<div dir="ltr"><div class="gmail_quote"><br class="">---------- Forwarded message ----------<br>From: <b class="gmail_sendername">Melanie Penagos</b> <span dir="ltr"><<a href="mailto:melanie@publicknowledge.org">melanie@publicknowledge.org</a>></span><br>Date: Wed, Nov 4, 2015 at 9:48 AM<br><br><div dir="ltr"><div>FYI, the Council on Foreign Relations is hosting a Cybersecurity Symposium today. They are <a href="http://www.cfr.org/events/series.html?id=96" target="_blank">live streaming</a> the following panels (which focus on the state of cybersecurity in the U.S. and around the world). </div><div><div style="margin:0px;padding:2em 0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;border-top-style:none;border-color:initial;font-size:16px;font-family:sans-serif;vertical-align:baseline"><p style="margin:0px 0px 0.42857em;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-size:0.875em;font-family:Arial,sans-serif;vertical-align:baseline;line-height:21px;color:rgb(136,136,136)">November 4, 2015</p><h4 style="margin:0px 0px 9px;padding:0px;border:0px;font-weight:normal;font-style:inherit;font-size:1.5em;font-family:'Haarlemmer MT W01',Georgia,'Times New Roman',serif;vertical-align:baseline;letter-spacing:-1px"><a href="http://www.cfr.org/homeland-security/conversation-jeh-charles-johnson/p37196" target="_blank" style="color:rgb(42,105,161);margin:0px;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-family:inherit;vertical-align:baseline;text-decoration:none">A Conversation With Jeh Charles Johnson</a></h4><p style="margin:0px 0px 0.8em;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-size:15px;font-family:georgia;vertical-align:baseline;line-height:21px">Jeh Charles Johnson discusses the state of U.S. cybersecurity.</p><div style="margin:0px;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-family:inherit;vertical-align:baseline;float:none;display:inline-block"><h5 style="margin:0px;padding:0px;border:0px;font-weight:normal;font-style:inherit;font-size:1.125em;font-family:inherit;vertical-align:baseline">Speakers:</h5><div style="margin:0px;padding:2.5em 1.375em 0px 0px;border:0px;font-weight:inherit;font-style:inherit;font-size:0.75em;font-family:inherit;vertical-align:top;max-width:18.3333em;display:inline-table"><div style="margin:0px;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-family:inherit;vertical-align:top;display:table-cell"><span style="margin:0px;padding:0px;border:0px;font-weight:bold;font-style:inherit;font-family:Arial,sans-serif;vertical-align:baseline;display:block">Jeh Charles Johnson</span><p style="margin:0px 0px 0.8em;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-size:1em;font-family:Arial,sans-serif;vertical-align:baseline;line-height:1.25em">Secretary, U.S. Department of Homeland Security</p></div></div> <div style="margin:0px;padding:2.5em 1.375em 0px 0px;border:0px;font-weight:inherit;font-style:inherit;font-size:0.75em;font-family:inherit;vertical-align:top;max-width:18.3333em;display:inline-table"><div style="margin:0px;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-family:inherit;vertical-align:top;display:table-cell"><span style="margin:0px;padding:0px;border:0px;font-weight:bold;font-style:inherit;font-family:Arial,sans-serif;vertical-align:baseline;display:block">Andrea Mitchell</span><p style="margin:0px 0px 0.8em;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-size:1em;font-family:Arial,sans-serif;vertical-align:baseline;line-height:1.25em">Chief Foreign Affairs Correspondent, NBC News</p></div></div></div></div><div style="margin:0px;padding:2em 0px;border-width:1px 0px 0px;border-top-style:solid;border-top-color:rgb(236,229,228);font-size:16px;font-family:sans-serif;vertical-align:baseline"><p style="margin:0px 0px 0.42857em;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-size:0.875em;font-family:Arial,sans-serif;vertical-align:baseline;line-height:21px;color:rgb(136,136,136)">November 4, 2015</p><h4 style="margin:0px 0px 9px;padding:0px;border:0px;font-weight:normal;font-style:inherit;font-size:1.5em;font-family:'Haarlemmer MT W01',Georgia,'Times New Roman',serif;vertical-align:baseline;letter-spacing:-1px"><a href="http://www.cfr.org/cybersecurity/cybersecurity-elsewhere/p37195" target="_blank" style="color:rgb(42,105,161);margin:0px;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-family:inherit;vertical-align:baseline;text-decoration:none">Cybersecurity Elsewhere</a></h4><p style="margin:0px 0px 0.8em;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-size:15px;font-family:georgia;vertical-align:baseline;line-height:21px">Experts discuss cybersecurity around the world.