[bestbits] Symposium: The Frontiers of Cybersecurity Policy and Law
Carolina Rossini
carolina.rossini at gmail.com
Wed Jan 13 11:59:35 EST 2016
Becky, will this be transmitted or recorded?
On Tuesday, January 12, 2016, Becky Lentz <roberta.lentz at mcgill.ca> wrote:
>
> The Frontiers of Cybersecurity Policy and Law
>
> Over the course of two days in February 2016, as part of its Integrated
> Cybersecurity Studies
> <https://www.strausscenter.org/strauss-articles/integrated-cybersecurity-studies-2.html> program, the
> Robert Strauss Center at the University of Texas-Austin will host a unique
> and timely conference focused on the legal and policy dimensions of
> cybersecurity. We are proud to partner with Christian Science Monitor's
> Passcode <http://www.csmonitor.com/World/Passcode> as our media partner
> for this event, and with the American Bar Association Standing Committee
> on Law and National Security
> <http://www.americanbar.org/groups/public_services/law_national_security.html> as
> our partner for the teacher-training workshop component on February 6th.
>
> The conference will begin on February 5th with a symposium bringing
> together technologists, government officials, privacy advocates, and
> scholars to discuss four cutting-edge topics: the aftermath of the “going
> dark” debate; the evolving regulatory environment for the rapidly-growing
> security-research sector--including but not limited to export controls; the
> prospects for private entities to engage in “active defense” of their
> networks--including but not limited to “hackback”; and botnet takedowns.
>
> The conference then continues on February 6th with a unique
> faculty-training workshop co-sponsored by the American Bar Association.
> Each year the ABA’s Standing Committee on Law and National Security
> <http://www.americanbar.org/groups/public_services/law_national_security.html>sponsors
> a training workshop focused on a particular topic relating to national
> security. This year’s event focuses on cybersecurity law and policy, with
> sessions addressing, among other things, relevant aspects of federal
> criminal law, investigative and intelligence law, regulatory law, and
> international law.
>
> This event is free and open to the public, but registration is required.
> Click here
> <https://www.eventbrite.com/e/the-frontiers-of-cybersecurity-policy-and-law-tickets-20705821670> to
> register. Registration does not guarantee admission, so please arrive early
> to secure your seat!
>
> This event will take place in the Sheffield-Massey Room, TNH 2.111 (UT
> School of Law) and in the KUT Studio 1A, School of Communications.
>
> *AGENDA*
>
> *FRIDAY, FEBRUARY 5, 2016*
>
> *Location: Sheffield-Massey Room
> <https://law.utexas.edu/wp-content/uploads/sites/8/2015/04/level2_public.pdf> (Townes
> Hall 2.111), UT School of Law*
>
> 8:00am - 8:30am Welcome and breakfast
>
> 8:30am - 9:45am SESSION 1: The "Going Dark" Encryption Debate
>
> Paul Ohm (Georgetown)
> Benjamin Wittes (Brookings)
> Riana Pfefferkorn (Stanford)
> Christopher Soghoian (ACLU)
> Moderator: Richard Downing (DOJ)
>
> 10:00am - 11:15am SESSION 2: Regulating Security Research: Wassenaar,
> DMCA, and More
>
> Jennifer Granick (Stanford)
> Elaine Korzak (Stanford)
> Katie Moussouris (HackerOne)
> Allan Friedman (National
> Telecommunications & Information Admin.)
> ------------------------------
>
> *Location: KUT Studio 1A
> <http://kutx.org/musicarchive/studio-1a-calendar>, UT School of
> Communications*
>
> 11:30am - 1:30pm SPECIAL SESSION
>
> "Big Data, Privacy, and Security:
> Comparing US and German Perspectives"
> Recording of transatlantic dialogue
> with counterparts in Berlin for an episode of the
> America Abroad Media radio documentary series.
> ------------------------------
>
> *Location: Sheffield-Massey Room
> <https://law.utexas.edu/wp-content/uploads/sites/8/2015/04/level2_public.pdf> (Townes
> Hall 2.111), UT School of Law*
>
> 1:30pm - 2:15pm LUNCH
>
> 2:15pm - 3:30pm SESSION 3: Hacking Back and Other Active Defense
> Measures: Technical, Legal, and
> Policy Issues
>
> Richard Downing (Department of Justice)
> Richard Puckett (GE)
> Christian Beckner (George Washington)
> Andrew Woods (Kentucky)
>
> 3:45pm - 5:00pm SESSION 4: Botnet Takedowns: The Technical, Legal,
> and Policy Issues
>
> Sean Farrell (FBI)
> Kristen Eichensehr (UCLA)
> Richard Boscovich (Microsoft)
> Greg Nojeim (CDT)
>
>
>
> *SATURDAY, FEBRUARY 6, 2016This teacher-training workshop is co-sponsored
> by the American Bar Association Standing Commitee on Law and National
> Security
> <http://www.americanbar.org/groups/public_services/law_national_security.html>.*
>
> *Location: Sheffield-Massey Room
> <https://law.utexas.edu/wp-content/uploads/sites/8/2015/04/level2_public.pdf> (Townes
> Hall 2.111), UT School of Law*
>
> 9:00am - 9:30am Welcome and breakfast: Introduction by Judge James
> Baker
>
> 9:30am - 10:30am SESSION 1: Cyber in the Intelligence/Surveillance
> Context
>
> Bill Banks (Syracuse)
> Jen Daskal (American)
>
> 10:45am - 11:45am SESSION 2: Cyber in the Criminal Law Context
>
> Paul Ohm (Georgetown)
> Jennifer Granick (Stanford)
> Richard Downing (Justice Department)
> Sean Farrell (FBI)
>
> 11:45am - 12:45pm SESSION 3: Cyber in the Business and Regulatory
> Contexts
>
> Derek Bambauer (Arizona State)
> Andrew Woods (Kentucky)
> Kristen Eichensehr (UCLA)
> Moderator: Harvey Rishikof (ABA)
>
> 12:45pm - 1:45pm KEYNOTE LUNCHEON featuring Daniel Placek, co-founder
> of Darkode
>
> 1:45pm - 2:45pm SESSION 4: Cyber and International Law
>
> Ashley Deeks (UVA)
> Eric Jensen (BYU)
>
> 3:00pm - 4:00pm SESSION 5: Cyber and the Laws of War
>
> Derek Jinks (Texas)
> Sean Watts (Creighton)
>
>
>
--
*Carolina Rossini *
*Vice President, International Policy*
*Public Knowledge*
*http://www.publicknowledge.org/ <http://www.publicknowledge.org/>*
+ 1 6176979389 | skype: carolrossini | @carolinarossini
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.igcaucus.org/pipermail/bestbits/attachments/20160113/69df54b5/attachment.htm>
More information about the Bestbits
mailing list