Gregory J. Conti  

Associate Professor
Department of Electrical Engineering and Computer Science
United States Military Academy
West Point, New York

email:   gjconti (replace_with_at_symbol)


Research Interests
Online Privacy
Cyber Conflict/Operations
Secure and Usable Interface Design
Security Data Visualization

Civilian Education
2006 Ph.D. Computer Science   Georgia Institute of Technology
2000 M.S. Computer Science Johns Hopkins University
1997 Professionalization (Signals Collection) National Cryptologic School, NSA
1989 B.S. Computer Science United States Military Academy

Courses Taught Professional
CS484 Computer Networks (Course Director) Senior Member - Association for Computing Machinery (2009)
CS489 Distributed Application Engineering (Course Developer and Course Director) Electronic Frontier Foundation (EFF)
CS382 Advanced Personal Computing (Course Director) National Eagle Scout Association (NESA)
CS482 Information Assurance (Adjunct) Phi Kappa Phi Award for Academic Achievement
SS490 Strategy and Policy of Cyberwar (Adjunct) Upsilon Pi Epsilon (UPE)
CS105 Introduction to Computing Adjunct Faculty Member, National Cryptologic School
ED101 Training Methods for Cryptographic Instructors (NSA Adjunct) USMA UPE Faculty Advisor
IT383 Interface Programming (Course Director) Military Cyber Professionals Association (MCPA)
  USMA SIGSAC Faculty Advisor
-Won ACM 2001-2002 Chapter Excellence Award

Military Education Assignments
Command and General Staff College (CGSC) EECS Faculty West Point
Combined Arms and Services Staff School (CAS3) Company Commander HOC, 713th MI Group
Advanced Cryptologic Course (CY500) Deputy Division Chief 713th MI Group
Joint Space Intelligence Operations Course (JSIOC) Battalion S3 743d MI BN
National Imagery Analysis Course (NIAC) Assistant S3 743d MI BN
Intelligence Collection Managers Course (ICMC) Assistant S2 2/4 Cavalry SQDN
Signals Intelligence / EW  Course (35G) Platoon Leader 124th MI BN
National Systems Development Program (NSDP) Collection Manager G2, 24th ID
Military Intelligence Officer Advanced Course Operations Officer G2, 24th ID
Military Intelligence Officer Basic Course
Jungle Warfare Course

Greg Conti; Googling Security, Addison Wesley; November 2008. (also available in Chinese and Korean editions) Slashdot and BoingBoing coverage. An EFF Favorite Book.

Greg Conti; Security Data Visualization, No Starch Press; September 2007. (For ebook version see No Starch Press website) A SANS Best Security Book.

Journals, Magazines, and Reports
Ryan Tate, Gregory Conti, Alex Farmer, and Edward Sobiesk "Evaluating Adversarial Interfaces: An Automated Approach," IEEE Technology and Society, March 2016. Supporting Data

Woodrow Hartzog, Gregory Conti, John Nelson, and Lisa Shay "Inefficiently Automated Law Enforcement," Michigan State Law Review. (Accepted, publication forthcoming)

Todd Arnold, Rob Harrison, Gregory Conti, and David Raymond "Shaping the Army's Cyber Operations Force: the Human Dimension," Cyber Defense Review, 12 February 2015.

Todd Arnold, Rob Harrison, and Gregory Conti, "Towards a Career Path in Cyberspace Operations for Army Officers," Small Wars Journal, 18 August 2014. SWJ coverage

Gregory Conti, Lisa Shay, and Woodrow Hartzog; "Deconstructing the Relationship Between Privacy and Security;" IEEE Technology and Society, Vol. 33, No. 2, Summer 2014.

Gregory Conti, Michael Weigand, Ed Skoudis, David Raymond, Thomas Cook, Todd Arnold, and Daniel Ragsdale; "Towards a Cyber Leader Course: Not for the Weak or Faint Hearted;" U.S. Army Cyber Center, Vol. 1337, No. 3, 26 May 2014.

Gregory Conti, Michael Weigand, Ed Skoudis, David Raymond, Thomas Cook, and Todd Arnold, "Towards a Cyber Leader Course Modeled on Army Ranger School," Small Wars Journal, 18 April 2014. SWJ and Doctrine Man coverage

Todd Arnold, Rob Harrison, and Gregory Conti; "Professionalizing the Army's Cyber Officer Force;" U.S. Army Cyber Center, Vol. 1337, No. 2, 23 November 2013.

Matthew Miller, Jonalan Brickey, and Gregory Conti, "Why Your Intuition About Cyber Warfare is Probably Wrong," Small Wars Journal, 29 November 2012. SWJ coverage

Gregory Conti, Edward Sobiesk, Paul Anderson, Steven Billington, Alex Farmer, Cory Kirk, Patrick Shaffer, and Kyle Stammer; "Unintended, Malicious, and Evil Applications of Augmented Reality;" InSecure, Issue 35, September 2012, pp. 20-27.

