors.  William has a BS in Computer Science from the University of Maryland and is currently a student in the Johns Hopkins Engineering for Professionals program.

Back to top