Syllabus: Cybersecurity Law Seminar. George Mason University Antonin Scalia Law School Spring 2018 Professors Kiran S. Raj & Scott Ferber

Size: px
Start display at page:

Download "Syllabus: Cybersecurity Law Seminar. George Mason University Antonin Scalia Law School Spring 2018 Professors Kiran S. Raj & Scott Ferber"

Transcription

1 Brief Course Description: Syllabus: Cybersecurity Law Seminar George Mason University Antonin Scalia Law School Spring 2018 Professors Kiran S. Raj & Scott Ferber This seminar course will provide students exposure to the key legal and policy issues related to cybersecurity, including the legal authorities and obligations of both the government and the private sector with respect to protecting computer systems and networks, as well as the national security aspects of the cyber domain including authorities related to offensive activities in cyberspace. The course will include a survey of federal laws, executive orders, regulations, and cases related to surveillance, cyber intrusions by private and nation-state actors, data breaches, and privacy and civil liberties matters, among other things. The course will also explore the legislative and technology landscape in this dynamic area and will provide students with opportunities to discuss cutting-edge issues at the intersection of law, technology, and policy. Class Format: Seminar of students; two credits; one two-hour class per week. Active participation in class discussions is required and students are expected to be fully prepared for each class session. Grading: Substantive grades will be based on class participation (15%) and student s successful completion of a page paper on cybersecurity law (85%). Paper Due Date: TBD ** Please note that late papers will receive a 1/3 grade deduction for every day the paper is late beyond the due date established in class (i.e., an A- paper that is turned in late would receive a B+. If it is two days late, it would receive a B, etc.). Please turn papers in on time. ** Class Details: Mondays: 8:00 pm 9:50 pm. Office Hours: By appointment. Faculty Contact Information: Kiran Raj: kraj@gmu.edu Scott Ferber: scott.ferber@gmail.com 1

2 Course Materials: The bulk of the course materials are cases or articles available on Westlaw or Lexis-Nexis or materials posted on TWEN. Materials posted on TWEN are indicated below. We have also provided links to information that is easily accessible on the Internet. ** Given the developing nature of this area of law, it is likely that the syllabus and readings will be updated over the course of the semester; therefore, please regularly check your and TWEN for updates to the syllabus and readings. ** Course Assignments: Week 1 Introduction to Computer Networks and Cyber Threats 1. Leiner, Cerf, et. al., A Brief History of the Internet 2. Verizon, 2017 Data Breach Investigations Report pp Dan Coats, Worldwide Threat Assessment of the US Intelligence Community (May 2017) pp. 1-5 Week 2 Vulnerabilities, Federal Cybersecurity, and the Applicable Federal Laws 1. Harvard National Security Law Research Group, Cloud Computing and National Security Law pp. 3-5, 9-14 & Office of Management and Budget, Annual Report to Congress: The Federal Information Security Management Act (Feb. 27, 2015) pp. 1-12, Congressional Research Service, Federal Laws Relating to Cybersecurity: Overview and Discussion of Proposed Revisions (March 2013) pp. 1 20, 22-24, Week 3: Economics of Cyber Threats 1. Nicole Perlroth & David Sanger, Nation s Buying As Hackers Sell Flaws In Computer Code (July 13, 2013) pp The White House, Heartbleed: Understanding Why We Disclose Cyber Vulnerabilities (Apr. 28, 2014) pp Vulnerabilities Equities Policy and Process for the United States Government 4. Ross Anderson, Why Information Security Is Hard An Economic Perspective (2001) pp Andrew Updegrove, Cyber Security and the Vulnerability of the Networks: Why We Need to Rethink Our Cyber Defenses Now (2011) pp Week 4 Anonymity, Privacy, and Data Mining 1. The White House, Big Data: Seizing Opportunities, Preserving Values (May 1, 2014) pp