Jonalan Brickey, Jacob Cox, John Nelson, and Gregory Conti, "The Case for Cyber," Small Wars Journal, 13 September 2012. SWJ coverage

David Raymond and Gregory Conti, "Preventing a Digital Pearl Harbor," West Point, Spring 2012.

Gregory Conti, James Caroland, Thomas Cook, and Howard Taylor; "Self-Development for Cyber Warriors;" Small Wars Journal, 10 November 2011. SWJ coverage

Gregory Conti and James Caroland; "Embracing the Kobayashi Maru - Why You Should Teach Your Students to Cheat;" IEEE Security and Privacy, July/August 2011. Boing Boing, Schneier on Security and Cory Doctorow coverage

Gregory Conti and David Raymond; "Leadership of Cyber Warriors: Enduring Principles and New Directions;" Small Wars Journal, 11 July 2011. SWJ coverage

Gregory Conti, Thomas Babbitt, and John Nelson; "Hacking Competitions and Their Untapped Potential for Security Education;" IEEE Security and Privacy, May/June 2011.

Gregory Conti, Dominic Larkin, David Raymond and Edward Sobiesk; "The Military's Cultural Disregard for Personal Information;" Small Wars Journal, 6 Dec 2010. New York Times (Front Page), Government Information Security, Army Times 1 2, USAA, and SWJ coverage, DoD SWJ Response

Gregory Conti and Jen Easterly; "Recruiting, Development, and Retention of Cyber Warriors Despite an Inhospitable Culture;" Small Wars Journal, 29 July 2010. Stars and Stripes, TaoSecurity, Foreign Policy, ISACA, and SWJ coverage

Gregory Conti; "Mystical Math;" ACM netWorker, Vol 13, Issue 4 (Winter 2009).

Gregory Conti; "There's a Fly in My Digital Soup;" ACM netWorker, Vol 13, Issue 2 (Summer 2009).

Gregory Conti and Edward Sobiesk; "Malicious Interfaces and Personalization's Uninviting Future;" IEEE Security and Privacy, May/June 2009.

Gregory Conti and John "Buck" Surdu; "Army, Navy, Air Force, Cyber: Is it Time for a Cyberwarfare Branch of the Military;" Information Assurance Newsletter, Vol. 12, No. 1, Spring 2009, pp. 14-18. TaoSecurity and Slashdot coverage, redux Federal News Radio Government Information Security

Sam Abbott-McCune, A.J. Newtson, Robert Ross, Ralph Ware, and Gregory Conti; "Free Visualization Tools for Security Analysis and Network Monitoring;" InSecure, Issue 15, February 2008, pp. 18-25.

Gregory Conti; "Could Googling Take Down a President?;" Communications of the ACM (50th Anniversary Issue), January 2008.

Edward Sobiesk and Gregory Conti; "The Cost of Free Web Tools;" IEEE Security and Privacy, May/June 2007. BBC Documentary video IMDb

Gregory Conti (guest editor); "Hacking and Innovation (special issue);" Communications of the ACM (CACM), June 2006. Articles

Kulsoom Abdullah, Chris Lee, Gregory Conti and John Copeland. "Processing Data to Construct Practical Visualizations for Network Security," Information Assurance Newsletter, Vol. 9, No. 1, Summer 2006.

Gregory Conti, Kulsoom Abdullah, Julian Grizzard, John Stasko, John Copeland, Mustaque Ahamad, Henry Owen and Chris Lee;"Countering Security Analyst and Network Administrator Overload Through Alert and Packet Visualization;" IEEE Computer Graphics and Applications (CG&A), March 2006.

Gregory Conti and Mustaque Ahamad; "A Taxonomy and Framework for Countering Denial of Information Attacks;" IEEE Security and Privacy. November/December 2005.

Gregory Conti; "Why Computer Scientists Should Attend Hacker Conferences;" Communications of the ACM (CACM), March 2005.

Gregory Conti, "Thinking Out of the Box," Military Review, April 1998.

Gregory Conti, "You Can't Circle X a Deadlined Computer," Military Intelligence, December 1994.

Gregory Conti, "Automation: An Intelligence Multiplier," Military Intelligence, June 1994.

Conference and Workshop Publications
Edward Sobiesk, Jean Blair, Gregory Conti, Michael Lanham, and Howard Taylor. "Cyber Education: A Multi-Level, Mult-Discipline Approach." SIGITE, Chicago, IL, October 2015. slides

Greg Conti, Tom Cross, and David Raymond. "Pen Testing a City." Black Hat USA, Las Vegas, NV, August 2015. white paper

Tom Cross, David Raymond and Gregory Conti. "The Library of Sparta: Applying Military Doctrine to CyberSecurity." RSA, San Francisco, CA, April 2015.

