| Tue 08 May 2007 | Chavers | RFID: Privacy vs. Security |
| Atwood | RFID Biometric Data | |
| Riggs | Mass Identification and Authorization Processes vs. Privacy and Anonymity | |
| Bailey | Hard Disk Encryption | |
| Thu 10 May 2007 | Heinritz | Fingerprint Identification |
| Mertz | Biometrics Overview | |
| Kaemmer | Biometric Identification Cards | |
| Cvetan | Biometric Identification: Retina and Iris Methods | |
| Fri 11 May 2007 | Winkler | Windows Vista Security |
| Footit | Windows Vista User Account Control (UAC) | |
| Beetcher | Key Logging in Windows XP | |
| Mischock | DVD Encryption | |
| Tue 15 May 2007 | Geboy | Java Cryptography Architecture |
| Hammel | Elliptic Curve Cryptography | |
| Phillips | Rainbow Tables | |
| Thu 17 May 2007 | Handl | Online Banking Authentication |
| Marg | Honey Pots | |
| Skibinski | VLANs | |
| Fri 18 May 2007 | Patterson | Insiders Who Threaten Security |
| Heck | File system security | |
| Musick | Security in Cellular Phones | |