3 2. Daniel Solove, Nothing to Hide (Yale Univ. Press 2010) pp Google v. Spanish Data Protection Agency, European Court of Justice Opinion (June 25, 2013) pp EU Schems decision (Opinion of Advocate General): Week 5: Protecting the Internet: Encryption and Interception 1. Peter Swire, From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud (Apr. 12, 2012) pp Economist, Cryptography for Dummies (Nov. 29, 2014) pp Statement for the Record: Deputy Attorney General & FBI Director testimony before the Senate Judiciary Committee (July 2015): 4. In Re: Grand Jury Subpoena, 670 F.3d 1335 (11th Cir. 2012) (Westlaw/LEXIS) Week 6: Electronic Surveillance: Background Legal Principles 1. Katz v. United States, 389 US 347 (1967) (Westlaw/LEXIS) 2. Smith v. Maryland, 442 U.S. 735 (1979) (Westlaw/LEXIS) 3. United States v. McLaren, 957 F. Supp. 215 (M.D. Fla. 1997) (Westlaw/LEXIS) 4. United States v. Warshak, 631 F.3d 266, (6th Cir. 2010) (Westlaw/LEXIS) 5. Paul Rosenzweig, The Evolution of Wiretapping, Engage pp (Sept. 2011) Week 7: Electronic Surveillance & Technological Advances 1. In re: Google Street View Electronic Communications Litigation, 794 F.Supp.2d 1067 (N.D. Cal. 2011) (Westlaw/LEXIS) 2. United States v. Jones, 132 S.Ct. 945 (2012) (Westlaw/LEXIS) 3. United States v. Davis, 785 F.3d 498 (11 th Cir. 2015) 4. Carpenter v. United States, 819 F.3d 880 (6th Cir. 2016), cert. granted, 137 S.Ct (June 5, 2017) (Westlaw/LEXIS); see also Supreme Court oral argument transcript NOTE: PRELIMINARY PAPER TOPICS DUE BEFORE WEEK 8 CLASS Week 8: CALEA, Metadata, and Foreign Intelligence 1. FCC, Communications Assistance for Law Enforcement Act (CALEA) Introduction and Basic Information pp CALEA, 47 USC Klayman v. Obama, 2013 WL (D.D.C. Dec. 16, 2013) (Westlaw/LEXIS) 4. ACLU v. Clapper, 959 F.Supp.2d 724 (SDNY 2013) (Westlaw/LEXIS) 5. Privacy and Civil Liberties Oversight Board, Report on the Surveillance Program Operated Pursuant to Section 702, Executive Summary pp (July 2014) **(Note: Only print pp of the PDF; file is very long)** 3

4 Week 9: Cyber Security and the Fourth Amendment 1. Legal Issues relating to the Testing, Use and Deployment of an Intrusion Detection System (Einstein 2.0) to Protect Unclassified Computer Networks in the Executive Branch, DOJ Office of Legal Counsel (Jan. 9, 2009) pp Legality of Intrusion Detection System to Protect Unclassified Computer Networks in the Executive Branch, DOJ Office of Legal Counsel (August 2009) pp U.S. Department of Homeland Security, Privacy Impact Statement for Einstein 3.0 Program (April 2013) pp In re: Yahoo Mail Litigation, 7 F.Supp.3d 1016 (N.D. Cal. 2014) (Westlaw/LEXIS) 5. Matter of Warrant to Search a Certain Account Controlled and Maintained by Microsoft, 829 F.3d 197 (2d Cir. 2016), rehearing en banc denied, 855 F.3d 53 (2d. Cir. 2017), cert. granted, S.Ct. (Oct. 16, 2017) (Westlaw/LEXIS) amendments to Fed. R. Crim. P. 41(b)(6) (Westlaw/LEXIS) NOTE: FINAL PAPER TOPICS DUE THIS WEEK Week 10: Protecting the Private Sector: Introduction to Information Sharing 1. Bipartisan Policy Center, Cyber Security Task Force: Public-Private Information Sharing (July 2012) 2. Bellovin, et al., Can It Really Work? Problems with Extending EINSTEIN 3.0 to Critical Infrastructure, 3 Harv. Nat l Sec. J. 1 (2011) 3. National Institute on Standards and Technology, NIST Framework on Cybersecurity (Feb. 12, 2014) pp. 1-9 ** (Note: Only print pp of the PDF; file is long) ** 4. Executive Order 13691, Promoting Private Sector Cybersecurity Information Sharing (Feb. 13, 2015) pp. 1-6 Week 11: Information Sharing: Congressional and Administration Efforts 1. Executive Order 13636, Improving Critical Infrastructure Cybersecurity (Feb. 2, 2013) pp Cybersecurity Information Sharing Act (CISA) Week 12: Hacking and Data Breaches 1. Computer Fraud and Abuse Act (CFAA) 2. FTC v. Wyndham Worldwide, (3 rd Cir. Aug 24, 2015) available at 3. Executive Order 13694, Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities (Apr. 1, 2015) 4