Tom Cross, David Raymond and Gregory Conti. "Deception for the Cyber Defender: To Err is Human; to Deceive, Divine." ShmooCon, Washington, DC, January 2015. PPTX Slides

Gregory Conti. "Towards a Cyber Leader Course Modeled on Army Ranger School." Cyber Talks, Washington, DC, September 2014. PPTX Slides presentation video Cyber Talks Videos

David Raymond, Greg Conti, and Tom Cross; "The Library of Sparta." Black Hat USA, Las Vegas, August 2014. PPTX Slides MarketWatch, Dark Reading, Forrester, eSecurityPlanet and TechTarget" coverage

Greg Conti; "Teaching Electronic Privacy and Civil Liberties to Government." HOPE, New York City, August 2014. PPTX Slides PDF Slides

David Raymond, Gregory Conti, Tom Cross, and Michael Nowatkowski. "Key Terrain in Cyberspace: Seeking the High Ground." International Conference on Cyber Conflict (CyCon), Tallinn Estonia, June 2014.

Gregory Conti, Woodrow Hartzog, John Nelson, and Lisa Shay. "A Conservation Theory of Governance for Automated Law Enforcement." We Robot, Miami, April 2014. Wired and Inside Higher Education coverage

Ryan Tate, Gregory Conti, and Edward Sobiesk. "Automated Webpage Evaluation." ACM Research in Information Technology Conference, Orlando, October 2013.

Lisa Shay, Gregory Conti, and Woodrow Hartzog. "Beyond Sunglasses and Spray Paint: A Taxonomy of Countermeasures Against Overly-Intrusive Surveillance." IEEE International Symposium on Technology and Society (ISTAS), Toronto, June 2013.

Gregory Conti, John Nelson, and David Raymond. "Towards a Cyber Common Operating Picture." International Conference on Cyber Conflict (CyCon), Tallinn Estonia, June 2013.

David Raymond, Gregory Conti, Tom Cross, and Robert Fanelli. "A Control Measure Framework to Limit Collateral Damage and Propagation of Cyber Weapons." International Conference on Cyber Conflict (CyCon), Tallinn Estonia, June 2013.

Lisa Shay, Woodrow Hartzog, John Nelson, and Gregory Conti. "Do Robots Dream of Electric Laws? An Experiment in the Law as Algorithm." We Robot, Stanford, April 2013. (24% selection rate) datasets
Ars Technica, Slashdot, and San Francisco Chronicle coverage.

Lisa Shay, Gregory Conti, Dominic Larkin and John Nelson. "A Framework for Analysis of Quotidian Exposure in an Instrumented World." IEEE Carnahan Conference on Security Technology, Boston, October 2012.

Greg Conti, Lisa Shay, and Woody Hartzog. "Life Inside a Skinner Box: Confronting our Future of Automated Law Enforcement." DEFCON 20, Las Vegas, July 2012. PPT Slides [12.4M] Bloomberg coverage

Lisa Shay and Greg Conti. "Countermeasures: Proactive Self-Defense Against Ubiquitous Surveillance." HOPE, New York City, July 2012. PDF Slides [7.0M] Off the Hook and Computerworld coverage.

Robert Fanelli and Gregory Conti. "A Methodology for Cyber Operations Targeting and Control of Collateral Damage in the Context of Lawful Armed Conflict." International Conference on Cyber Conflict (CyCon), Tallinn Estonia, June 2012.

Thomas Cook, Gregory Conti, and David Raymond. "When Good Ninjas Turn Bad: Preventing Your Students from Becoming the Threat." Colloquium for Information Systems Security Education, June 2012.

Lisa Shay, Woodrow Hartzog, John Nelson, Dominic Larkin and Gregory Conti. "Confronting Automated Law Enforcement." We Robot, Miami, April 2012.

James Caroland and Greg Conti. "Lessons of the Kobayashi Maru: Cheating is Fundamental." Shmoocon, January 2012. Talk PPT Slides PDF Slides Video(m4v) (April 2012 SOURCE Boston Extented Version PDF Slides)

Greg Conti; "The Art and Science of Security Research"; DEFCON 19; August 2011. Talk PPT Slides [15.3M] New York Times coverage

Gregory Conti, Sergey Bratus, Benjamin Sangster, Roy Ragsdale, Matthew Supan, Andrew Lichtenberg, Robert Perez and Anna Shubina; "Automated Mapping of Large Binary Objects Using Primitive Fragment Type Classification; Digital Forensics Research Conference (DFRWS); August 2010. binvis tool (v0.44)

Greg Conti; "Our Instrumented Lives: Sensors, Sensors, Everywhere"; DEFCON 18; July 2010. Talk PPT Slides [31.8M] PDF Slides [7.6M]

Greg Conti and Sergey Bratus; "Voyage of the Reverser: A Visual Study of Binary Species"; Black Hat USA; July 2010. binvis tool release (v0.44) Talk PPT Slides [6.9M]

Gregory Conti, Sergey Bratus, Anna Shubina, Benjamin Sangster, Roy Ragsdale, Matthew Supan, Andrew Lichtenberg, and Robert Perez-Alemany. "A Visual Study of Binary Fragment Types." Black Hat USA. White Paper, July 2010.

