Greg Conti - Security Researcher

Purpose: Provide an archive of my work to date to share with others in the community. Professional information is at Kopidion Cybersecurity and on LinkedIn. See also @cyberbgone on X/Twitter, although I'm more active on LinkedIn.


Books
Gregory Conti and David Raymond, On Cyber: Towards an Operational Art for Cyber Conflict, Kopidion Press, November 2017. Reviews: Cyber Defense Review David Aitel Military Cyber Professionals Association (MCPA)
Greg Conti, Googling Security: How Much Does Google Know About You?, Addison-Wesley, November 2008. (also available in Korean and Chinese editions) EFF Favorite Book Reviews: Slashdot (Ben Rothke) Boing Boing (Cory Doctorow)
Greg Conti, Security Data Visualization: Graphical Techniques for Network Analysis, No Starch Press, September 2007. A SANS Best Security Book

InfoSec Community Conferences and Events
Greg Conti and Tom Cross, Effects Based Operations for Tech Companies, BSides Augusta, Augusta, GA, October 2025. program abstract
Greg Conti and Tom Cross, Dark Capabilities: When Tech Companies Become Threat Actors, Policy @ DEF CON, Las Vegas, NV, August 2025. slides mp4 video file
Tom Cross and Greg Conti, War Planning for Tech Companies, RSAC, San Francisco, CA, April 2025. slides YouTube
Greg Conti and Danielle Scalera, Hacker Rock and Roll: Visualizing the 20 Year Evolution of ShmooCon Research, ShmooCon, Washington, DC, January 2025. slides YouTube bar chart race demo parsing code and sample files ShmooCon dataset (v01) ShmooCon dataset (v02) poster and artwork (152MB)
Tom 'Decius' Cross and Greg Conti, Deception & Counter Deception - Defending Yourself in a World Full of Lies, DEF CON, Las Vegas, NV, August 2024. slides YouTube
Greg Conti and Tom Cross, War Planning for Tech Companies, ShmooCon, Washington, DC, January 2024. slides YouTube War Planning Questionnaire
Greg Conti, InfoSec Lessons from the War in Ukraine, Black Hat, Webinar, July 2022. slides Black Hat Video
Greg Conti, Hacking Government Bureaucracy, AvengerCon, Fort Meade, MD, October 2020. video
Greg Conti and Robert Fanelli, Comprehensive Cross-Domain Enterprise Threat Exposure Analysis, BSides Delhi, Delhi, India, October 2020. video
Greg Conti and Robert Fanelli, Operational Templates for State-Level Attack and Collective Defense of Countries, Black Hat USA, Las Vegas, NV, August 2019. white paper video
Greg Conti and Robert Fanelli, Dim Mak: A Study of the Pressure Points that Could Take Down Cyberspace, BSides Long Island, Long Island, NY, January 2019.
Gregory Conti, What Would You Do With a Nation-State Cyber Army?, USENIX Enigma, Santa Clara, CA, January 2018. video
Greg Conti, Tom Cross, and David Raymond, Pen Testing a City, Black Hat USA, Las Vegas, NV, August 2015. white paper
Tom Cross, David Raymond and Gregory Conti, The Library of Sparta: Applying Military Doctrine to CyberSecurity, RSA, San Francisco, CA, April 2015.
Tom Cross, David Raymond and Gregory Conti, Deception for the Cyber Defender: To Err is Human; to Deceive, Divine, ShmooCon, Washington, DC, January 2015. slides
David Raymond, Greg Conti, and Tom Cross, The Library of Sparta, Black Hat USA, Las Vegas, August 2014. slides Dark Reading Forrester also eSecurityPlanet, TechTarget, and Market Watch
Greg Conti, Teaching Electronic Privacy and Civil Liberties to Government, HOPE, New York City, August 2014. video
Greg Conti, Lisa Shay, and Woody Hartzog, Life Inside a Skinner Box: Confronting our Future of Automated Law Enforcement, DEFCON 20, Las Vegas, July 2012. slides Bloomberg
Lisa Shay and Greg Conti, Countermeasures: Proactive Self-Defense Against Ubiquitous Surveillance, HOPE, New York City, July 2012. slides Off the Hook Computerworld
James Caroland and Greg Conti, Lessons of the Kobayashi Maru: Cheating is Fundamental, Shmoocon, January 2012. slides video (April 2012 SOURCE Boston Extended Version Slides)
Greg Conti, The Art and Science of Security Research, DEFCON 19, August 2011. slides New York Times
Greg Conti and Sergey Bratus, Voyage of the Reverser: A Visual Study of Binary Species, Black Hat USA, July 2010. slides binvis tool release (v0.44)
Gregory Conti, Sergey Bratus, Anna Shubina, Benjamin Sangster, Roy Ragsdale, Matthew Supan, Andrew Lichtenberg, and Robert Perez-Alemany, A Visual Study of Binary Fragment Types, Black Hat USA, July 2010.
Greg Conti, Our Instrumented Lives: Sensors, Sensors, Everywhere, DEFCON 18, July 2010. slides
Benjamin Sangster, Roy Ragsdale, Gregory Conti, Automated Mapping of Large Binary Objects, Shmoocon, February 2009.
Greg Conti, Could Googling Take Down a President, a Prime Minister, or an Average Citizen?, DEFCON 16, August 2008.
