| Section 1 (4 PM, L100) | Section 2 (11 AM, CC35) | |||||
| People | Name(s) | Topic | People | Name(s) | Topic | |
| Mon 10 May 2010 | 3 | Galba, Greguska, & Senkbeil | Wireless security | 1 | Neidinger | Cloud Computing | 
| 2 | Goral & Soddy | RFID Security | 1 | Holtz | Social Engineering | |
| 1 | Pordon | Malware Obfuscation | ||||
| Wed 12 May 2010 | 2 | Eckel & Seifi | Biometric Security | 1 | Marsch | SELinux | 
| 3 | Brayshaw, Cavanagh, & McBride | DRM | 2 | Banducci & Cochrane | Bluetooth Security Flaws | |
| Thu 13 May 2010 | 1 | Rasmussen | Cross-Site Request Forgery (CSRF) | 2 | Oldroyd & Schwartz | TrueCrypt | 
| 1 | Gartmann | AES | 2 | Martin, Z. & Molling | SSL/TLS | |
| 3 | Boerner, Curtis, & Dhiman(2) | Microsoft Windows Security | ||||
| Mon 17 May 2010 | 3 | Hicks, Mueller, & Shrago | Windows 7 Security | 2 | Anderson & Bowman | Steganography | 
| 1 | Martin, K. | DoD Networks: SIPRNet & NIPRNet | 2 | Domacinovich & Gillmann | Government Code Breaking | |
| Wed 19 May 2010 | 2 | Kappel & Kraft | SAS 70 | 1 | Radtke | Identity Management Systems | 
| 2 | Dietel & Van Dehy | Social Engineering | 1 | Yamat | Computer illiteracy and security | |
| 2 | Entinger & Michel | Market Impacts of Vulnerabilities | ||||
| Thu 20 May 2010 | 1 | Dettmering | Cybercrime Prevention Methods | 3 | Kuck(1), Emmer, & Guthrie | Economics of Information Security | 
| 3 | Harker, Krytkowski, & Wanke | Psychology of Security | 1 | De Young | IPSec | |