

How lawyers undermine cybersecurity investigations

AI development and digital governance in multinational corporations

Mind the Gap: securely modeling cyber risk
Cyber Persistent Engagement and Defend Forward

The National Cybersecurity Strategy and Implementation Plan: securing the promise of our digital future

Building a movement: cybersecurity clinics for all

Lessons from 25 years of digital technology negotiations at the United Nations

MITRE ATLAS: community-driven tools for AI security and assurance

Not so simple: self-regulation as a cybersecurity solution

The REN-ISAC: the untold story

Advances in private information retrieval

Social engineering in research, education, and application

Digitizing voter disenfranchisement

Alan Rozenshtein & Chinmayi Sharma
The security of open platforms

Machine Learning Security: Foundations and Future

Trustworthy machine learning and the security mindset

Welcome to the new possibilities in the cybersecurity workforce

Tracy Barnes | Chetrice Mosley-Romero
Securing Indiana’s infrastructure against cyber attacks

The platform data crisis and how to solve it

Making hard content moderation decisions: lessons learned from the first year of the Facebook oversight board

Live and Let Spy? Cyber espionage in international relations and international law

Incident management

Govtech for policy delivery: cybersecurity

Security engineering for machine learning

The challenges of machine learning in adversarial settings

One Black woman’s journey to the C-suite

Contact tracing apps and public health

OmniSOC internship

Defending Democracies with Cybernorms

Election Interference: International Law and the Future of Democracy

Voting in the age of COVID-19

The law & politics of cyberattack attribution

Save the date

Save the date

Securing a World of Physically Capable Computers

Title: "It’s not me, it’s you." Who said it best, the Board or the CISO?
Executives can avoid the dreaded “break-up” by understanding that the CISO role has evolved over the years into a much more business centric position.

Title: Measuring bias in social network ad targeting and delivery
The enormous financial success of online advertising platforms is partially due to the precise targeting and delivery features they offer.

Title: Resolving the online tragedy
As a whole, our attention, privacy, and behavioral autonomy are common goods, and we must protect them.

Title: Swift and reasonable action: A higher education CISO’s perspective
Andrew Korty gave an overview of his duties and an update on operational cybersecurity activities at the university.

Title: Cybersecurity for Challenging Environments - Complicated vs Complex Systems and Shared SOCs
This talk will cover recent categorizations of Cybersecurity as a Complex System, and how this complexity may present challenges to building a shared Security Operations Center. As Geoff E at NCSC eloquently states "...let's begin by accepting that we are not entirely the masters of the systems we are creating

Title: Cybersecurity - Knowing why we’re doing what it is we do
The purpose of this presentation is to advance critical thinking about cybersecurity. The goal is to encourage on-going discussion and searching for ways to proactively, effectively facilitate cybersecurity actions that are truly and cost-effectively achieving clearly identified reasons for conducting such actions in the first place. That is, to proactively seek to ensure that we do not let the cybersecurity actions themselves become the goal.
Title: Librarians at the forefront in the fight for privacy: Lessons from the Library Freedom Project
The future is here, and it's not pretty. Facebook knows more about us than we know about ourselves, and they're facing endless scandals about how they've misused that data. Digital DNA testing companies get breached, "smart" devices accidentally record private conversations, bounty hunters buy location information direct from internet providers, and government surveillance is just as pervasive as when Edward Snowden tried to warn us all about back in 2013.

Title: Cybersecurity and U.S. Elections
Strengthening election cybersecurity is essential for safeguarding democracy. Attacks against recent elections in the U.S. and Europe demonstrate that cybercriminals and nation-state attackers are becoming more aggressive, even as campaigning and voting become increasingly reliant on computers.

Title: A Hard Truth: Executives and Boards Don’t Care About Cybersecurity (And Why That’s Actually a Good Thing)
We like to think that with data breaches having a fixed presence in the headlines that cybersecurity must be the top concern among executive teams and boards. It’s not. In fact, a recent survey from Harvard Business Review found that just 38 percent of board directors have a high level of concern about cybersecurity risks, and an even smaller segment said they were prepared for these risks. In this session, Rook Security Founder and CEO J.J. Thompson shares what executives and boards really care about and why security leaders need to change their approach if they want cybersecurity to be taken seriously in the board room.

Title: The Internet of Torts
The “Internet of Things” (IoT) is made up of a proliferation of internet-connected devices that many would consider everyday items. It presents unique challenges, granting companies unprecedented control over consumers’ use of property in ways that implicate consumer safety. Contract and tort law currently operate to shield companies from liability, but this 21st century version of harmful remote action is not adequately addressed by our 20th century civil liability regime.

Title: The Internet of Things: Testing for Consumer Privacy, Security, and Data Practices
Consumers care about digital privacy and security but often have no way to understand how a product or service treats and protects their data.

Title: Tales of an Accidental Computer Science Professor
This talk highlights of Lorrie Cranor's journey from student journalist to “accidental” computer science professor, with stints in technical standards, entrepreneurship, fiber arts, fashion design, and government service.

Title: Building a Cybersecure Navy
How do you secure a data center, that's installed on a warship...while fighting at sea in a combat zone? How do you defend against motivated adversaries with enormous budgets?

Title: What is Cybersecurity doing for the organization’s mission?
With the emergence of even more dangerous threats such as ransomware/wiperware, state-sponsored hackers, and large-scale data breaches, it now takes a coordinated organizational effort to address cybersecurity. This needs to be addressed as a business problem, not as a technical problem.
Title: Cybersecurity and the Internet of Things
The stakes with IoT devices are a lot higher than with average smart phone or notebook. While they are mostly in the possession of the owner, IoT devices will be deployed and almost exclusively operated in potential hostile environments and will have to defend itself against physical online or offline attacks.