Greg Conti and Erik Dean, Visual Forensic Analysis and Reverse Engineering of Binary Data, Black Hat USA, August 2008. Dangly Bytes Tool Release VizBin tool release InfoWorld Law.com Securosis
Greg Conti, Evil Interfaces: Violating the User, HOPE, July 2008.
Greg Conti, Satellite Imagery Analysis, DEFCON 15, July 2007.
Greg Conti, Googling: I'm Feeling (un)Lucky, DEFCON 14, July 2006. video
Greg Conti, Malware Cinema: A Picture is Worth a Thousand Packets, Black Hat Europe, March 2006.
Greg Conti, Google: Don't Be Evil or Don't Be Good, Interz0ne 5, March 2006.
Greg Conti, High Bandwidth Visual Analysis of Security Data Flows, Interz0ne 5, March 2006.
Greg Conti, Beyond Ethereal: Crafting A Tivo for Security Datastreams, Black Hat USA, July 2005.
Greg Conti, Countering Denial of Information Attacks, DEFCON 13, July 2005. video
Greg Conti, Countering Denial of Information Attacks with Information Visualization, Interz0ne 4, March 2005.
Greg Conti, Network Attack Visualization, DEFCON 12, August 2004. video Classical InfoVis Survey Security InfoVis Survey
Greg Conti, Network Security Data Visualization, Interz0ne3, April 2004.
Greg Conti, Interface Design of Hacking Tools, DEFCON 11, August 2003. video

Journals, Magazines, and Reports
Gregory Conti, Cybersecurity and the ransacking of the US Capitol, SC Media, 11 January 2021.
Gregory Conti, Why haven't we 'solved' cybersecurity?, Federal News Network, 12 August 2020.
Greg Conti, Covid-19: Going to war with the cybersecurity you've got, MedCity News, 9 April 2020.
Gregory Conti, How Could They Not: Thinking Like a State Threat Actor, Cyber Defense Review, Fall 2019.
Gregory Conti, Is it time for a U.S. cyber academy?, Federal Computing Weekly, 27 October 2019.
Ryan Tate, Gregory Conti, Alex Farmer, and Edward Sobiesk, Evaluating Adversarial Interfaces: An Automated Approach, IEEE Technology and Society, March 2016. Supporting Data
Woodrow Hartzog, Gregory Conti, John Nelson, and Lisa Shay, Inefficiently Automated Law Enforcement, Michigan State Law Review (1763), 2015.
Todd Arnold, Rob Harrison, Gregory Conti, and David Raymond, Shaping the Army's Cyber Operations Force: the Human Dimension, Cyber Defense Review, 12 February 2015.
Todd Arnold, Rob Harrison, and Gregory Conti, Towards a Career Path in Cyberspace Operations for Army Officers, Small Wars Journal, 18 August 2014.
Gregory Conti, Lisa Shay, and Woodrow Hartzog, Deconstructing the Relationship Between Privacy and Security, IEEE Technology and Society, Summer 2014.
Gregory Conti, Michael Weigand, Ed Skoudis, David Raymond, Thomas Cook, Todd Arnold, and Daniel Ragsdale, Towards a Cyber Leader Course: Not for the Weak or Faint Hearted, U.S. Army Cyber Center, 26 May 2014.
Gregory Conti, Michael Weigand, Ed Skoudis, David Raymond, Thomas Cook, and Todd Arnold, Towards a Cyber Leader Course Modeled on Army Ranger School, Small Wars Journal, 18 April 2014.
Todd Arnold, Rob Harrison, and Gregory Conti, Professionalizing the Army's Cyber Officer Force, U.S. Army Cyber Center, 23 November 2013.
Matthew Miller, Jonalan Brickey, and Gregory Conti, Why Your Intuition About Cyber Warfare is Probably Wrong, Small Wars Journal, 29 November 2012.
Gregory Conti, Edward Sobiesk, Paul Anderson, Steven Billington, Alex Farmer, Cory Kirk, Patrick Shaffer, and Kyle Stammer, Unintended, Malicious, and Evil Applications of Augmented Reality, InSecure, September 2012.
Jonalan Brickey, Jacob Cox, John Nelson, and Gregory Conti, The Case for Cyber, Small Wars Journal, 13 September 2012.
David Raymond and Gregory Conti, Preventing a Digital Pearl Harbor, West Point, Spring 2012.
Gregory Conti, James Caroland, Thomas Cook, and Howard Taylor, Self-Development for Cyber Warriors, Small Wars Journal, 10 November 2011.
Gregory Conti and James Caroland, Embracing the Kobayashi Maru - Why You Should Teach Your Students to Cheat, IEEE Security and Privacy, July/August 2011. Boing Boing Schneier on Security Cory Doctorow
Gregory Conti and David Raymond, Leadership of Cyber Warriors: Enduring Principles and New Directions, Small Wars Journal, 11 July 2011.
Gregory Conti, Thomas Babbitt, and John Nelson, Hacking Competitions and Their Untapped Potential for Security Education, IEEE Security and Privacy, May/June 2011.