5 4. Executive Order 13757, Taking Additional Steps to Address the National Emergency With Respect to Significant Malicious Cyber-Enabled Activities (Dec. 28, 2016) 5. Cyber sanctions under Executive Orders and Week 13: Securing Critical Infrastructure: Case Studies of Key Industries 1. Executive Order 13800, Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure (May 11, 2017) 2. TBD Week 14: Offensive Cyber Activities and International Law 1. Jack Goldsmith, Cybersecurity Treaties: A Skeptical View (Feb. 2011) pp Stewart Baker, Testimony Before the Senate Judiciary Committee Subcommittee on Crime and Terrorism, The Attribution Revolution: Raising the Costs for Hackers and Their Customers (May 8, 2013) p

George Mason University Law School Spring Profs. Jamil N. Jaffer & John C. Lipsey

George Mason University Law School Spring Profs. Jamil N. Jaffer & John C. Lipsey Brief Course Description: Syllabus Law 416: Cybersecurity Law Seminar George Mason University Law School Spring 2019 Profs. Jamil N. Jaffer & John C. Lipsey This seminar course will provide students exposure

More information

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda Rise in Data Breaches Effects of Increase in Cybersecurity Threats Cybersecurity Framework

More information

COMPUTER CRIME LAW PROFESSOR KERR

COMPUTER CRIME LAW PROFESSOR KERR COMPUTER CRIME LAW PROFESSOR KERR 6369-10 SYLLABUS Spring 2017 I. Course Summary This course examines the legal issues raised by computer-related crime. The course coverage divides into three topics: (1)

More information

National Policy and Guiding Principles

National Policy and Guiding Principles National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework

More information

Investigating Insider Threats

Investigating Insider Threats Investigating Insider Threats February 9, 2016 Jonathan Gannon, AT&T Brenda Morris, Booz Allen Hamilton Benjamin Powell, WilmerHale 1 Panelist Biographies Jonathan Gannon, AT&T, Executive Director & Senior

More information

CYBERSECURITY LEGISLATION IT OUT!

CYBERSECURITY LEGISLATION IT OUT! ATTEMPTS TO PASS US U.S. CYBERSECURITY LEGISLATION YOU NEED A SCORECARD TO FIGURE YOU NEED A SCORECARD TO FIGURE IT OUT! Professor Pauline C. Reich Waseda University School of Law cyberasia2@gmail.com

More information

Case3:10-cv RS Document41-8 Filed03/01/12 Page1 of 6. Electronic Frontier Foundation v. DOJ, et al. Vaughn Index for Cardozo FOIA Releases

Case3:10-cv RS Document41-8 Filed03/01/12 Page1 of 6. Electronic Frontier Foundation v. DOJ, et al. Vaughn Index for Cardozo FOIA Releases Case3:10-cv-04892-RS Document41-8 Filed03/01/12 Page1 of 6 1 Electronic Frontier Foundation v. DOJ, et al Vaughn Index for Cardozo FOIA Releases Detailed description of FBI responsive records by category

More information

Implementing the Administration's Critical Infrastructure and Cybersecurity Policy

Implementing the Administration's Critical Infrastructure and Cybersecurity Policy Implementing the Administration's Critical Infrastructure and Cybersecurity Policy Cybersecurity Executive Order and Critical Infrastructure Security & Resilience Presidential Policy Directive Integrated

More information

Cybersecurity and Data Privacy

Cybersecurity and Data Privacy DECEMBER 2015 NO. 2 Cybersecurity and Data Privacy Landmark Cybersecurity Legislation Included in Omnibus Package Action Item: Congress included the Cybersecurity Act of 2015 (the Act ) in the Consolidated

More information

CYBERSECURITY FEDERAL UPDATE. NCSL Cybersecurity Task Force

CYBERSECURITY FEDERAL UPDATE. NCSL Cybersecurity Task Force CYBERSECURITY FEDERAL UPDATE NCSL Cybersecurity Task Force FY 2018 BUDGET BLUEPRINT President s Management Agenda Identifies cybersecurity as a critical area to improving the federal government Department

