February 2018. Diagnosis Before Prescription: Giving Users The Anti-Phishing Training They Need. United States Senate, Washington DC.
September 2017. Conducting Human Cyber Vulnerability Assessments. Reflection/Projections: UIUC School of Engineering annual technology conference.
July 2017. “Why Most Cyber Security Training Fails and What We Can Do About It.” Black Hat, Las Vegas, August 2017.
April 2017. “Spear phishing: How It Works and Why People Fall For It.” Inholland Alkmaar, Netherlands.
October 2016. “Understanding Why People Fall Victim to Spear phishing.” The Johns Hopkins University Applied Physics Lab.
August 2016. “Blunting The Phisher’s Spear: A Risk-Based Approach For Defining User Training And Awarding Administrative Privileges.” BlackHat USA 2016.
March 2016. “Strategic Communication Before, During, And After A Cyber Attack: Perspectives From The Adversaries And The Defenders.” Drexel University.
February 2016. “Spearphishing: The Single Biggest Threat to Cybersecurity and How We Can Combat it.” National University of Singapore.
December 2015. “Protecting Cyberspace from Spear phishing.” US Army Cyber Institute, West Point, NY.
November 2015. “Design-Related Problems In Securing Cyberspace.” NSA/OSTP/DHS-Special Cyber Operations Research and Engineering (SCORE) Interagency Working Group.
October 2015. “Suspicion, Cognition, Automaticity Model of Phishing Susceptibility.” University of Florida.
April 2015. “Security in the Internet Community: What the Sony Hack has to do with all of us.” UB Alumni Association.
March 2015. “Barriers to adoption of anti-phishing technology.” National Security Agency (NSA).
November 04, 2014. “Social media: Exploring Habits.” Institute for Social Research (ISR), University of Michigan, Ann Abor.
November 29, 2013. “Phishing attacks on social media: Causes, consequences, and mitigation strategies.” University of Augsburg, Augsburg, Germany.
December 10, 2013. “Getting phished on social media.” MYRA School of Business, India.
October 4, 2012. “Phishing attacks on social media: Causes, consequences, and mitigation strategies” Mark Junck Research Colloquium, University of North Carolina at Chapel Hill.
November 30, 2011. “Individual differnces in phishing susceptibility.” International School of Information Management, University of Mysore, India.
December 12, 2007. “TECHNOLOGY ACCEPTANCE AND USE: A Confrontation of Contemporary Scientific Models.” Speakers include Dr. Viswanath Venkatesh, Professor, University of Arkansas; Robert LaRose, Professor, Michigan State University. International Conference held at the University of Twente, Netherlands.
November 29, 2007. “Research on the Adoption of Health IT.” University of North Carolina at Chapel Hill.
May 6-7, 2006. “Innovation diffusion as it relates to the diffusion, adoption and use of psychiatric treatment guidelines/algorithms. ” Keynote by Dr. Ted Shortliffe. Invitational Symposium on Diffusion, Adoption, and Maintenance of Psychiatric Treatment Algorithms, Buffalo, NY.
April 27, 2006. “Barriers to EHR Adoption among WNY Physicians.” Buffalo Academy of Medicine.
April 25, 2006. “Asian leaders in the United States: Challenges and Opportunities.” Diversity and Leadership Panel Series.
November 30, 2005. “Barriers to EHR Adoption among WNY Physicians.” Medical Health Informatics Speaker Series, Buffalo, NY.