Gregory Conti, Dominic Larkin, David Raymond and Edward Sobiesk, The Military's Cultural Disregard for Personal Information, Small Wars Journal, 6 Dec 2010. New York Times (front page) Government Information Security, also covered in Army Times, USAA, and Small Wars Journal
Gregory Conti and Jen Easterly, Recruiting, Development, and Retention of Cyber Warriors Despite an Inhospitable Culture, Small Wars Journal, 29 July 2010. Stars and Stripes TaoSecurity Foreign Policy
Gregory Conti, Mystical Math, ACM netWorker, Winter 2009.
Gregory Conti, There's a Fly in My Digital Soup, ACM netWorker, Summer 2009.
Gregory Conti and Edward Sobiesk, Malicious Interfaces and Personalization's Uninviting Future, IEEE Security and Privacy, May/June 2009.
Gregory Conti and John "Buck" Surdu, Army, Navy, Air Force, Cyber: Is it Time for a Cyberwarfare Branch of the Military, Information Assurance Newsletter, Spring 2009. TaoSecurity Slashdot Government Information Security
Sam Abbott-McCune, A.J. Newtson, Robert Ross, Ralph Ware, and Gregory Conti, Free Visualization Tools for Security Analysis and Network Monitoring, InSecure, February 2008.
Gregory Conti, Could Googling Take Down a President?, Communications of the ACM (50th Anniversary Issue), January 2008.
Edward Sobiesk and Gregory Conti, The Cost of Free Web Tools, IEEE Security and Privacy, May/June 2007. BBC Documentary video IMDb
Gregory Conti (guest editor), Hacking and Innovation (special issue), Communications of the ACM (CACM), June 2006.
Kulsoom Abdullah, Chris Lee, Gregory Conti and John Copeland, Processing Data to Construct Practical Visualizations for Network Security, Information Assurance Newsletter, Summer 2006.
Gregory Conti, Kulsoom Abdullah, Julian Grizzard, John Stasko, John Copeland, Mustaque Ahamad, Henry Owen and Chris Lee, Countering Security Analyst and Network Administrator Overload Through Alert and Packet Visualization, IEEE Computer Graphics and Applications (CG&A), March 2006.
Gregory Conti and Mustaque Ahamad, A Taxonomy and Framework for Countering Denial of Information Attacks, IEEE Security and Privacy, November/December 2005.
Gregory Conti, Why Computer Scientists Should Attend Hacker Conferences, Communications of the ACM (CACM), March 2005.
Gregory Conti, Thinking Out of the Box, Military Review, April 1998.
Gregory Conti, You Can't Circle X a Deadlined Computer, Military Intelligence, December 1994.
Gregory Conti, Automation: An Intelligence Multiplier, Military Intelligence, June 1994.

Military Conferences
Gregory Conti, Towards a Cyber Leader Course Modeled on Army Ranger School, Cyber Talks, Washington, DC, September 2014. slides video
David Raymond, Gregory Conti, Tom Cross, and Michael Nowatkowski, Key Terrain in Cyberspace: Seeking the High Ground, International Conference on Cyber Conflict (CyCon), Tallinn Estonia, June 2014.
Gregory Conti, John Nelson, and David Raymond, Towards a Cyber Common Operating Picture, International Conference on Cyber Conflict (CyCon), Tallinn Estonia, June 2013.
David Raymond, Gregory Conti, Tom Cross, and Robert Fanelli, A Control Measure Framework to Limit Collateral Damage and Propagation of Cyber Weapons, International Conference on Cyber Conflict (CyCon), Tallinn Estonia, June 2013.
Robert Fanelli and Gregory Conti, A Methodology for Cyber Operations Targeting and Control of Collateral Damage in the Context of Lawful Armed Conflict, International Conference on Cyber Conflict (CyCon), Tallinn Estonia, June 2012.
Dan Ragsdale, John M. D. Hill and Gregory Conti, The Information Assurance Program at West Point, Federal Information Systems Security Educators' Association(FISSEA) Conference, March 2003.
Ken Alford, Gregory Conti, D. Cushen, Eugene Ressler, W. Turmel and Don Welch, A Two Edged Sword: Computing at West Point, Making History: West Point at 200 Years Conference, March 2002.

Sector Conferences and Workshops
Gregory Conti, Leading Cybersecurity Innovation: Lessons Learned from Government, Academia, and Industry, Cyber Maryland, Baltimore, MD, December 2019.
Gregory Conti and Shawn Wallace, Collective Cyber Defense in the Energy Sector: Towards An Organizational Maturity Model, EnergySec, Anaheim, CA, August 2019.
Terry Rice and Gregory Conti, Collective Defense: Towards An Organizational Maturity Model, H-ISAC Spring Summit, Jacksonville, FL, May 2019.
Gregory Conti and Shawn Wallace, Taking Down the Oil and Natural Gas Sector: Into the Mind of the Nation-State Threat Actor, API Cybersecurity Conference, Houston, TX, November 2018.

Legal Conferences and Workshops
Gregory Conti, Woodrow Hartzog, John Nelson, and Lisa Shay, A Conservation Theory of Governance for Automated Law Enforcement, We Robot, Miami, April 2014. Wired Inside Higher Education
Lisa Shay, Woodrow Hartzog, John Nelson, and Gregory Conti, Do Robots Dream of Electric Laws? An Experiment in the Law as Algorithm., We Robot, Stanford, April 2013. supporting data Ars Technica Slashdot San Francisco Chronicle (24% selection rate)
Lisa Shay, Woodrow Hartzog, John Nelson, Dominic Larkin and Gregory Conti, Confronting Automated Law Enforcement, We Robot, Miami, April 2012.