More information

The Promise and Peril of Active Cyber Defense

The Promise and Peril of Active Cyber Defense 1 The Promise and Peril of Active Cyber Defense Dr. Irv Lachow Deputy Director, Cyber Strategy and Execution, MITRE August 6, 2018 2017 The MITRE Corporation. All rights reserved. 2 Disclaimer The author's

More information

The Evolving Threat to Corporate Cyber & Data Security

The Evolving Threat to Corporate Cyber & Data Security The Evolving Threat to Corporate Cyber & Data Security Presented by: Sara English, CIPP/US Sara.English@KutakRock.com 1 http://blogs.wsj.com/law/2015/12/09/employee error leading cause of data breaches

More information

- Cyber threat information: information directly pertaining to,

- Cyber threat information: information directly pertaining to, WHAT INFORMATION MAY BE SHARED H.R. 3674, the PRECISE Act of 2011, as reported from HHSC Subcmte on Cybersecurity (Lungren) law, H.R. 3523, the Cyber Intelligence sharing and Protection Act of 2011, as

More information

Cybersecurity Information Sharing Legislation

Cybersecurity Information Sharing Legislation Government entities and private-sector organizations in the United States now have a common framework that encourages the sharing of cybersecurity threat information among each other, thanks to new federal

More information

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

Cybersecurity: Legislation, Hearings, and Executive Branch Documents Cybersecurity: Legislation, Hearings, and Executive Branch Documents Rita Tehan Information Research Specialist November 17, 2015 Congressional Research Service 7-5700 www.crs.gov R43317 Cybersecurity:

More information

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

Cybersecurity: Legislation, Hearings, and Executive Branch Documents Cybersecurity: Legislation, Hearings, and Executive Branch Documents Rita Tehan Information Research Specialist July 15, 2015 Congressional Research Service 7-5700 www.crs.gov R43317 Cybersecurity: Legislation,

More information

-Eight types of cyber data, (Sec. 708(7))

-Eight types of cyber data, (Sec. 708(7)) WHAT INFORMATION MAY BE SHARED H.R. 624, the Cyber Intelligence sharing and Protection Act of 2013 (CISPA) (Rogers- -Notwithstanding any provision of law, S. 3414, the Cybersecurity Act of 2012 (Lieberman-Collins-

More information

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston Cybersecurity Landscape Major Data Breaches (e.g., OPM, IRS) Data Breach Notification Laws Directors Derivative Suits Federal Legislation

More information

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

Cybersecurity: Legislation, Hearings, and Executive Branch Documents Cybersecurity: Legislation, Hearings, and Executive Branch Documents Rita Tehan Information Research Specialist October 21, 2015 Congressional Research Service 7-5700 www.crs.gov R43317 Cybersecurity:

More information

Re: Special Publication Revision 4, Security Controls of Federal Information Systems and Organizations: Appendix J, Privacy Control Catalog

Re: Special Publication Revision 4, Security Controls of Federal Information Systems and Organizations: Appendix J, Privacy Control Catalog April 6, 2012 National Institute of Standards and Technology 100 Bureau Drive, Stop 1070 Gaithersburg, MD 20899-1070 Re: Special Publication 800-53 Revision 4, Security Controls of Federal Information

More information

Incident Handling. Week 4: Incidents, Evidence and the Law

Incident Handling. Week 4: Incidents, Evidence and the Law Incident Handling Week 4: Incidents, Evidence and the Law George Berg & Jagdish S. Gangolly University at Albany 4/27/04 Incident Handling (G. Berg & J. Gangolly) 1 Road Map What is digital evidence? What

More information

Incident Handling. Road Map. Week 4: Incidents, Evidence and the Law. Types of Evidence. Digital Evidence. Characteristics of Evidence

Incident Handling. Road Map. Week 4: Incidents, Evidence and the Law. Types of Evidence. Digital Evidence. Characteristics of Evidence Incident Handling Week 4: Incidents, Evidence and the Law George Berg & Jagdish S. Gangolly State University of New York at Albany Road Map What is digital evidence? What are different types of evidence?

More information

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening

More information

Developing Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite?

