Speaker Series Archive

CACR is pleased to offer recordings of their speaker series on their YouTube site.  For all events prior to January 2025, a historical record is available on this page for ease of reference.

 

2024

 

How lawyers undermine cybersecurity investigations

Watch the Recording on YouTube

Lawyers lead the investigations for many cybersecurity incidents, ranging from data breaches to ransomware, in part because they can often shield any materials produced after a breach from discovery under either attorney-client privilege or work product immunity.

Moreover, by limiting and shaping the documentation that is produced by breached firms’ personnel and third-party consultants in the wake of a cyberattack, attorneys can limit the availability of potentially damaging information to plaintiffs’ attorneys, regulators, or media, even if their attorney-client privilege and work product immunity arguments falter.

This talk draws on a project involving over sixty interviews with a broad range of actors in the cybersecurity landscape—including lawyers, forensic investigators, insurers, and regulators—to explore the impact of legal leadership on cybersecurity investigations and reveal how, in their zeal to preserve the confidentiality of incident response efforts, lawyers may sometimes undermine the long-term cybersecurity of both their clients and society more broadly.

 

Bio

Josephine Wolff is associate professor of cybersecurity policy at the Fletcher School of Law and Diplomacy at Tufts University. Her research interests include liability for cybersecurity incidents, international Internet governance, cyber-insurance, cybersecurity workforce development, and the economics of information security. Her first book You'll See This Message When It Is Too Late: The Legal and Economic Aftermath of Cybersecurity Breaches was published by MIT Press in 2018. Her second book Cyberinsurance Policy: Rethinking Risk in an Age of Ransomware, Computer Fraud, Data Breaches, and Cyberattacks was published by MIT Press in 2022. Her writing on cybersecurity has also appeared in Slate, The New York Times, The Washington Post, The Atlantic, and Wired. Prior to joining Fletcher, she was an assistant professor of public policy at the Rochester Institute of Technology and a fellow at the New America Cybersecurity Initiative and Harvard's Berkman Klein Center for Internet & Society.

 

AI development and digital governance in multinational

Watch the Recording on YouTube

The convergence of multiple policy and societal vectors makes this a unique moment in time for multinational corporations:

  • new/emerging technologies (e.g., generative AI)
  • new data and patient-centric business models (product-specific patient care platforms)
  • unpredictable societal norms and reactions regarding social media, surveillance, and AI (individuals have begun asserting privacy rights where they exist and large tech app platforms have begun creating their own rules and policies)
  • unprecedented and continuing proliferation of privacy laws and regulations not only in Europe, but in countries previously unimaginable, such as China and Brazil, and throughout the world and now in the US
  • increasingly aggressive enforcement of privacy/data protection and consumer protection laws and regulations by global regulators and by US state and federal regulators and by plaintiffs’ attorneys in the US

As a result of this convergence, AI development, training, and deployment, especially where collection and use of sensitive data is required, is facing significant headwinds -- and managing digital incidents (e.g., deep fakes, privacy and AI litigation, very tailored cyber-attacks) is requiring significant resources.

We are spending (and will continue allocating) significant resources to address what amounts to administrative compliance issues (e.g., correct language on privacy notices) and far fewer resources to address the real potential harms we as a society care about and could be facing from this convergence.

 

Bio

Stan Crosley is the founder and managing partner of Crosley Law Offices (est. 2010), and, along with Fred Cate, in 2022 created and launched Red Barn Strategy. Stan has more than 25 years of privacy and data strategy experience and is the former Chief Privacy Officer at Eli Lilly and Company, where he initiated and implemented the privacy program in 2000 as one of the first CPOs in the United States. Stan is an adjunct professor of Maurer School of Law, a senior fellow with the Future of Privacy Forum, and a senior strategist with the Information Accountability Foundation. Stan was recently named a Westin Emeritus Fellow by the International Association of Privacy Professionals (IAPP), one of only 50 globally among a professional association of 85,000 members.

Stan was a co-founder of the International Pharmaceutical and Medical Device Privacy Consortium, which he chaired for its first decade and is a former member of the board of IAPP, and co-chair of the HHS/ONC Privacy and Security Workgroup. Stan’s experience extends from in-house chief privacy officer to an attorney with three separate large law firms, to appointments in academia, research NGOs, non-profit advisory boards, and federal government committees and is a frequent speaker on data strategy, digital governance, and data protection at conferences around the world. Crosley Law and Red Barn Strategy are incredibly fortunate to work with some of the largest and most successful multinational corporations in the world on data strategy and data governance, as well as small start-ups and non-profits, across the business ecosystem, including Apple, Pfizer, Lilly, Abbott, Walgreens, Regeneron, Microsoft, Amgen, Natera, Edwards Life Sciences, Chipotle, Roche, Nike, US Golf Association, Moderna, Indiana University Foundation, and many others.