</p><div style="margin:0px;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-family:inherit;vertical-align:baseline;float:none;display:inline-block"><h5 style="margin:0px;padding:0px;border:0px;font-weight:normal;font-style:inherit;font-size:1.125em;font-family:inherit;vertical-align:baseline">Speakers:</h5><div style="margin:0px;padding:2.5em 1.375em 0px 0px;border:0px;font-weight:inherit;font-style:inherit;font-size:0.75em;font-family:inherit;vertical-align:top;max-width:18.3333em;display:inline-table"><div style="margin:0px;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-family:inherit;vertical-align:top;display:table-cell"><span style="margin:0px;padding:0px;border:0px;font-weight:bold;font-style:inherit;font-family:Arial,sans-serif;vertical-align:baseline;display:block">Preetam Maloor</span><p style="margin:0px 0px 0.8em;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-size:1em;font-family:Arial,sans-serif;vertical-align:baseline;line-height:1.25em">Strategy and Policy Advisor, Corporate Strategy Division, International Telecommunication Union</p></div></div> <div style="margin:0px;padding:2.5em 1.375em 0px 0px;border:0px;font-weight:inherit;font-style:inherit;font-size:0.75em;font-family:inherit;vertical-align:top;max-width:18.3333em;display:inline-table"><div style="margin:0px;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-family:inherit;vertical-align:top;display:table-cell"><span style="margin:0px;padding:0px;border:0px;font-weight:bold;font-style:inherit;font-family:Arial,sans-serif;vertical-align:baseline;display:block">Iddo Moed</span><p style="margin:0px 0px 0.8em;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-size:1em;font-family:Arial,sans-serif;vertical-align:baseline;line-height:1.25em">Cybersecurity Coordinator, Foreign Ministry of Israel</p></div></div> <div style="margin:0px;padding:2.5em 1.375em 0px 0px;border:0px;font-weight:inherit;font-style:inherit;font-size:0.75em;font-family:inherit;vertical-align:top;max-width:18.3333em;display:inline-table"><div style="margin:0px;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-family:inherit;vertical-align:top;display:table-cell"><span style="margin:0px;padding:0px;border:0px;font-weight:bold;font-style:inherit;font-family:Arial,sans-serif;vertical-align:baseline;display:block">Makita Shimokawa</span><p style="margin:0px 0px 0.8em;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-size:1em;font-family:Arial,sans-serif;vertical-align:baseline;line-height:1.25em">Deputy Director General, Foreign Policy Bureau and Ambassador in Charge of UN Affairs, Ambassador in Charge of Cyber Policy, Ministry of Foreign Affairs, Government of Japan</p></div></div> <div style="margin:0px;padding:2.5em 1.375em 0px 0px;border:0px;font-weight:inherit;font-style:inherit;font-size:0.75em;font-family:inherit;vertical-align:top;max-width:18.3333em;display:inline-table"><div style="margin:0px;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-family:inherit;vertical-align:top;display:table-cell"><span style="margin:0px;padding:0px;border:0px;font-weight:bold;font-style:inherit;font-family:Arial,sans-serif;vertical-align:baseline;display:block">Diego Molano Vega</span><p style="margin:0px 0px 0.8em;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-size:1em;font-family:Arial,sans-serif;vertical-align:baseline;line-height:1.25em">Former Minister, Information Technologies and Communication, Government of Colombia</p></div></div></div><div style="margin:0px;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-family:inherit;vertical-align:baseline;float:none;display:inline-block"><h5 style="margin:0px;padding:0px;border:0px;font-weight:normal;font-style:inherit;font-size:1.125em;font-family:inherit;vertical-align:baseline">Presider:</h5><div