Gregory Conti and Edward Sobiesk; "Malicious Interface Design: Exploiting the User"; International World Wide Web Conference (WWW 2010); April 2010. Slashdot, EFF, and MSNBC coverage.

Benjamin Sangster, T.J. O'Connor, Thomas Cook, Robert Fanelli, Erik Dean, William J. Adams, Chris Morrell, and Gregory Conti; "Toward Instrumenting Network Warfare Competitions to Generate Labeled Datasets;" USENIX Security's Workshop on Cyber Security Experimentation and Test (CSET); August 2009.

Benjamin Sangster, Roy Ragsdale, Gregory Conti; "Automated Mapping of Large Binary Objects; Shmoocon; Work in Progress Talk; February 2009. Talk PPT Slides [2.0M]

Gregory Conti, Erik Dean, Matthew Sinda, and Benjamin Sangster; "Visual Reverse Engineering of Binary and Data Files;" Workshop on Visualization for Computer Security (VizSEC); September 2008.

Greg Conti; "Could Googling Take Down a President, a Prime Minister, or an Average Citizen?; DEFCON 16; August 2008. Talk PPT Slides [8.0M]

Greg Conti and Erik Dean; "Visual Forensic Analysis and Reverse Engineering of Binary Data;" Black Hat USA; August 2008.
Talk PPT Slides [17.9M] DanglyBytes and VizBin tool releases
InfoWorld, and Securosis Coverage

Greg Conti; "Evil Interfaces: Violating the User;" HOPE; July 2008. Talk PPT Slides [15.5M]

Kulsoom Abdullah, Gregory Conti and Raheem Beyah; "A Visualization Framework for Self-monitoring of Web-based Information Disclosure;" International Conference on Communications (ICC); May 2008.

Kulsoom Abdullah, Gregory Conti and Edward Sobiesk; "Self-monitoring of Web-based Information Disclosure;" Workshop on Privacy in the Electronic Society; October 2007.

Gregory Conti and Edward Sobiesk; "An Honest Man Has Nothing to Fear: User Perceptions on Web-based Information Disclosure;" Symposium on Usable Privacy and Security (SOUPS); July 2007.

Greg Conti; "Satellite Imagery Analysis;" DEFCON 15; July 2007. Talk PDF Slides [6.8M]

Gregory Conti; "Googling Considered Harmful;" New Security Paradigms Workshop; October 2006. (See also the eWeek and USENIX LOGIN coverage)

Greg Conti; "Googling: I'm Feeling (un)Lucky;" DEFCON 14; July 2006.
Talk PDF Slides(0.8M) Talk Audio(MP3 21.0M)   Talk Video(MP4 78.5M)

Greg Conti; "Malware Cinema: A Picture is Worth a Thousand Packets;" Black Hat Europe; March 2006. Talk PPT Slides [16.1M] Talk PDF Slides [6.8M]

Greg Conti; "Google: Don't Be Evil or Don't Be Good;" Interz0ne 5; March 2006.  Talk PPT Slides (2.6M)

Greg Conti; "High Bandwidth Visual Analysis of Security Data Flows;" Interz0ne 5; March 2006.  Talk PPT Slides (15.7M)

Gregory Conti, Julian Grizzard, Mustaque Ahamad and Henry Owen; "Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries;" IEEE Symposium on Information Visualization's Workshop on Visualization for Computer Security (VizSEC); October 2005.

K. Abdullah, C. Lee, G. Conti, J. Copeland and J. Stasko; " IDS RainStorm: Visualizing IDS Alarms;" IEEE Symposium on Information Visualization's Workshop on Visualization for Computer Security (VizSEC); October 2005.

G. Conti; "Beyond Ethereal: Crafting A Tivo for Security Datastreams;" Black Hat USA; July 2005. Talk PPT Slides (4.0M) Talk PDF Slides (6.7M)

G. Conti; "Countering Denial of Information Attacks;" DEFCON 13; July 2005.
Talk PPT Slides (3.4M) Talk PDF Slides (1.7M)
Talk Audio(MP3 21.0M)   Talk Video(MP4 78.5M)

G. Conti, M. Ahamad and J. Stasko; "Attacking Information Visualization System Usability: Overloading and Deceiving the Human;" Symposium on Usable Privacy and Security (SOUPS); July 2005.