 

Mind the Gap: securely modeling cyber risk

Watch the Recording on YouTube

There are two strategic and longstanding questions about cyber risk that organizations largely have been unable to answer: What is an organization's estimated risk exposure and how does its security compare with peers? Answering both requires industry-wide data on security posture, incidents, and losses that, until recently, have been too sensitive for organizations to share.

Now, privacy enhancing technologies (PETs) such as cryptographic computing can enable the secure computation of aggregate cyber risk metrics from a peer group of organizations while leaving sensitive input data undisclosed. As these new aggregate data become available, analysts need ways to integrate them into cyber risk models that can produce more reliable risk assessments and allow comparison to a peer group.

This paper proposes a new framework for benchmarking cyber posture against peers and estimating cyber risk within specific economic sectors using the new variables emerging from secure computations. We introduce a new top-line variable called the “Defense Gap Index” representing the weighted security gap between an organization and its peers that can be used to forecast an organization’s own security risk based on historical industry data. We apply this approach in a specific sector using data collected from 25 large firms, in partnership with an industry ISAO, to build an industry risk model and provide tools back to participants to estimate their own risk exposure and privately compare their security posture with their peers.

 

Bio

Taylor Reynolds, Ph.D., is the research director of MIT's Internet Policy Research Initiative. In this role, he leads the development of this interdisciplinary field of research to help policymakers address cybersecurity and Internet public policy challenges. He is responsible for building the community of researchers and students from departments and research labs across MIT, executing the strategic plan, and overseeing the day-to-day operations of the Initiative. Taylor's current research focuses on three areas: leveraging cryptographic tools for measuring cyber risk, privacy enhancing technologies, and international AI policy.

Taylor was previously a senior economist at the OECD and led the organization’s Information Economy Unit covering policy issues such as the role of information and communication technologies in the economy, digital content, the economic impacts of the Internet and green ICTs. His previous work at the OECD concentrated on telecommunication and broadcast markets with a particular focus on broadband.

Before joining the OECD, Taylor worked at the International Telecommunication Union, the World Bank and the National Telecommunications and Information Administration (United States). Taylor has an MBA from MIT and a Ph.D. in Economics from American University in Washington, DC.

Richard Harknett Cyber Persistent Engagement and Defend Forward

The United States has shifted its approach to the challenge of cyber insecurity through the adoption of a National Cyber Strategy focused on persistently engaging in the limitation, frustration, and disruption of adversary cyber campaigns. The DoD strategy of Defend Forward reconceptualizes how to manage strategic competition in and through cyberspace. The United Kingdom, Netherlands, South Korea, Japan, and others have all adopted in the last year a more anticipatory footing toward reducing cyber insecurity. This talk will examine the core theoretical logic behind this shift—the concept of initiative persistence and what it means for education, workforce development and whole of nation-plus postures.

 

Bio

Dr. Richard J. Harknett is professor and director of the School of Public and International Affairs and chair of the Center for Cyber Strategy and Policy at the University of Cincinnati. He co-directs the Ohio Cyber Range Institute, a state-wide organization supporting education, workforce, economic, and research development in cybersecurity. He served as Scholar-in-Residence at U.S. Cyber Command and National Security Agency. He has presented both policy briefings and academic research in 11 countries, on Capitol Hill, and to various US Federal and State government agencies. Professor Harknett has held two Fulbright Scholar appointments: in Cyber Studies at Oxford University, UK and in International Relations at the Diplomatic Academy, Vienna, Austria, where he holds a professorial lecturer appointment. He has authored over 60 publications including the co-authored book Cyber Persistence Theory: redefining national security in cyberspace (Oxford Univ Press, 2022) and has contributed to raising over $50 million in institutional and research grant and philanthropic support.

 

The National Cybersecurity Strategy and Implementation Plan: securing the promise of our digital future

Watch the Recording on YouTube

Cybersecurity is essential to the basic functioning of our economy, the operation of our critical infrastructure, the strength of our democracy, the privacy of our data and communications, and our national defense. Last year, the Biden-Harris Administration released the National Cybersecurity Strategy which details the comprehensive approach the Administration is taking to better secure cyberspace and ensure the United States is in the strongest possible position to realize all the benefits and potential of our digital future. To realize the bold affirmative vision laid out in the Strategy, the Administration also took the novel step of publishing a National Cybersecurity Strategy Implementation Plan to ensure transparency and a continued path for coordination.

In this discussion with Stephen Viña, Senior Advisor at the Office of the National Cyber Director, we will explore the application of the National Cybersecurity Strategy to urgent, present-day issues such as the security of our critical infrastructure and cyber workforce needs and how the strategy sets the agenda for the Office of the National Cyber Director.