style="margin:0px;padding:2.5em 1.375em 0px 0px;border:0px;font-weight:inherit;font-style:inherit;font-size:0.75em;font-family:inherit;vertical-align:top;max-width:18.3333em;display:inline-table"><div style="margin:0px;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-family:inherit;vertical-align:top;display:table-cell"><span style="margin:0px;padding:0px;border:0px;font-weight:bold;font-style:inherit;font-family:Arial,sans-serif;vertical-align:baseline;display:block">Jessica T. Mathews</span><p style="margin:0px 0px 0.8em;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-size:1em;font-family:Arial,sans-serif;vertical-align:baseline;line-height:1.25em">Distinguished Fellow, Carnegie Endowment for International Peace</p></div></div></div></div><div style="margin:0px;padding:2em 0px;border-width:1px 0px 0px;border-top-style:solid;border-top-color:rgb(236,229,228);font-size:16px;font-family:sans-serif;vertical-align:baseline"><p style="margin:0px 0px 0.42857em;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-size:0.875em;font-family:Arial,sans-serif;vertical-align:baseline;line-height:21px;color:rgb(136,136,136)">November 4, 2015</p><h4 style="margin:0px 0px 9px;padding:0px;border:0px;font-weight:normal;font-style:inherit;font-size:1.5em;font-family:'Haarlemmer MT W01',Georgia,'Times New Roman',serif;vertical-align:baseline;letter-spacing:-1px"><a href="http://www.cfr.org/cybersecurity/cyber-offense-rules-road/p37193" target="_blank" style="color:rgb(42,105,161);margin:0px;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-family:inherit;vertical-align:baseline;text-decoration:none">Cyber Offense and Rules of the Road</a></h4><p style="margin:0px 0px 0.8em;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-size:15px;font-family:georgia;vertical-align:baseline;line-height:21px">Experts discuss the laws and norms surrounding cyber issues.</p><div style="margin:0px;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-family:inherit;vertical-align:baseline;float:none;display:inline-block"><h5 style="margin:0px;padding:0px;border:0px;font-weight:normal;font-style:inherit;font-size:1.125em;font-family:inherit;vertical-align:baseline">Speakers:</h5><div style="margin:0px;padding:2.5em 1.375em 0px 0px;border:0px;font-weight:inherit;font-style:inherit;font-size:0.75em;font-family:inherit;vertical-align:top;max-width:18.3333em;display:inline-table"><div style="margin:0px;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-family:inherit;vertical-align:top;display:table-cell"><span style="margin:0px;padding:0px;border:0px;font-weight:bold;font-style:inherit;font-family:Arial,sans-serif;vertical-align:baseline;display:block">Scott Charney</span><p style="margin:0px 0px 0.8em;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-size:1em;font-family:Arial,sans-serif;vertical-align:baseline;line-height:1.25em">Corporate Vice President of Trustworthy Computing, Microsoft</p></div></div> <div style="margin:0px;padding:2.5em 1.375em 0px 0px;border:0px;font-weight:inherit;font-style:inherit;font-size:0.75em;font-family:inherit;vertical-align:top;max-width:18.3333em;display:inline-table"><div style="margin:0px;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-family:inherit;vertical-align:top;display:table-cell"><span style="margin:0px;padding:0px;border:0px;font-weight:bold;font-style:inherit;font-family:Arial,sans-serif;vertical-align:baseline;display:block">Christopher Painter</span><p style="margin:0px 0px 0.8em;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-size:1em;font-family:Arial,sans-serif;vertical-align:baseline;line-height:1.25em">Coordinator for Cyber Issues, U.S. Department of State</p></div></div> <div style="margin:0px;padding:2.5em 1.375em 0px 0px;border:0px;font-weight:inherit;font-style:inherit;font-size:0.75em;font-family:inherit;vertical-align:top;max-width:18.3333em;display:inline-table"><div style="margin:0px;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-family:inherit;vertical-align:top;display:table-cell"><span style="margin:0px;padding:0px;border:0px;font-weight:bold;font-style:inherit;font-family:Arial,sans-serif;vertical-align:baseline;display:block">Eneken Tikk-Ringas</span><p