S. Krasser, G. Conti, J. Grizzard, J. Gribschaw and H. Owen; "Real-Time and Forensic Network Data Analysis Using Animated and Coordinated Visualization;" IEEE Information Assurance Workshop (IAW); June 2005. Talk PPT Slides (0.7M)

K. Abdullah, C. Lee, G. Conti and J. Copeland; "Visualizing Network Data for Intrusion Detection;" IEEE Information Assurance Workshop (IAW); June 2005. Talk PDF Slides (0.7M)

G. Conti, M. Ahamad and R. Norback; "Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall;" IEEE International Conference on Intelligence and Security Informatics (IEEE-ISI); May 2005.  Talk PPT Slides (2.0M)

G. Conti;"Countering Denial of Information Attacks with Information Visualization;" Interz0ne 4; March 2005.  Talk PPT Slides (4.3M)

G. Conti and K. Abdullah; " Passive Visual Fingerprinting of Network Attack Tools;" ACM Conference on Computer and Communications Security's Workshop on Visualization and Data Mining for Computer Security (VizSEC); October 2004. Talk PPT Slides(1.8M)

J. Grizzard, S. Krasser, H. Owen, G. Conti and E. Dodson; " Towards an Approach for Automatically Repairing Compromised Network Systems;" IEEE Symposium on Network Computing and Application's Workshop on Trustworthy Network Computing (IEEE-NCA); August 2004.

G. Conti; "Network Attack Visualization;" DEFCON 12; August 2004.
Talk PPT Slides(5.6M)   Talk Audio(MP3 11.6M)   Talk Video(MP4 97.4M)
Classical InfoVis Survey PPT Slides (8.4M)  
Security InfoVis Survey PPT Slides

G. Conti, D. Ragsdale, S. Lathrop and C. Gates; "Implementation and Lessons Learned from an Undergraduate Special Interest Group in Information Assurance;" Colloquium for Information Systems Security Education(CISSE); June 2004.

J. Grizzard, E. Dodson, G. Conti, J. Levine and Henry Owen; "Towards a Trusted Immutable Kernel Extension (TIKE) for Self-Healing Systems: a Virtual Machine Approach" IEEE Information Assurance Workshop (IAW); Poster Session; June 2004.

G. Conti; "Network Security Data Visualization;" Interz0ne3; April 2004. Talk PDF Slides (4.7M)

G. Conti; "Interface Design of Hacking Tools;" DEFCON 11; August 2003. Talk PPT Slides (8.7M)   Talk Audio(MP3 10.5M)

G. Conti, J. Hill, S. Lathrop, K. Alford and D. Ragsdale; "A Comprehensive Undergraduate Information Assurance Program;" Third World Conference on Information Security Education (WISE3); June 2003.

S. Lathrop, G. Conti and D. Ragsdale; "Information Warfare in the Trenches: Experiences from the Firing Line;" Third World Conference on Information Security Education (WISE3); June 2003.

J. Hill, J. Surdu, S. Lathrop, G. Conti and C. Carver; "MAADNET: Toward a Web-Distributed Tool for Teaching Networking and Information Assurance;" Educational Multimedia, Hypermedia and Telecommunications (ED-Media); June 2003.

R. Tate and K. Blankenheim (Advisor G. Conti); "Adapting Linux for Use on a Windows Based Campus Network: Modifying Open Source/Free Software to Meet Local Policy, Security, and Training Constraints;" National Conference on Undergraduate Research(NCUR); March 2003.

D. Ragsdale, J. Hill and G. Conti; "The Information Assurance Program at West Point;" Federal Information Systems Security Educators' Association(FISSEA) Conference; March 2003. PPT Slides (3.4M)  PDF Slides (1.6M)

J. Hill, J. Surdu, S. Lathrop, G. Conti and C. Carver; "MAADNET NetBuilder: A Service/Demand Focused Network Simulator;" Communication Networks and Distributed Systems Modeling and Simulation (CNDS) conference; January 2003.

G. Conti, J. Hill and C. Carver; "Developing an Undergraduate Distributed Development Course;" Frontiers in Education Conference (FIE); November 2002. PPT Slides (474K) Selected as Frontiers in Education New Faculty Fellow 2002.

J. Surdu and G. Conti; "Join the Cyber Corps;" IEEE Information Assurance Workshop (IAW); Poster Session; June 2002.

K. Alford, G. Conti, D. Cushen, E. Ressler, W. Turmel and D. Welch; "A Two Edged Sword: Computing at West Point;" Making History: West Point at 200 Years Conference; March 2002.

G. Conti et al. " A Framework for Integrating Ethical and Values-Based Instruction into the ACM Computing Curricula 2001;" Protecting Information in the Computer and Beyond Workshop; Purdue University, October 2001.

D. Welch, J. Marin and G. Conti; "A Framework for Information Warfare Simulation;" IEEE Systems, Man and Cybernetics Information Assurance Workshop; May 2001.
Other Books, Book Chapters, Journal Publications, and other notable work
Gregory Conti. "Security Visualization: Past, Present and Future," Keynote, Symposium on Visualization for Cyber Security, Chicago, October 2015.