Academic Conferences and Workshops
Edward Sobiesk, Jean Blair, Gregory Conti, Michael Lanham, and Howard Taylor, Cyber Education: A Multi-Level, Mult-Discipline Approach, SIGITE, Chicago, IL, October 2015. slides
Ryan Tate, Gregory Conti, and Edward Sobiesk, Automated Webpage Evaluation, ACM Research in Information Technology Conference, Orlando, October 2013.
Lisa Shay, Gregory Conti, and Woodrow Hartzog, Beyond Sunglasses and Spray Paint: A Taxonomy of Countermeasures Against Overly-Intrusive Surveillance, IEEE International Symposium on Technology and Society (ISTAS), Toronto, June 2013.
Lisa Shay, Gregory Conti, Dominic Larkin and John Nelson, A Framework for Analysis of Quotidian Exposure in an Instrumented World., IEEE Carnahan Conference on Security Technology, Boston, October 2012.
Thomas Cook, Gregory Conti, and David Raymond, When Good Ninjas Turn Bad: Preventing Your Students from Becoming the Threat, Colloquium for Information Systems Security Education, June 2012.
Gregory Conti, Sergey Bratus, Benjamin Sangster, Roy Ragsdale, Matthew Supan, Andrew Lichtenberg, Robert Perez and Anna Shubina, Automated Mapping of Large Binary Objects Using Primitive Fragment Type Classification, Digital Forensics Research Conference (DFRWS), August 2010. binvis tool re-release (v0.44)
Gregory Conti and Edward Sobiesk, Malicious Interface Design: Exploiting the User, International World Wide Web Conference (WWW 2010), April 2010. EFF Slashdot MSNBC
Benjamin Sangster, T.J. O'Connor, Thomas Cook, Robert Fanelli, Erik Dean, William J. Adams, Chris Morrell, and Gregory Conti, Toward Instrumenting Network Warfare Competitions to Generate Labeled Datasets, USENIX Security's Workshop on Cyber Security Experimentation and Test (CSET), August 2009.
Gregory Conti, Erik Dean, Matthew Sinda, and Benjamin Sangster, Visual Reverse Engineering of Binary and Data Files, Workshop on Visualization for Computer Security (VizSEC), September 2008.
Kulsoom Abdullah, Gregory Conti and Raheem Beyah, A Visualization Framework for Self-monitoring of Web-based Information Disclosure, International Conference on Communications (ICC), May 2008.
Kulsoom Abdullah, Gregory Conti and Edward Sobiesk, Self-monitoring of Web-based Information Disclosure, Workshop on Privacy in the Electronic Society, October 2007.
Gregory Conti and Edward Sobiesk, An Honest Man Has Nothing to Fear: User Perceptions on Web-based Information Disclosure, Symposium on Usable Privacy and Security (SOUPS), July 2007.
Gregory Conti, Googling Considered Harmful, New Security Paradigms Workshop, October 2006. eWeek and USENIX LOGIN coverage
Gregory Conti, Julian Grizzard, Mustaque Ahamad and Henry Owen, Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries, IEEE Symposium on Information Visualization's Workshop on Visualization for Computer Security (VizSEC), October 2005.
Kulsoom Abdullah, Chris Lee, Gregory Conti, John Copeland and John Stasko, IDS RainStorm: Visualizing IDS Alarms, IEEE Symposium on Information Visualization's Workshop on Visualization for Computer Security (VizSEC), October 2005.
Gregory Conti, Mustaque Ahamad and John Stasko, Attacking Information Visualization System Usability: Overloading and Deceiving the Human, Symposium on Usable Privacy and Security (SOUPS), July 2005.
Sven Krasser, Gregory Conti, Julian Grizzard, Jeff Gribschaw and Henry Owen, Real-Time and Forensic Network Data Analysis Using Animated and Coordinated Visualization, IEEE Information Assurance Workshop (IAW), June 2005. slides
Kulsoom Abdullah, Chris Lee, Gregory Conti and John Copeland, Visualizing Network Data for Intrusion Detection, IEEE Information Assurance Workshop (IAW), June 2005. slides
Gregory Conti, Mustaque Ahamad and Robert Norback, Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall, IEEE International Conference on Intelligence and Security Informatics (IEEE-ISI), May 2005. slides
Gregory Conti and Kulsoom Abdullah, Passive Visual Fingerprinting of Network Attack Tools, ACM Conference on Computer and Communications Security's Workshop on Visualization and Data Mining for Computer Security (VizSEC), October 2004. slides
Julian Grizzard, Sven Krasser, Henry Owen, Gregory Conti and E. Dodson, Towards an Approach for Automatically Repairing Compromised Network Systems, IEEE Symposium on Network Computing and Application's Workshop on Trustworthy Network Computing (IEEE-NCA), August 2004.
Gregory Conti, Dan Ragsdale, Scott Lathrop and Chris Gates, Implementation and Lessons Learned from an Undergraduate Special Interest Group in Information Assurance, Colloquium for Information Systems Security Education(CISSE), June 2004.