Developing Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite? Developing Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite? Minnesota RIMS 39 th Annual Seminar Risk 2011-2012: Can You Hack

More information

Robert Holleyman, President and CEO, BSA The Software Alliance

Robert Holleyman, President and CEO, BSA The Software Alliance Testimony Bolstering US Cybersecurity Robert Holleyman, President and CEO, BSA The Software Alliance Testimony before the US House of Representatives, Committee on the Judiciary, Subcommittee on Crime,

More information

Building Privacy into Cyber Threat Information Sharing Cyber Security Symposium Securing the Public Trust

Building Privacy into Cyber Threat Information Sharing Cyber Security Symposium Securing the Public Trust Building Privacy into Cyber Threat Information Sharing Cyber Security Symposium Securing the Public Trust Jamie Danker Director, Senior Privacy Officer National Protection and Programs Directorate, U.S.

More information

U.S. v. Weaver, 636 F.Supp.2d 769 (C.D. Ill., 2009)

U.S. v. Weaver, 636 F.Supp.2d 769 (C.D. Ill., 2009) 636 F.Supp.2d 769 UNITED STATES of America, Plaintiff, v. Justin D. WEAVER, Defendant. No. 09-30036. United States District Court, C.D. Illinois, Springfield Division. July 15, 2009. Elham M. Peirson,

More information

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination

More information

DHS Hackers and the Lawyers Who Advise Them

DHS Hackers and the Lawyers Who Advise Them SESSION ID: LAW-T08 DHS Hackers and the Lawyers Who Advise Them MODERATOR: Gabriel Taran Assistant General Counsel, Cybersecurity DHS Office of General Counsel (OGC) PANELISTS: From the Cybersecurity and

More information

Comprehensive Study on Cybercrime

Comprehensive Study on Cybercrime Federal Ministry of Justice and 17 August 2016 Consumer Protection German Comments on the Comprehensive Study on Cybercrime (Draft February 2013) The United Nations Office on Drugs and Crime (UNODC) invited

More information

Legal Considerations for Incident Response

Legal Considerations for Incident Response Legal Considerations for Incident Response ISSA Phoenix Chapter Q2/16 Chapter Meeting April 12, 2016 Patrick Fowler and Tony King Snell & Wilmer L.L.P. One Arizona Center Phoenix, AZ 85023 1 Legal Considerations

More information

Hacking and Cyber Espionage

Hacking and Cyber Espionage Hacking and Cyber Espionage September 19, 2013 Prophylactic and Post-Breach Concerns for In-House Counsel Raymond O. Aghaian, McKenna Long & Aldridge LLP Elizabeth (Beth) Ferrell, McKenna Long & Aldridge

More information

Data Breach Preparation and Response. April 21, 2017

Data Breach Preparation and Response. April 21, 2017 Data Breach Preparation and Response April 21, 2017 King & Spalding Data, Privacy & Security King & Spalding s 60 plus lawyer Data, Privacy & Security ( DPS ) Practice is best known for: Experienced crisis

More information

PROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM

PROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM PROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM THE THREAT WE FACE On average, the Department of Administration information officers identify: 200 brute force attempts per day;

More information

Program 1. THE USE OF CYBER ACTIVE DEFENSE BY THE PRIVATE SECTOR

Program 1. THE USE OF CYBER ACTIVE DEFENSE BY THE PRIVATE SECTOR Program The structure of the workshop will be fully participatory for each session. We will ask several participants to take the lead in some panels, and to present the main challenges or comment on certain

More information

THE WHITE HOUSE. Office of the Press Secretary EXECUTIVE ORDER

THE WHITE HOUSE. Office of the Press Secretary EXECUTIVE ORDER THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE May 11, 2017 EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority

More information

This Webcast Will Begin Shortly

This Webcast Will Begin Shortly This Webcast Will Begin Shortly If you have any technical problems with the Webcast or the streaming audio, please contact us via email at: webcast@acc.com Thank You! 1 Cybersecurity Changing Landscape

More information

INFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity

INFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity INFORMATION SESSION MS Software Engineering, specialization in Cybersecurity Presenter Afifa Hamad Program Specialist Graduate & Extended Studies Charles W. Davidson College of Engineering San Jose State

More information

THE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER

THE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER FOR IMMEDIATE RELEASE May 11, 2017 THE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority

More information

Master of Cyber Security, Strategy and Risk Management. CECS PG Information Session April 17, 2018