Gregory Conti. "Thinking Like an Adversary," Stanford Cyber Security Boot Camp for Congressional Staffers, Stanford, CA, August 2015.

Michael Froomkin, Ryan Calo, and Ian Kerr (editors); (Lisa Shay, Woodrow Hartzog, John Nelson, Dominic Larkin, and Gregory Conti chapter contributors); "Confronting Automated Law Enforcement" Robot Law; Edward Elgar Publishing, 2015.

Michael Froomkin, Ryan Calo, and Ian Kerr (editors); (Lisa Shay, Woodrow Hartzog, John Nelson, and Gregory Conti chapter contributors); "Do Robots Dream of Electric Laws? An Experiment in the Law as Algorithm" Robot Law; Edward Elgar Publishing, 2015.

Gregory Conti and Fernando Maymi. "Why CSI: Cyber Matters." Cyber Defense Review, 7 April 2015. Slashdot coverage

Gregory Conti. "Stone Turnings of Baghdad." American Woodturner Journal, December 2011, Vol. 26, No. 6, pp. 43-45.

Lance Betros; (Gregory Conti et al contributors); History of Computing at West Point; West Point: Two Centuries And Beyond; The McWhiney Foundation Press, 2004.

Gregory Conti, John M. D. Hill, Scott Lathrop, Ken Alford, and Daniel Ragsdale, "Towards A Comprehensive Undergraduate Information Assurance Program," Security Education and Critical Infrastructure, Cynthia Irvine and Helen Armstrong, Editors, Kluwer Academic Publishers, Norwell, Massachusetts, 2003, pp. 243-260, 2003

Scott Lathrop, Gregory Conti, and Daniel Ragsdale, "Information Warfare In The Trenches: Experiences from the Firing Range ," Security Education and Critical Infrastructure, Cynthia Irvine and Helen Armstrong, Editors, Kluwer Academic Publishers, Norwell, Massachusetts, 2003, pp. 19-40, 2003

Al Smith, John Custer, John Berrie, Gregory Conti, and Travis Thompson, Warfighter's Guide to Intelligence Communications Architectures, Operational Support Office, June 1996.

Matt Blaze (Moderator), Greg Conti, Rick Forno, and Jeff Foster. Information Security Programs in Academia, Closing Plenary, ShmooCon, 2016.

Mara Tam, Vincenzo Iozzo, Jeff Moss, Randy Wheeler and Greg Conti (Moderator). You Ainít Seen Nothing Yet: New Paradigms for Policy, Regulation, and Community Engagement,, ShmooCon, 2016.

Gregory Conti, Siddharth Garg, Nasir Memon, Salvatore Stolfo, and Ziqian (Cecillia) Dong (Moderator). Research Frontiers for Cyber-Physical Systems and the Internet of Things., NYIT Cybersecurity Conference, New York, 24 September 2015.

David Clark, Gregory Conti, and Jason Healey (Moderator). Cyber Security as a Concept., Multi-disciplinary Workshop on Cyber-security, Columbia University, New York, 22 June 2015.

Kip Brailey, Gregory Conti (Moderator), Shane Harris, and Jane Holl Lute. When Does a Cyber Threat Rise to the Level of a National Security Concern?, Threats, Profits, and Security Today's Cyber Challenges, Center on National Security at Fordham Law School, New York, 27 April 2015.

Gregory Conti, Angela Kane, James A. Lewis (Moderator), and Rafal Rohozinski. Rethinking US Cybersecurity Policy Against a Shifting Strategic Landscape, National Committee on American Foreign Policy, New York, 6 March 2014.

Gregory Conti (Keynote Speaker). The Emerging Cyber Threat: Why We Aren't Paranoid Enough., CITI Cyber Intelligence Week, New York, 27 January 2014.

Gregory Conti, Maureen O'Connor, David Raymond, and Raymond Odierno. Leadership in Cyberspace: Game Has Changed, Korn-Ferry, New York, 22 October 2013.

Gregory Conti, Helen Greiner, Peter Singer, James Stavridis, and Yossi Vardi. Beyond Software: The Future of Conflict, Google Ideas, New York, 22 October 2013.

Chris Rouland, Robert Clark, and Gregory Conti (moderator). The Ethics of Hacking Back: Cybersecurity and Active Network Defense, Carnegie Council, New York, 18 September 2013. Forbes coverage

Dmitri Alperovich, Gregory Conti, and Simson Garfinkel. How Do We Create a Viable Cyber Profession: Opportunities and Challenges, AFCEA TechNet Land Forces - East, Baltimore, MD, August 2012.