Julian Grizzard, E. Dodson, Gregory Conti, John Levine and Henry Owen, Towards a Trusted Immutable Kernel Extension (TIKE) for Self-Healing Systems: a Virtual Machine Approach, IEEE Information Assurance Workshop (IAW), June 2004.
Gregory Conti, John M. D. Hill, Scott Lathrop, Ken Alford and Dan Ragsdale, A Comprehensive Undergraduate Information Assurance Program, Third World Conference on Information Security Education (WISE3), June 2003.
Scott Lathrop, Gregory Conti and Dan Ragsdale, Information Warfare in the Trenches: Experiences from the Firing Line, Third World Conference on Information Security Education (WISE3), June 2003.
John M. D. Hill, John Surdu, Scott Lathrop, Gregory Conti and Curt Carver, MAADNET: Toward a Web-Distributed Tool for Teaching Networking and Information Assurance, Educational Multimedia, Hypermedia and Telecommunications (ED-Media), June 2003.
Ryan Tate and Kyle Blankenheim (Advisor Gregory Conti), Adapting Linux for Use on a Windows Based Campus Network: Modifying Open Source/Free Software to Meet Local Policy, Security, and Training Constraints, National Conference on Undergraduate Research(NCUR), March 2003.
John M. D. Hill, John Surdu, Scott Lathrop, Gregory Conti and Curt Carver, MAADNET NetBuilder: A Service/Demand Focused Network Simulator, Communication Networks and Distributed Systems Modeling and Simulation (CNDS) conference, January 2003.
Gregory Conti, John M. D. Hill and Curt Carver, Developing an Undergraduate Distributed Development Course, Frontiers in Education Conference (FIE), November 2002. slides Selected as Frontiers in Education New Faculty Fellow 2002
John Surdu and Gregory Conti, Join the Cyber Corps, IEEE Information Assurance Workshop (IAW), June 2002.
Gregory Conti et al., A Framework for Integrating Ethical and Values-Based Instruction into the ACM Computing Curricula 2001, Protecting Information in the Computer and Beyond Workshop, Purdue University, October 2001.
Don Welch, J. Marin and Gregory Conti, A Framework for Information Warfare Simulation, IEEE Systems, Man and Cybernetics Information Assurance Workshop, May 2001.

Other Books, Book Chapters, Journal Publications, and Notable Work
Greg Conti and Tom Cross, How to defend yourself in a world full of lies, Manyworlds, Podcast, 20 November 2024.
Gregory Conti, Paul's Security Weekly, Paul's Security Weekly - 752, Podcast, 18 August 2022.
Greg Conti, Ethical Product Design when Users are the Product, Product Crunch, Berlin, July 2021.
Gregory Conti, Ade Taylor, and Malcom Taylor, ITC Secure Wargame, ITC Secure Cyber Summit, London, January 2020.
Gregory Conti, Thinking Like an Adversary, Stanford Cyber Security Boot Camp for Congressional Staffers, Stanford, CA, August 2019.
Gregory Conti, Defending Sector Ecosystems: Good Neighbors Make Good Fences, Kleiner Perkins Offsite, San Francisco, CA, February 2017.
Gregory Conti, Security Visualization: Past, Present and Future, Symposium on Visualization for Cyber Security, Chicago, October 2015.
Gregory Conti, Thinking Like an Adversary, Stanford Cyber Security Boot Camp for Congressional Staffers, Stanford, CA, August 2015.
Lisa Shay, Woodrow Hartzog, John Nelson, Dominic Larkin, and Gregory Conti, Confronting Automated Law Enforcement, Robot Law, 2015.
Lisa Shay, Woodrow Hartzog, John Nelson, and Gregory Conti, Do Robots Dream of Electric Laws? An Experiment in the Law as Algorithm, Robot Law, 2015.
Gregory Conti and Fernando Maymi, Why CSI: Cyber Matters, Cyber Defense Review, 7 April 2015. Slashdot
Gregory Conti, Stone Turnings of Baghdad, American Woodturner Journal, December 2011.
Gregory Conti et al, History of Computing at West Point, West Point: Two Centuries And Beyond, 2004.
Gregory Conti, John M. D. Hill, Scott Lathrop, Ken Alford, and Daniel Ragsdale, Towards A Comprehensive Undergraduate Information Assurance Program, Security Education and Critical Infrastructure, Norwell, Massachusetts, 2003.
Scott Lathrop, Gregory Conti, and Daniel Ragsdale, Information Warfare In The Trenches: Experiences from the Firing Range, Security Education and Critical Infrastructure, Norwell, Massachusetts, 2003.
Al Smith, John Custer, John Berrie, Gregory Conti, and Travis Thompson, Warfighter's Guide to Intelligence Communications Architectures, Operational Support Office, June 1996.

Panels, Firesides, and Keynotes
Peiter 'Mudge' Zatko and Greg Conti, Fireside Chat: When Data Contradicts Long Held Security Beliefs, HammerCon, June 2024.
Greg Conti, Keynote: The Current and Future State of Cybersecurity - Deflecting the Trajectory, International Conference on ‘Cyber Security and Digital Forensics’ (ICCSDF), Gurgaon, India, April 2021.
