How lawyers undermine cybersecurity investigations
AI development and digital governance in multinational corporations
Mind the Gap: securely modeling cyber risk
Cyber Persistent Engagement and Defend Forward
The National Cybersecurity Strategy and Implementation Plan: securing the promise of our digital future
Building a movement: cybersecurity clinics for all
Lessons from 25 years of digital technology negotiations at the United Nations
MITRE ATLAS: community-driven tools for AI security and assurance
Not so simple: self-regulation as a cybersecurity solution
The REN-ISAC: the untold story
Advances in private information retrieval
Social engineering in research, education, and application
Digitizing voter disenfranchisement
Alan Rozenshtein & Chinmayi Sharma
The security of open platforms
Machine Learning Security: Foundations and Future
Trustworthy machine learning and the security mindset
Welcome to the new possibilities in the cybersecurity workforce
Tracy Barnes | Chetrice Mosley-Romero
Securing Indiana’s infrastructure against cyber attacks
The platform data crisis and how to solve it
Making hard content moderation decisions: lessons learned from the first year of the Facebook oversight board
Live and Let Spy? Cyber espionage in international relations and international law
Incident management
Govtech for policy delivery: cybersecurity
Security engineering for machine learning
The challenges of machine learning in adversarial settings
One Black woman’s journey to the C-suite
Contact tracing apps and public health
OmniSOC internship
Defending Democracies with Cybernorms
Election Interference: International Law and the Future of Democracy
Voting in the age of COVID-19
The law & politics of cyberattack attribution
Save the date
Save the date
Securing a World of Physically Capable Computers
Title: "It’s not me, it’s you." Who said it best, the Board or the CISO?
Executives can avoid the dreaded “break-up” by understanding that the CISO role has evolved over the years into a much more business centric position.
Title: Measuring bias in social network ad targeting and delivery
The enormous financial success of online advertising platforms is partially due to the precise targeting and delivery features they offer.
Title: Resolving the online tragedy
As a whole, our attention, privacy, and behavioral autonomy are common goods, and we must protect them.
Title: Swift and reasonable action: A higher education CISO’s perspective
Andrew Korty gave an overview of his duties and an update on operational cybersecurity activities at the university.
Title: Cybersecurity for Challenging Environments - Complicated vs Complex Systems and Shared SOCs
This talk will cover recent categorizations of Cybersecurity as a Complex System, and how this complexity may present challenges to building a shared Security Operations Center. As Geoff E at NCSC eloquently states "...let's begin by accepting that we are not entirely the masters of the systems we are creating
Title: Cybersecurity - Knowing why we’re doing what it is we do
The purpose of this presentation is to advance critical thinking about cybersecurity. The goal is to encourage on-going discussion and searching for ways to proactively, effectively facilitate cybersecurity actions that are truly and cost-effectively achieving clearly identified reasons for conducting such actions in the first place. That is, to proactively seek to ensure that we do not let the cybersecurity actions themselves become the goal.
Title: Librarians at the forefront in the fight for privacy: Lessons from the Library Freedom Project
The future is here, and it's not pretty. Facebook knows more about us than we know about ourselves, and they're facing endless scandals about how they've misused that data. Digital DNA testing companies get breached, "smart" devices accidentally record private conversations, bounty hunters buy location information direct from internet providers, and government surveillance is just as pervasive as when Edward Snowden tried to warn us all about back in 2013.
Title: Cybersecurity and U.S. Elections
Strengthening election cybersecurity is essential for safeguarding democracy. Attacks against recent elections in the U.S. and Europe demonstrate that cybercriminals and nation-state attackers are becoming more aggressive, even as campaigning and voting become increasingly reliant on computers.
Title: A Hard Truth: Executives and Boards Don’t Care About Cybersecurity (And Why That’s Actually a Good Thing)
We like to think that with data breaches having a fixed presence in the headlines that cybersecurity must be the top concern among executive teams and boards. It’s not. In fact, a recent survey from Harvard Business Review found that just 38 percent of board directors have a high level of concern about cybersecurity risks, and an even smaller segment said they were prepared for these risks. In this session, Rook Security Founder and CEO J.J. Thompson shares what executives and boards really care about and why security leaders need to change their approach if they want cybersecurity to be taken seriously in the board room.
Title: The Internet of Torts
The “Internet of Things” (IoT) is made up of a proliferation of internet-connected devices that many would consider everyday items. It presents unique challenges, granting companies unprecedented control over consumers’ use of property in ways that implicate consumer safety. Contract and tort law currently operate to shield companies from liability, but this 21st century version of harmful remote action is not adequately addressed by our 20th century civil liability regime.
Title: The Internet of Things: Testing for Consumer Privacy, Security, and Data Practices
Consumers care about digital privacy and security but often have no way to understand how a product or service treats and protects their data.
Title: Tales of an Accidental Computer Science Professor
This talk highlights of Lorrie Cranor's journey from student journalist to “accidental” computer science professor, with stints in technical standards, entrepreneurship, fiber arts, fashion design, and government service.
Title: Building a Cybersecure Navy
How do you secure a data center, that's installed on a warship...while fighting at sea in a combat zone? How do you defend against motivated adversaries with enormous budgets?
Title: What is Cybersecurity doing for the organization’s mission?
With the emergence of even more dangerous threats such as ransomware/wiperware, state-sponsored hackers, and large-scale data breaches, it now takes a coordinated organizational effort to address cybersecurity. This needs to be addressed as a business problem, not as a technical problem.
Title: Cybersecurity and the Internet of Things
The stakes with IoT devices are a lot higher than with average smart phone or notebook. While they are mostly in the possession of the owner, IoT devices will be deployed and almost exclusively operated in potential hostile environments and will have to defend itself against physical online or offline attacks.