 

Bio

Stephen Viña is the Senior Advisor to the Deputy National Cyber Director for National Cybersecurity in the Office of the National Cyber Director (ONCD). In this role, Stephen supports the execution of the Division’s activities, develops and coordinates cybersecurity planning, polices, and programs, and leads the office’s cyber insurance initiatives. Previously at ONCD, Stephen was the inaugural Assistant National Cyber Director for Legislative Affairs, where he led the office’s relationship with Congress.

Prior to joining ONCD, Stephen was a Senior Vice President at Marsh, where he served as a cyber insurance broker and claims specialist, helping organizations manage their cyber risks and recover financial losses after a cyber incident. Earlier in his career, Stephen spent nearly fifteen years on Capitol Hill advising Members of Congress on security issues. During this time, Stephen helped pass several major pieces of cyber legislation and held leadership positions in both the House and Senate, including Chief Counsel for Homeland Security on the Senate Homeland Security and Governmental Affairs Committee and Subcommittee Staff Director on the House Committee on Homeland Security.

Stephen began his professional career as a Legislative Attorney at the Congressional Research Service where he focused on homeland security matters. He was also an Adjunct Professor for Texas A&M University School of Law and American University where he taught public policy and cybersecurity courses.

Stephen holds a law degree from Texas Wesleyan University School of Law in Fort Worth, Texas (now Texas A&M University School of Law) and is a Certified Information Privacy Professional (CIPP/US) and member of the Hispanic National Bar Association.

Ann Cleaveland Building a movement: cybersecurity clinics for all

Co-hosted with CEW&T

What does it take to build an international movement for cybersecurity clinics? What is different about defending the most vulnerable organizations from cyberattack? This talk will explore how the Consortium of Cybersecurity Clinics grew from a few isolated efforts to an international network of university-based clinics with members on four continents. Where should the movement for cybersecurity clinics go from here?

Drawing on research and practice, we'll also discuss what can be learned from the experience of UC Berkeley's Citizen Clinic, which helps non-profit organizations build the capabilities they need to proactively defend themselves against digital threats, enabling them to focus on fulfilling their missions and driving social change. Since 2018 the Citizen Clinic has worked with civil society organizations at higher risk of politically motivated cyberattack to provide the tools and knowledge they need to defend themselves online. What is unique about the cybersecurity environment for this sector, and what insights can we derive to help other public-interest and community organizations?

 

Bio

Ann Cleaveland is the executive director of the Center for Long-Term Cybersecurity, a multidisciplinary research center at the University of California, Berkeley. She also chairs the Consortium of Cybersecurity Clinics, which she co-founded in 2021. Cleaveland has held leadership positions in philanthropy, non-profit management, and industry. She previously served as interim executive director of the Berkeley Institute for Data Science and as the senior director of strategic planning at the ClimateWorks Foundation. She received an MBA in Sustainable Management from the Presidio Graduate School and a B.A. from Rice University. Her research interests include cybersecurity futures, digital risk communications, and governance of cyber risk.

 

Vignard Lessons from 25 years of digital technology negotiation at the United Nations

Co-hosted with the Hamilton Lugar School and the Luddy School

What can be learned from the UN negotiations on cyber in the context of international security (from 2004-2021) and those on lethal autonomous weapon systems (2014-present) applicable to the objectives of developing shared understanding of Responsible AI (RAI) in the military domain and accelerating international operationalization of RAI practices?

In this discussion with former UNIDIR Deputy Director Kerstin Vignard, we will explore what can be learned from how the international community has approached the development of norms of responsible State behavior in the absence of appetite for new treaties. Would a similar approach focusing on reaffirming existing international law, agreement on norms, identification of confidence-building measures, and the development of capacity-building initiatives suffice in the field of military applications of AI? Or have these approaches proven too slow to keep pace with the speed of innovation while excluding key stakeholders, such as technologists and the private sector?

Bio

Ms. Vignard is an international security policy professional with interests at the nexus of international policy, technology, and responsible innovation. Her areas of expertise include AI, autonomous technologies, cyber, and human enhancement.

Following a 25-year career at the United Nations, in 2021 Vignard joined the Johns Hopkins University Applied Physics Laboratory (APL) where she works on a range of issues related to improving technical advice to multilateral policy fora and engaging technologists on ethical, legal, and social implications of innovation. Prior to joining APL, Vignard was the deputy director of the UN’s international security thinktank, UNIDIR (2012-2019), and UNIDIR’s chief of projects and publications (2005-2012). Vignard was responsible for building UNIDIR’s Security and Technology programme, and established UNIDIR’s workstreams on AI-enabled weapon systems and cyber issues. From 2019 to 2021, Vignard was on special assignment leading the UNIDIR team supporting the Chairmen of the Group of Governmental Experts (GGE) on Cyber Security and the first Open-Ended Working Group on ICTs. She also led UNIDIR’s team supporting four previous cyber GGEs.

In 2021 Vignard was named to the list “100 brilliant women in AI ethics” and is a research scholar affiliated with the Institute for Assured Autonomy.