Gregory Conti and Ade Taylor, Collective Defence, ITC Secure Cyber Summit, London, January 2020.
Bryson Bort, Greg Conti (moderator), and Tarah Wheeler, Replacing Complacency with Urgency, CyCon US, November 2018.
John Abeles, Jason Christman, Gregory Conti, Paul Ferrillo, Stu McArthur, and Starnes Walker, Encompassing Resilience Throughout the Entire Enterprise, Resilience Week, Wilmington, DE, November 2017.
Bryson Bort, Greg Conti (moderator), Tom Cross, Mara Tam, and Michael VanPutte, The Role of Hackers in Cyber Conflict, CyCon US, November 2017.
Gregory Conti and Srinivas Mukkamala, Human-Interactive Machine Learning for Managing Cyber Risk, Jeffries AI Summit, Boston, November 2016.
Matt Blaze (Moderator), Greg Conti, Rick Forno, and Jeff Foster, Information Security Programs in Academia, ShmooCon, 2016.
Mara Tam, Vincenzo Iozzo, Jeff Moss, Randy Wheeler and Greg Conti (Moderator), You Ain’t Seen Nothing Yet: New Paradigms for Policy, Regulation, and Community Engagement, ShmooCon, 2016.
Gregory Conti, Siddharth Garg, Nasir Memon, Salvatore Stolfo, and Ziqian (Cecillia) Dong (Moderator), Research Frontiers for Cyber-Physical Systems and the Internet of Things, NYIT Cybersecurity Conference, New York, 24 September 2015.
David Clark, Gregory Conti, and Jason Healey (Moderator), Cyber Security as a Concept, Multi-disciplinary Workshop on Cyber-security, Columbia University, New York, 22 June 2015.
Kip Brailey, Gregory Conti (Moderator), Shane Harris, and Jane Holl Lute, When Does a Cyber Threat Rise to the Level of a National Security Concern?, Center on National Security at Fordham Law School, New York, 27 April 2015.
Gregory Conti, Angela Kane, James A. Lewis (Moderator), and Rafal Rohozinski, Rethinking US Cybersecurity Policy Against a Shifting Strategic Landscape, National Committee on American Foreign Policy, New York, 6 March 2014.
Gregory Conti (Keynote Speaker), The Emerging Cyber Threat: Why We Aren't Paranoid Enough, CITI Cyber Intelligence Week, New York, 27 January 2014.
Gregory Conti, Maureen O'Connor, David Raymond, and Raymond Odierno, Leadership in Cyberspace: Game Has Changed, Korn-Ferry, New York, 22 October 2013.
Gregory Conti, Helen Greiner, Peter Singer, James Stavridis, and Yossi Vardi, Beyond Software: The Future of Conflict, Google Ideas, New York, 22 October 2013.
Chris Rouland, Robert Clark, and Gregory Conti (moderator), The Ethics of Hacking Back: Cybersecurity and Active Network Defense, Carnegie Council, New York, 18 September 2013. Forbes
Dmitri Alperovich, Gregory Conti, and Simson Garfinkel, How Do We Create a Viable Cyber Profession: Opportunities and Challenges, AFCEA TechNet Land Forces - East, Baltimore, MD, August 2012.
Marcia Hoffman, Congressman Jim Langevin, Vice Admiral Mike McConnell, Jeff Moss, and Sami Saydjari (Gregory Conti Moderator), The Role of the U.S. Government in Cyberspace, United States Military Academy Senior Conference, West Point, NY, June 2012.
Patti Ihnat, Guillaume Poupard, Howard Schmidt and Frederic Sutter (Gregory Conti Moderator), Structure and Deployment of Cyber Defenders, French American Defense Symposium on Cyber Security, Washington, DC, April 2012.
Gregory Conti, Joel Ogren, Benjamin Shao, Andy Singer (Robert Shea Moderator), Recruiting, Training, and Retaining Tomorrow's Cyber Warriors, AFCEA TechNet Land Forces - Southwest, 28 March 2012. AFCEA SIGNALSCAPE and SIGNAL Online coverage
Jamie Clark, Gregory Conti, Tanya Forsheit, Charles Palmer (Roland Trope Moderator), Deploying Tools to Build or Self-Sabotage the Enterprise: How Do We Square Legal Obligations for Cybersecurity with the Increasing Use of Technologies that Undermine It?, American Bar Association Business Law Section Spring Meeting, 23 March 2012.
Tom Bianculli, Gregory Conti, Raj Goel, Nasir Memon (Paul Stirpe Moderator), Challenges in Cloud Computing, NYIT Cyber Security Conference, 15 September 2011.
Alessandro Acquisti, Ryan Calo, Gregory Conti, and Woodrow Hartzog (Chris Hoofnagle Moderator), Human Computer Interaction and Consumer Protection, Samuelson Law, Technology & Public Policy Clinic, UC Berkeley, 30-31 March 2011.
David Aucsmith, Gregory Conti, David Dagon, Paul Judge, Val Rahmani, Chris Rouland, and Marcus Sachs (Rich DeMillo Moderator), Evolving Nature of Cyber Security Threats, GTISC Security Summit, October 2010.
Gregory Conti, Carrie Gates, John Goodall, Bill Pike (Jeremy Epstein Moderator), Data Visualization Technologies, United States Secret Service Global Cyber Security Conference, Washington, DC, August 2009.