style="margin:0px 0px 0.8em;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-size:1em;font-family:Arial,sans-serif;vertical-align:baseline;line-height:1.25em">Senior Fellow for Cybersecurity, International Institute for Strategic Studies</p></div></div></div><div style="margin:0px;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-family:inherit;vertical-align:baseline;float:none;display:inline-block"><h5 style="margin:0px;padding:0px;border:0px;font-weight:normal;font-style:inherit;font-size:1.125em;font-family:inherit;vertical-align:baseline">Presider:</h5><div style="margin:0px;padding:2.5em 1.375em 0px 0px;border:0px;font-weight:inherit;font-style:inherit;font-size:0.75em;font-family:inherit;vertical-align:top;max-width:18.3333em;display:inline-table"><div style="margin:0px;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-family:inherit;vertical-align:top;display:table-cell"><span style="margin:0px;padding:0px;border:0px;font-weight:bold;font-style:inherit;font-family:Arial,sans-serif;vertical-align:baseline;display:block">Craig Mundie</span><p style="margin:0px 0px 0.8em;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-size:1em;font-family:Arial,sans-serif;vertical-align:baseline;line-height:1.25em">President, Mundie & Associates</p></div></div></div></div><div style="margin:0px;padding:2em 0px;border-width:1px 0px 0px;border-top-style:solid;border-top-color:rgb(236,229,228);font-size:16px;font-family:sans-serif;vertical-align:baseline"><p style="margin:0px 0px 0.42857em;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-size:0.875em;font-family:Arial,sans-serif;vertical-align:baseline;line-height:21px;color:rgb(136,136,136)">November 4, 2015</p><h4 style="margin:0px 0px 9px;padding:0px;border:0px;font-weight:normal;font-style:inherit;font-size:1.5em;font-family:'Haarlemmer MT W01',Georgia,'Times New Roman',serif;vertical-align:baseline;letter-spacing:-1px"><a href="http://www.cfr.org/united-states/state-us-cybersecurity/p37192" target="_blank" style="color:rgb(42,105,161);margin:0px;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-family:inherit;vertical-align:baseline;text-decoration:none">The State of U.S. Cybersecurity</a></h4><p style="margin:0px 0px 0.8em;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-size:15px;font-family:georgia;vertical-align:baseline;line-height:21px">Experts assess the state of U.S. cybersecurity.</p><div style="margin:0px;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-family:inherit;vertical-align:baseline;float:none;display:inline-block"><h5 style="margin:0px;padding:0px;border:0px;font-weight:normal;font-style:inherit;font-size:1.125em;font-family:inherit;vertical-align:baseline">Speakers:</h5><div style="margin:0px;padding:2.5em 1.375em 0px 0px;border:0px;font-weight:inherit;font-style:inherit;font-size:0.75em;font-family:inherit;vertical-align:top;max-width:18.3333em;display:inline-table"><div style="margin:0px;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-family:inherit;vertical-align:top;display:table-cell"><span style="margin:0px;padding:0px;border:0px;font-weight:bold;font-style:inherit;font-family:Arial,sans-serif;vertical-align:baseline;display:block">Michael Daniel</span><p style="margin:0px 0px 0.8em;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-size:1em;font-family:Arial,sans-serif;vertical-align:baseline;line-height:1.25em">Special Assistant to the President and Cybersecurity Coordinator, White House</p></div></div> <div style="margin:0px;padding:2.5em 1.375em 0px 0px;border:0px;font-weight:inherit;font-style:inherit;font-size:0.75em;font-family:inherit;vertical-align:top;max-width:18.3333em;display:inline-table"><div style="margin:0px;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-family:inherit;vertical-align:top;display:table-cell"><span style="margin:0px;padding:0px;border:0px;font-weight:bold;font-style:inherit;font-family:Arial,sans-serif;vertical-align:baseline;display:block">Michael McCaul</span><p style="margin:0px 0px 0.8em;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-size:1em;font-family:Arial,sans-serif;vertical-align:baseline;line-height:1.25em">Chairman, U.S. House of Representatives Committee on