Master of Cyber Security, Strategy and Risk Management. CECS PG Information Session April 17, 2018 Master of Cyber Security, Strategy and Risk Management CECS PG Information Session April 17, 2018 2 Program Purpose Provide a working understanding of information, network and software security, across

More information

CLE Alabama. Banking Law Update. Embassy Suites Hoover Hotel Birmingham, Alabama Friday, February 19, 2016

CLE Alabama. Banking Law Update. Embassy Suites Hoover Hotel Birmingham, Alabama Friday, February 19, 2016 CLE Alabama Banking Law Update Embassy Suites Hoover Hotel Birmingham, Alabama Friday, February 19, 2016 Best Practices on Managing Cyber-Security Risks J.T. Malatesta III and Sarah S. Glover Maynard Cooper

More information

Legal, Ethical, and Professional Issues in Information Security

Legal, Ethical, and Professional Issues in Information Security Legal, Ethical, and Professional Issues in Information Security Downloaded from http://www.utc.edu/center-information-securityassurance/course-listing/cpsc3600.php Minor Changes from Dr. Enis KARAARSLAN

More information

ITU Model Cybercrime Law: Project Overview

ITU Model Cybercrime Law: Project Overview ITU Model Cybercrime Law: Project Overview Jody R. Westby ICT Applications and Cybersecurity Division Policies and Strategies Department, BDT International Telecommunication Union International

More information

Cloud Security. Copyright Ramesh Nagappan. All rights reserved.

Cloud Security. Copyright Ramesh Nagappan. All rights reserved. Cloud Security 1 Cloud Security Week 1 Lecture 1 Ramesh Nagappan Harvard University Extension School Brandeis University GPS 2 Week 1 Lecture - 1 Course Introduction Evolution of Cloud Computing Introduction

More information

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90 th OREGON LEGISLATIVE ASSEMBLY-- Regular Session Senate Bill 0 Printed pursuant to Senate Interim Rule. by order of the President of the Senate in conformance with presession filing rules, indicating neither

More information

ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015

ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015 ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO 27001 FRAMEWORK AUGUST 19, 2015 Agenda Coalfire Overview Threat Landscape What is ISO Why ISO ISO Cycle Q&A 2 Presenters

More information

Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time

Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time TM Plan. Protect. Respond. Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time Registration is open for the April webinar:

More information

ESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN THE DEPARTMENT OF JUSTICE

ESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN THE DEPARTMENT OF JUSTICE 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN

More information

Anatomy of a Data Breach: A Practical Guide for Small Law Departments

Anatomy of a Data Breach: A Practical Guide for Small Law Departments Anatomy of a Data Breach: A Practical Guide for Small Law Departments Judy Branzelle is the Chief Legal Officer and General Counsel for Goodwill Industries International, Inc. where she has been employed

More information

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby

More information

CyberUSA Government Cyber Opportunities for your Region: The Federal Agenda - Federal, Grants & Resources Available to Support Community Cyber

CyberUSA Government Cyber Opportunities for your Region: The Federal Agenda - Federal, Grants & Resources Available to Support Community Cyber CyberUSA Government Cyber Opportunities for your Region: The Federal Agenda - Federal, Grants & Resources Available to Support Community Cyber Initiatives 30 January 2018 1 Agenda Federal Landscape Cybersecurity

More information

Searching Securely: Technical Issues with Warrants for Remote Search. Steven M. Bellovin June 28,

Searching Securely: Technical Issues with Warrants for Remote Search. Steven M. Bellovin June 28, Searching Securely: Technical Issues with Warrants for Remote Search Steven M. Bellovin June 28, 2015 1 The Fourth Amendment to the U.S. Constitution The right of the people to be secure in their persons,

More information

LEHMAN COLLEGE OF THE CITY UNIVERSITY OF NEW YORK. Department of Economics and Business. Curriculum Change

LEHMAN COLLEGE OF THE CITY UNIVERSITY OF NEW YORK. Department of Economics and Business. Curriculum Change Senate Meeting of April 28, 2010 Graduate Studies Committee Hegis Code: 0502 Program Code: 32786 LEHMAN COLLEGE OF THE CITY UNIVERSITY OF NEW YORK Department of Economics and Business Curriculum Change

More information

Cybersecurity and Hospitals: A Board Perspective

Cybersecurity and Hospitals: A Board Perspective Cybersecurity and Hospitals: A Board Perspective Cybersecurity is an important issue for both the public and private sector. At a time when so many of our activities depend on information systems and technology,