Marcia Hoffman, Congressman Jim Langevin, Vice Admiral Mike McConnell, Jeff Moss, and Sami Saydjari (Gregory Conti Moderator). The Role of the U.S. Government in Cyberspace, United States Military Academy Senior Conference, West Point, NY, June 2012.

Patti Ihnat, Guillaume Poupard, Howard Schmidt and Frederic Sutter. (Gregory Conti Moderator). Structure and Deployment of Cyber Defenders, French American Defense Symposium on Cyber Security, Washington, DC, April 2012.

Gregory Conti, Joel Ogren, Benjamin Shao, Andy Singer (Robert Shea Moderator), Recruiting, Training, and Retaining Tomorrow's Cyber Warriors, AFCEA TechNet Land Forces - Southwest, 28 March 2012. AFCEA SIGNALSCAPE and SIGNAL Online coverage

Jamie Clark, Gregory Conti, Tanya Forsheit, Charles Palmer (Roland Trope Moderator), Deploying Tools to Build or Self-Sabotage the Enterprise: How Do We Square Legal Obligations for Cybersecurity with the Increasing Use of Technologies that Undermine It?, American Bar Association Business Law Section Spring Meeting, 23 March 2012.

Tom Bianculli, Gregory Conti, Raj Goel, Nasir Memon (Paul Stirpe Moderator), Challenges in Cloud Computing, NYIT Cyber Security Conference, 15 September 2011.

Alessandro Acquisti, Ryan Calo, Gregory Conti, and Woodrow Hartzog (Chris Hoofnagle Moderator); Human Computer Interaction and Consumer Protection, Samuelson Law, Technology & Public Policy Clinic, Privacy Scholars Speaker Series. UC Berkeley; 30-31 March 2011.

David Aucsmith, Gregory Conti, David Dagon, Paul Judge, Val Rahmani, Chris Rouland, and Marcus Sachs (Rich DeMillo Moderator); Evolving Nature of Cyber Security Threats, GTISC Security Summit; October 2010.

Gregory Conti, Carrie Gates, John Goodall, Bill Pike (Jeremy Epstein Moderator). Data Visualization Technologies, United States Secret Service Global Cyber Security Conference, Washington, DC, August 2009.

Judit Bar-Ilan, Tom Cross, Martin Kratz and Wendy Seltzer (Gregory Conti Moderator); Web Search Privacy Issues, World Wide Web Conference (WWW2007); May 2007.

Gregory Conti; Googling Considered Harmful (as part of the 2006 Highlights of the New Security Paradigms Workshop Panel), Annual Computer Security Applications Conference(ACSAC); December 2006.

Steve Chan, Gregory Conti and Mary Ellen Zurko (Konstantin Beznosov moderator); Usability of Security Administration vs. Usability of End-user Security Panel, Symposium on Usable Privacy and Security (SOUPS), Carnegie Mellon University; June 2005.

Ed Balas, John Stasko, Kirsten Whitley and Bill Yurcik (Gregory Conti moderator); Visualizing Security Data; IEEE Information Assurance Workshop, United States Military Academy, June 2005.

Gregory Conti, "Countering Network Level Denial of Information Attacks Using Information Visualization," Ph.D. Dissertation,
Georgia Institute of Technology, May 2006. (Advisor: Mustaque Ahamad)

