Go Directly to Page Content
Go Directly to Site Search
Go Directly to Site Navigation
ITS Safe Computing

IT Security Events


Conversations at the confluence of technology, policy, privacy, security, and law.

Dissonance is a new U-M speaker series that seeks to explore of technology, law, privacy and security from a global and national perspective to increase university-wide multidisciplinary discourse and support university initiatives related to data science.

Cyber Security Awareness Month (October)

Each October during Cyber Security Awareness Month, IIA takes extra steps to educate and inform the U-M community about cyber security topics. See Cyber Security Awareness Month 2015.



See the agenda for SUMIT 2015! SUMIT 2015 was held on Thursday, October 22, 2015, at Rackham Auditorium on the University of Michigan campus. This year's agenda featured panel discussions, poster sessions, and more!

The Security at University of Michigan IT (SUMIT) conference is an annual symposium hosted every October during National Cyber Security Awareness Month by the University of Michigan to raise awareness and educate the community about cyber security. SUMIT presents a rare opportunity to hear nationally recognized experts discuss the latest cyber security trends and threats at no cost.

Recordings of Previous SUMITs

Video recordings, slides, and other information about past SUMIT conferences are available here:

  • SUMIT 2014
    • A Government CISO's Remarkable Journey: Surprising Stories from South Africa to Michigan
    • Hacker's Bazaar: Markets for Cybercrime Tools and Stolen Data
    • Connected Vehicle Security and Privacy
    • National Cybersecurity Challenges and NIST

  • SUMIT 2013
    • Your server's remote backdoor (IPMI)
    • Protecting data on iOS devices
    • The Computer Fraud and Abuse Act
    • Fort Disco case study
    • Remote access tools used for spying
    • Mitigating EMI signal attacks against analog sensors
    • Security defense in depth

  • SUMIT 2012
    • National security legislation
    • Cyber security
    • Governing cyber crime
    • The Michigan Cyber Range
    • Law enforcement surveillance

  • SUMIT 2011
    • Smart grid security
    • Cyber criminals
    • The future of the Fourth Amendment in the context of digital evidence
    • Smartphone security (don't root robots)

  • SUMIT 2010
    • Four types of lock
    • Cloud computing history
    • Scenes from the cyberwar between China and the U.S.
    • Cybersecurity as a national imperative

  • SUMIT 2009
    • Cybercrime
    • Tricks for defeating SSL
    • New school of information security
    • Catching a spammer
    • Cold-boot attacks against disk encryption

  • SUMIT 2008
    • IT data visualization
    • DNS threats case study
    • A routed man-in-the-middle attack
    • Computer security myths and mistakes

  • SUMIT 2007
    • Measuring security
    • Secure coding
    • The jihadi cyberterror threat
    • Information security and privacy in academic settings
    • Integrating security into a consumer-oriented OS

  • SUMIT 2006
    • Anti-phishing
    • Changing threats
    • Lock picking
    • US-CERT
    • Botnet case study
    • Network security
    • Security development lifecycle

  • SUMIT 2005
    • IT security legal issues
    • Current threats
    • Google hacking
    • Trends in large-scale and worm attacks
    • Symbian malware