Homeland Security</p></div></div> <div style="margin:0px;padding:2.5em 1.375em 0px 0px;border:0px;font-weight:inherit;font-style:inherit;font-size:0.75em;font-family:inherit;vertical-align:top;max-width:18.3333em;display:inline-table"><div style="margin:0px;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-family:inherit;vertical-align:top;display:table-cell"><span style="margin:0px;padding:0px;border:0px;font-weight:bold;font-style:inherit;font-family:Arial,sans-serif;vertical-align:baseline;display:block">Raj Shah</span><p style="margin:0px 0px 0.8em;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-size:1em;font-family:Arial,sans-serif;vertical-align:baseline;line-height:1.25em">Senior Director of Strategy, Palo Alto Networks</p></div></div></div><div style="margin:0px;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-family:inherit;vertical-align:baseline;float:none;display:inline-block"><h5 style="margin:0px;padding:0px;border:0px;font-weight:normal;font-style:inherit;font-size:1.125em;font-family:inherit;vertical-align:baseline">Presider:</h5><div style="margin:0px;padding:2.5em 1.375em 0px 0px;border:0px;font-weight:inherit;font-style:inherit;font-size:0.75em;font-family:inherit;vertical-align:top;max-width:18.3333em;display:inline-table"><div style="margin:0px;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-family:inherit;vertical-align:top;display:table-cell"><a href="http://www.cfr.org/experts/world/stewart-a-baker/b2405" target="_blank" style="color:rgb(42,105,161);margin:0px;padding:0px;border:0px;font-weight:bold;font-style:inherit;font-family:Arial,sans-serif;vertical-align:baseline;text-decoration:none;display:block">Stewart A. Baker</a><p style="margin:0px 0px 0.8em;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-size:1em;font-family:Arial,sans-serif;vertical-align:baseline;line-height:1.25em">Partner, Steptoe & Johnson LLP</p></div></div></div><div style="margin:0px;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-family:inherit;vertical-align:baseline;float:none;display:inline-block"><h5 style="margin:0px;padding:0px;border:0px;font-weight:normal;font-style:inherit;font-size:1.125em;font-family:inherit;vertical-align:baseline">Introductory Speaker:</h5><div style="margin:0px;padding:2.5em 1.375em 0px 0px;border:0px;font-weight:inherit;font-style:inherit;font-size:0.75em;font-family:inherit;vertical-align:top;max-width:18.3333em;display:inline-table"><div style="margin:0px;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-family:inherit;vertical-align:top;display:table-cell"><a href="http://www.cfr.org/experts/afghanistan-iraq-middle-east-and-north-africa/richard-n-haass/b3350" target="_blank" style="color:rgb(42,105,161);margin:0px;padding:0px;border:0px;font-weight:bold;font-style:inherit;font-family:Arial,sans-serif;vertical-align:baseline;text-decoration:none;display:block">Richard N. Haass</a><p style="margin:0px 0px 0.8em;padding:0px;border:0px;font-weight:inherit;font-style:inherit;font-size:1em;font-family:Arial,sans-serif;vertical-align:baseline;line-height:1.25em">President, Council on Foreign Relations</p></div></div></div></div></div><span class=""><font color="#888888"><div><br></div><div><br></div>-- <br><div><div dir="ltr"><div style="font-size:12.6667px"><i>Melanie Penagos</i></div><div style="font-size:12.6667px"><font color="#666666"><i>International Policy Associate<br></i></font></div><div style="font-size:12.6667px"><b><font color="#666666">Public Knowledge</font></b></div><div style="font-family:arial"><font color="#0000ff" face="arial, sans-serif"><span style="font-size:12.6667px"><u><a href="http://www.publicknowledge.org/" target="_blank">http://www.publicknowledge.org/</a></u></span></font><br></div><div style="font-size:12.6667px"><a href="tel:%2B1%20%28202%29%20861-0020%20ext.%20122" value="+12028610020" target="_blank">+1 (202) 861-0020 ext. 122</a> | <font color="#666666">skype: melanie.penagos | </font><font color="#0000ff"><a href="https://twitter.com/ampenagos" target="_blank">@ampenagos</a></font></div></div></div></font></span></div></div><br><div class="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div><br></div></div></div></div></div>
</div>