Recent Media Coverage
Brian Nussbaum, "Smart Cities - The Cyber Security and Privacy Implications of Ubiquitous Urban Computing." Stanford Center for Internet and Society, 9 February 2016.
"NYIT Cybersecurity Conference: Know Your Adversary, Increase Resiliency." PR Newswire, 28 September 2015.
Sara Peters, "Smart Cities' 4 Biggest Security Challenges." Dark Reading, Information Week, 1 August 2015.
Sara Peters, "Pen Testing a Smart City (Video)." Dark Reading, Information Week, 22 August 2015.
Bianca Facchinei and Ameera David, "Are Cities Hackable? (Video)." Boom Bust, RT, 7 August 2015.
Sam Wong, "Cyber Attack: How Easy is it to Take Out a Smart City?." New Scientist, 4 August 2015.
Jonathan Keane, "How to Hack a City - and Why We Should." The Daily Dot, 2 August 2015.
Brent Chapman and James Finocchiaro, "West Point's Role in Shaping the Cyber Force." West Point, Summer 2015.
Jeremy Bunkley, "Army Cyber Institute hosts summit, builds civilian/military cyber partnership.", 15 May 2015.
Kevin Lilley, "Cyber boss part of academy-industry forum." Army Times, 15 May 2015.
"What is needed to win the war on cyber terrorism?" Fox Business, 14 May 2015.
Army Cyber Institute "Opening Remarks" and "Army Cyber Institute Overview ." Army Cyber Institute YouTube Channel, 14 May 2015.
Jim Garamone, "Winnefeld: DoD Must Strengthen Public, Private Ties.", 14 May 2015.
Michael Randall, "Cyber security is battle to protect trust." Times Herald Record, 14 May 2015.
"Top Cyber Security Concerns." Fox Business, 14 May 2015.
"Today's Focus: The Army Cyber Institute." Army Stand-To!,, 14 May 2015.
Kevin Lilley, "ACI 101: What is the Army Institute? ... and why you should care." Pointer View, 7 May 2015.
"Why CSI: Cyber Matters." Slashdot, 7 April 2015.
"SANS Instructor, Ed Skoudis, Awarded the Order of Thor Medal at the Army Cyber Institute." PR Newswire, 31 March 2015.
David Raymond, "Army Cyber Institute, Army Cyber Command host second 'Cyber Talks' event.", 27 March 2015.
"West Point and Marines Launch Open Cyber Conflict Journal." Slashdot, 15 February 2015.
David Gioe. "The U.S. Army on the Cyber Battlefield - Colonel Greg Conti (Video)." West Point Center for Oral History, 15 December 2014.
Tom Fox-Brewster. "Sony Pictures Hack: How Much Damage Can North Korea's Cyber Army Do?." The Guardian, 5 December 2014.
Fort Gordon Public Affairs. "Army Cyber Branch Offers Soldiers New Challenges, Opportunities.", 24 November 2014.
Eric Chabrow. "The Multidisciplinary IT Security Team." BankInfoSecurity, 13 November 2014.
Joseph Marks. "ICYMI: Army Cyber Institute Draws from History, Ethics." Politico, 28 October 2014.
Jeremy Bunkley. "SecArmy Officially Opens Cyber Institute at West Point.", 10 October 2014.
Jim Tice. "Officers Can Apply to go Cyber in Voluntary Transfer Program." Army Times, 8 October 2014.
Neal Creighton. "West Point Focuses Efforts on Cyber Defense with the Army Cyber Institute." CounterTack, 7 October 2014.
Brendan Chambers. "The Army Cyber Institute Formally Opens Its Doors." West Point - Facebook, 3 October 2014.
John M. McHugh. "The SecArmy Remarks at Army Cyber Institute Ribbon Cutting Ceremony.", 3 October 2014.
Robert Caruso. "The US Needs Better HUMINT to Beat ISIS." Business Insider, 8 September 2014.
Eric Chabrow. "Army Cyber Leader Touts Hacking Skills." CareersInfoSecurity, 4 September 2014.
Carolyn Moritz. "October is European Cyber Security Month." VPN Creative, 3 September 2014.
Eric Chabrow. "Cyber Military Branch: Rethinking Need." GovernmentInfoSecurity, 28 August 2014.
Neal Cavuto (host). "Fox Business Investigates: Cyber Wargame." Fox Business Network, 22 August 2014. Clip Preview
Andrew Tilghman. "In Supersecret Cyberwar Game, Civlian-sector Techies Pummel Active-duty Cyberwarriors." Army Times, 4 August 2014.
Megan Goldschmidt. "Using Multiple Concepts to Secure IT." Government Information Security, 31 July 2014.
Jenna Lyons. "NSA Targets College Students to Fill Cyber Professionals Shortage." USA Today, 22 July 2014.
Dara Kerr. "NSA Recruits College Students for Cyber Operations Program." CNET, 15 July 2014.
NSA Public and Media Affairs. "NSA Announces Five News Schools as Cyber Operations Centers of Academic Excellence." NSA, 14 July 2014.
Aviva Rutkin. "Law by Algorithm: Are Computers Fairer than Humans?" New Scientist, 12 June 2014.
Eric Chabrow. "A Multidisciplinary Approach to InfoSec." Bank InfoSecurity, 9 June 2014.
"Cyber Cadets: West Point Graduates Hackers." Bloomberg, 26 May 2014. [click video link]
Glenn Rifkin, "Fighting Digital Wars: West Point's Cyber Institute," Korn Ferry Briefings on Talent & Leadership, Summer 2014. local copy
Richard Stiennon, "Going Back To (Cyber) School," Forbes, 3 May 2014.
"Call of Cyber Duty: Military Academies Take on NSA," Associated Press, 10 April 2014.
Adam Clark Estes, "U.S. Army Compares New Hacker School to 'The Birth of the Air Force'," GIZMODO, 10 April 2014.
Joe Gould, "West Point to House Cyber Warfare Research Institute," USA Today, 8 April 2014. See also Army Times
"Secretary of the Army Lauds SHARP Program at West Point,", 12 December 2013.
Peter Apps and Brenda Goh, "Cyber Warrior Shortage Hits Anti-Hacker Fightback," Reuters, 13 October 2013.
"35 Best Computer Security Professors of 2013,", 27 August 2013.
Michael Melia, "Michael Connor, Navy Vice Admiral, Calls for Submarine Commanders' Autonomy," Associated Press, 17 July 2013.