Judit Bar-Ilan, Tom Cross, Martin Kratz and Wendy Seltzer (Gregory Conti Moderator), Web Search Privacy Issues, World Wide Web Conference (WWW2007), May 2007.
Gregory Conti, Googling Considered Harmful, Annual Computer Security Applications Conference (ACSAC), December 2006.
Steve Chan, Gregory Conti and Mary Ellen Zurko (Konstantin Beznosov moderator), Usability of Security Administration vs. Usability of End-user Security Panel, Symposium on Usable Privacy and Security (SOUPS), Carnegie Mellon University, June 2005.
Ed Balas, John Stasko, Kirsten Whitley and Bill Yurcik (Gregory Conti moderator), Visualizing Security Data, IEEE Information Assurance Workshop, United States Military Academy, June 2005.

Dissertation
Gregory Conti, Countering Network Level Denial of Information Attacks Using Information Visualization, Ph.D. Dissertation, Georgia Institute of Technology, May 2006. (Advisor: Professor Mustaque Ahamad)

Media Coverage (2013-Present)
Christopher Burgess, India-Pakistan conflict underscores your C-suite's need to prepare for war, CSO Online, 8 March 2025.
Scott Anderson, Army Cyber Corps - A Prehistory, Army.mil, 12 June 2025.
Amanda Cuda, In photos: New Canaan residents – including WWII, Vietnam vets – gather for Veterans Day, New Canaan Advertiser, 11 November 2023.
Patrick Barnard, Keynote Calls For a More 'United United States' During Veterans Day Ceremony at God's Acre, New Canaanite, 11 November 2023.
Intrigue.io, Intrigue Raises $2M to Secure the Enterprise through Attack Surface Management, PR Newswire, 13 April 2021.
Joe Gould, ‘Very difficult to defend’: What happens if hackers are inside the Pentagon’s networks?, Marine Corps Times, 27 December 2020.
Joe Gould, Wide-reaching hack has defense firms on their toes, C4ISRNET, 23 December 2020.
Robert Lemos, Rising Ransomware Breaches Underscore Cybersecurity Failures, Dark Reading, 31 October 2020.
Kelly Sheridan, Chinese and Iranian APT Groups Target US Presidential Campaigns, Dark Reading, 8 June 2020.
Robert Walton, Trump's grid security executive order will create vendor 'black list,' complicate equipment sourcing, Utility Dive, 4 May 2020.
Hugh Taylor, Seeking the Root Causes of Cyber Insecurity - Design and Development Processes, Journal of Cyber Policy, 11 March 2020.
Robert Walton, Utilities say they are prepared to meet cyber threats. Are they?, Utility Dive, 14 February 2020.
Bill Siwicki, Providers, payers and pharma must work together to thwart cyber criminals, Healthcare IT News, 11 November 2019.
Andrew Eversden, What government can do to keeps its cyber workforce, Fifth Domain, 13 August 2019.
Sara Peters, News Desk Live at Black Hat USA 2019, Dark Reading, 8 August 2019.
Benjamin Harris, Cybersecurity is a team sport, and information sharing is key, Healthcare IT News, 17 May 2019.
Michael Novinson, 10 Things IT Solution Providers Must Do To Avoid Becoming the Next Wipro, CRN, 17 April 2019.
Jamie Schwandt, If you didn't first, you're last! Why we should cheat, Small Wars Journal, 19 December 2018.
Sean Michael Kerner, How Military Tactics Apply to Cybersecurity, eSecurity Planet, 18 December 2018.
Heather Doyle, US petrochemical cyber security Must be increased amid growing threats: analyst, Reuters/Petrochemical Update, 20 October 2017.
U.S. Cyber Command, Medals honor cyber professionals for excellence, Army.mil, 18 September 2017.
Kelly Sheridan, CIO-CISO Relationship Continues to Evolve, Dark Reading, 19 October 2016.
Brian Nussbaum, Smart Cities - The Cyber Security and Privacy Implications of Ubiquitous Urban Computing, Stanford Center for Internet and Society, 9 February 2016.
PR Newswire, NYIT Cybersecurity Conference: Know Your Adversary, Increase Resiliency, PR Newswire, 28 September 2015.
Sara Peters, Smart Cities' 4 Biggest Security Challenges, Dark Reading, Information Week, 1 August 2015.
Sara Peters, Pen Testing a Smart City (Video), Dark Reading, Information Week, 22 August 2015.
Bianca Facchinei and Ameera David, Are Cities Hackable? (Video), Boom Bust, RT, 7 August 2015.
Sam Wong, Cyber Attack: How Easy is it to Take Out a Smart City?, New Scientist, 4 August 2015.
Jonathan Keane, How to Hack a City - and Why We Should, The Daily Dot, 2 August 2015.
Brent Chapman and James Finocchiaro, West Point's Role in Shaping the Cyber Force, West Point, Summer 2015.
Jeremy Bunkley, Army Cyber Institute hosts summit, builds civilian/military cyber partnership, Army.mil, 15 May 2015.
Kevin Lilley, Cyber boss part of academy-industry forum, Army Times, 15 May 2015.
Fox Business, What is needed to win the war on cyber terrorism, Fox Business, 14 May 2015.
