<div dir="ltr"><div class="" style="margin:0px;padding:0px;border:0px;outline:0px;font-size:12px;color:rgb(106,115,123);font-family:Helvetica,Arial,FreeSans,sans-serif;line-height:18px;background-image:initial;background-repeat:initial"><div class="" style="margin:0px;padding:0px;border:0px;outline:0px;border-radius:4px 4px 0px 0px;background:transparent"><div class="" style="margin:0px;padding:0px;border:0px;outline:0px;border-radius:4px 4px 0px 0px;background:transparent"><div class="" style="margin:0px;padding:0px;border:0px;outline:0px;border-radius:4px 4px 0px 0px;background:transparent"><h2 class="" style="margin:0px;padding:15px 0px;border:0px;outline:0px;font-size:18px;line-height:15px;color:rgb(31,52,68);width:auto;font-family:Arial,Helvetica,sans-serif;background:transparent"><a href="https://www.strausscenter.org/cyberconference" style="margin:0px;padding:0px;border:0px;outline:none;text-decoration:none;color:rgb(31,52,68);background:transparent">The Frontiers of Cybersecurity Policy and Law</a></h2></div></div></div><div class="" style="margin:0px;padding:0px;border:0px;outline:0px;font-size:0px;clear:both;float:none;list-style:none;overflow:hidden;width:0px;height:0px;background:none"></div><div class="" style="padding:5px 15px;border:0px;outline:0px;background:transparent"><div class="" style="margin:0px;padding:0px;border:0px;outline:0px;float:left;background:0px 0px no-repeat transparent"><div class="" style="margin:0px;padding:0px;border:0px;outline:0px;background:transparent"></div></div><div class="" style="margin:0px;padding:0px;border:0px;outline:0px;font-size:0px;clear:both;float:none;list-style:none;overflow:hidden;width:0px;height:0px;background:none"></div></div></div><p style="margin:0px 0px 15px;padding:0px;border:0px;outline:0px;background-image:initial;background-repeat:initial"><font color="#6a737b" face="Helvetica, Arial, FreeSans, sans-serif"><span style="font-size:12px;line-height:18px"><a href="https://www.strausscenter.org/cyberconference">https://www.strausscenter.org/cyberconference</a></span></font><br></p><p style="margin:0px 0px 15px;padding:0px;border:0px;outline:0px;font-size:12px;color:rgb(106,115,123);font-family:Helvetica,Arial,FreeSans,sans-serif;line-height:18px;background-image:initial;background-repeat:initial">Over the course of two days in February 2016, the Strauss Center at the University of Texas-Austin hosted a unique and timely conference focused on the legal and policy dimensions of cybersecurity.</p><p style="margin:0px 0px 15px;padding:0px;border:0px;outline:0px;font-size:12px;color:rgb(106,115,123);font-family:Helvetica,Arial,FreeSans,sans-serif;line-height:18px;background-image:initial;background-repeat:initial">We are proud to have partnered with Christian Science Monitor's <a href="http://www.csmonitor.com/World/Passcode" target="_blank" style="margin:0px;padding:0px;border:0px;outline:none;text-decoration:none;font-weight:bold;color:rgb(179,135,8);background:transparent">Passcode</a> as our media partner for this event, with the <a href="http://ajclonline.org/" target="_blank" style="margin:0px;padding:0px;border:0px;outline:none;text-decoration:none;font-weight:bold;color:rgb(179,135,8);background:transparent">American Journal of Criminal Law</a> for our February 5th sessions, and with the <a href="http://www.americanbar.org/groups/public_services/law_national_security.html" target="_blank" style="margin:0px;padding:0px;border:0px;outline:none;text-decoration:none;font-weight:bold;color:rgb(179,135,8);background:transparent">American Bar Association Standing Committee on Law and National Security</a> as our partner for the teacher-training workshop component on February 6th.</p><p style="margin:0px 0px 15px;padding:0px;border:0px;outline:0px;font-size:12px;color:rgb(106,115,123);font-family:Helvetica,Arial,FreeSans,sans-serif;line-height:18px;background-image:initial;background-repeat:initial">The conference began on February 5th with a two-day symposium bringing together technologists, government officials, privacy advocates, and scholars to discuss four cutting-edge topics: the aftermath of the “going dark” debate; the evolving regulatory environment for the rapidly-growing security-research sector--including but not limited to export controls; the prospects for private entities to engage in “active defense” of their networks--including but not limited to “hackback”; and botnet takedowns.</p><p style="margin:0px 0px 15px;padding:0px;border:0px;outline:0px;font-size:12px;color:rgb(106,115,123);font-family:Helvetica,Arial,FreeSans,sans-serif;line-height:18px;background-image:initial;background-repeat:initial">The conference then continued on February 6th with a unique faculty-training workshop co-sponsored by the American Bar Association. Each year the <a href="http://www.americanbar.org/groups/public_services/law_national_security.html" target="_blank" style="margin:0px;padding:0px;border:0px;outline:none;text-decoration:none;font-weight:bold;color:rgb(179,135,8);background:transparent">ABA’s Standing Committee on Law and National Security</a> sponsors a training workshop focused on a particular topic relating to national security. This year’s event focused on cybersecurity law and policy, with sessions addressing, among other things, relevant aspects of federal criminal law, investigative and intelligence law, regulatory law, and international law.</p><p style="margin:0px 0px 15px;padding:0px;border:0px;outline:0px;font-size:12px;color:rgb(106,115,123);font-family:Helvetica,Arial,FreeSans,sans-serif;line-height:18px;background-image:initial;background-repeat:initial">Photos of this event can be accessed <a href="https://www.flickr.com/photos/strauss-center/sets/72157664540740825/with/24575309729/" target="_blank" style="margin:0px;padding:0px;border:0px;outline:none;text-decoration:none;font-weight:bold;color:rgb(179,135,8);background:transparent">here</a>.</p><p style="margin:0px 0px 15px;padding:0px;border:0px;outline:0px;font-size:12px;color:rgb(106,115,123);font-family:Helvetica,Arial,FreeSans,sans-serif;line-height:18px;background-image:initial;background-repeat:initial">Videos are available <a href="https://www.youtube.com/channel/UCWbCg5Rc5VaI38SOMVbPH-g" target="_blank" style="margin:0px;padding:0px;border:0px;outline:none;text-decoration:none;font-weight:bold;color:rgb(179,135,8);background:transparent">here</a>.</p><div><br></div>-- <br><div class="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div><div style="font-family:arial,sans-serif;font-size:12.6667px;background-color:rgb(255,255,255)"><br style="font-family:arial;font-size:small"><div dir="ltr" style="font-family:arial;font-size:small"><div style="font-family:arial,sans-serif;font-size:12.6667px"><i>Carolina Rossini </i></div><div style="font-family:arial,sans-serif;font-size:12.6667px"><font color="#666666"><i>Vice President, International Policy</i></font></div><div style="font-family:arial,sans-serif;font-size:12.6667px"><b><font color="#666666">Public Knowledge</font></b></div><div><font face="arial, sans-serif" color="#0000ff"><span style="font-size:12.6667px"><u><a href="http://www.publicknowledge.org/" target="_blank">http://www.publicknowledge.org/</a></u></span></font><br></div><div style="font-family:arial,sans-serif;font-size:12.6667px"><a value="+16176979389" style="color:rgb(102,102,102)">+ 1 6176979389 | </a><font color="#666666">skype: carolrossini | </font><font color="#0000ff">@carolinarossini</font></div></div></div></div><div><br></div></div></div></div></div>
</div>