Army Cyber Institute, Opening Remarks and Army Cyber Institute Overview, Army Cyber Institute YouTube Channel, 14 May 2015.
Jim Garamone, Winnefeld: DoD Must Strengthen Public, Private Ties, Defense.gov, 14 May 2015.
Michael Randall, Cyber security is battle to protect trust, Times Herald Record, 14 May 2015.
Fox Business, Top Cyber Security Concerns, Fox Business, 14 May 2015.
U.S. Army, Today's Focus: The Army Cyber Institute, Army Stand-To!, Army.mil, 14 May 2015.
Kevin Lilley, ACI 101: What is the Army Institute? ... and why you should care, Pointer View, 7 May 2015.
Slashdot, Why CSI: Cyber Matters, Slashdot, 7 April 2015.
PR Newswire, SANS Instructor, Ed Skoudis, Awarded the Order of Thor Medal at the Army Cyber Institute, PR Newswire, 31 March 2015.
David Raymond, Army Cyber Institute, Army Cyber Command host second 'Cyber Talks' event, Army.mil, 27 March 2015.
Slashdot, West Point and Marines Launch Open Cyber Conflict Journal, Slashdot, 15 February 2015.
David Gioe, The U.S. Army on the Cyber Battlefield - Colonel Greg Conti (Video), West Point Center for Oral History, 15 December 2014.
Tom Fox-Brewster, Sony Pictures Hack: How Much Damage Can North Korea's Cyber Army Do?, The Guardian, 5 December 2014.
Fort Gordon Public Affairs, Army Cyber Branch Offers Soldiers New Challenges, Opportunities, Army.mil, 24 November 2014.
Eric Chabrow, The Multidisciplinary IT Security Team, BankInfoSecurity, 13 November 2014.
Joseph Marks, ICYMI: Army Cyber Institute Draws from History, Ethics, Politico, 28 October 2014.
Jeremy Bunkley, SecArmy Officially Opens Cyber Institute at West Point, Army.mil, 10 October 2014.
Jim Tice, Officers Can Apply to go Cyber in Voluntary Transfer Program, Army Times, 8 October 2014.
Neal Creighton, West Point Focuses Efforts on Cyber Defense with the Army Cyber Institute, CounterTack, 7 October 2014.
Brendan Chambers, The Army Cyber Institute Formally Opens Its Doors, West Point - Facebook, 3 October 2014.
John M. McHugh, The SecArmy Remarks at Army Cyber Institute Ribbon Cutting Ceremony, Army.mil, 3 October 2014.
Robert Caruso, The US Needs Better HUMINT to Beat ISIS, Business Insider, 8 September 2014.
Eric Chabrow, Army Cyber Leader Touts Hacking Skills, CareersInfoSecurity, 4 September 2014.
Carolyn Moritz, October is European Cyber Security Month, VPN Creative, 3 September 2014.
Eric Chabrow, Cyber Military Branch: Rethinking Need, GovernmentInfoSecurity, 28 August 2014.
Neal Cavuto (host), Fox Business Investigates: Cyber Wargame, Fox Business Network, 22 August 2014.
Andrew Tilghman, In Supersecret Cyberwar Game, Civlian-sector Techies Pummel Active-duty Cyberwarriors, Army Times, 4 August 2014.
Megan Goldschmidt, Using Multiple Concepts to Secure IT, Government Information Security, 31 July 2014.
Jenna Lyons, NSA Targets College Students to Fill Cyber Professionals Shortage, USA Today, 22 July 2014.
Dara Kerr, NSA Recruits College Students for Cyber Operations Program, CNET, 15 July 2014.
NSA Public and Media Affairs, NSA Announces Five News Schools as Cyber Operations Centers of Academic Excellence, NSA, 14 July 2014.
Aviva Rutkin, Law by Algorithm: Are Computers Fairer than Humans?, New Scientist, 12 June 2014.
Eric Chabrow, A Multidisciplinary Approach to InfoSec, Bank InfoSecurity, 9 June 2014.
Bloomberg, Cyber Cadets: West Point Graduates Hackers, Bloomberg, 26 May 2014.
Glenn Rifkin, Fighting Digital Wars: West Point's Cyber Institute, Korn Ferry Briefings on Talent & Leadership, Summer 2014.
Richard Stiennon, Going Back To (Cyber) School, Forbes, 3 May 2014.
Associated Press, Call of Cyber Duty: Military Academies Take on NSA, Associated Press, 10 April 2014.
Adam Clark Estes, U.S. Army Compares New Hacker School to 'The Birth of the Air Force', GIZMODO, 10 April 2014.
Joe Gould, West Point to House Cyber Warfare Research Institute, USA Today, 8 April 2014.
U.S. Army, Secretary of the Army Lauds SHARP Program at West Point, Army.mil, 12 December 2013.
Peter Apps and Brenda Goh, Cyber Warrior Shortage Hits Anti-Hacker Fightback, Reuters, 13 October 2013.
BackgroundChecks.org, 35 Best Computer Security Professors of 2013, BackgroundChecks.org, 27 August 2013.
Michael Melia, Michael Connor, Navy Vice Admiral, Calls for Submarine Commanders' Autonomy, Associated Press, 17 July 2013.

Note: Book links may be part of Amazon's referral program