More information

Regulating Information: Cybersecurity, Internet of Things, & Exploding Rules. David Bodenheimer Evan Wolff Kate Growley

Regulating Information: Cybersecurity, Internet of Things, & Exploding Rules. David Bodenheimer Evan Wolff Kate Growley Regulating Information: Cybersecurity, Internet of Things, & Exploding Rules David Bodenheimer Evan Wolff Kate Growley Regulating Information The Internet of Things: Peering into the Future Cybersecurity

More information

Resolution: Advancing the National Preparedness for Cyber Security

Resolution: Advancing the National Preparedness for Cyber Security Government Resolution No. 2444 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing the National Preparedness for Cyber Security It is hereby resolved: Further to Government

More information

Legal and Regulatory Developments for Privacy and Security

Legal and Regulatory Developments for Privacy and Security Legal and Regulatory Developments for Privacy and Security Rodney Petersen Government Relations Officer and Director of EDUCAUSE Cybersecurity Initiative Overview Context for Federal Policy Policy Directions

More information

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

Cybersecurity: Legislation, Hearings, and Executive Branch Documents Cybersecurity: Legislation, Hearings, and Executive Branch Documents Rita Tehan Information Research Specialist July 8, 2016 Congressional Research Service 7-5700 www.crs.gov R43317 Cybersecurity: Legislation,

More information

ISAO SO Product Outline

ISAO SO Product Outline Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing

More information

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,

More information

Privacy Year in Review: Privacy and VoIP Technology

Privacy Year in Review: Privacy and VoIP Technology Privacy Year in Review: Privacy and VoIP Technology JOHN B. MORRIS, JR.* ABSTRACT Voice over internet protocol ("VoIP") technology is increasingly being used throughout the nation. VoIP technology provides

More information

Cyber Risks, Coverage, and the Board of Directors.

Cyber Risks, Coverage, and the Board of Directors. Cyber Risks, Coverage, and the Board of Directors PCI Northeastern General Counsel Seminar September 19-20, 2016 Vincent J. Vitkowsky Seiger Gfeller Laurie LLP vvitkowsky@sgllawgroup.com CYBER RISKS and

More information

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

Cybersecurity: Legislation, Hearings, and Executive Branch Documents Cybersecurity: Legislation, Hearings, and Executive Branch Documents Rita Tehan Information Research Specialist October 21, 2016 Congressional Research Service 7-5700 www.crs.gov R43317 Cybersecurity:

More information

Cybersecurity in Higher Ed

Cybersecurity in Higher Ed Cybersecurity in Higher Ed 1 Overview Universities are a treasure trove of information. With cyber threats constantly changing, there is a need to be vigilant in protecting information related to students,

More information

Cybersecurity: CRS Experts

Cybersecurity: CRS Experts July 23, 2012 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research Service 7-5700 www.crs.gov R42619 T he following table provides names and contact information

More information

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

Cybersecurity: Legislation, Hearings, and Executive Branch Documents Cybersecurity: Legislation, Hearings, and Executive Branch Documents Rita Tehan Information Research Specialist November 9, 2017 Congressional Research Service 7-5700 www.crs.gov R43317 Cybersecurity:

More information

Before the House Committee on Homeland Security, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies

Before the House Committee on Homeland Security, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies WRITTEN STATEMENT OF MARY ELLEN CALLAHAN Partner and Chair, Privacy and Information Governance Practice, Jenner & Block Former Chief Privacy Officer, U.S. Department of Homeland Security Before the House

More information

The Simple Guide to GDPR Data Protection: Considerations for and File Sharing

The Simple Guide to GDPR Data Protection: Considerations for  and File Sharing The Simple Guide to GDPR Data Protection: Considerations for Email and File Sharing The European Union s General Data Protection Regulation (GDPR) Uncovering Key Requirements and Methods for Compliance

More information

Smart Grid Update. Christopher J. Eisenbrey. Director, Business Information Edison Electric Institute (EEI)

Smart Grid Update. Christopher J. Eisenbrey. Director, Business Information Edison Electric Institute (EEI) 1 Smart Grid Update Christopher J. Eisenbrey Director, Business Information Edison Electric Institute (EEI) The Council of State Governments (CSG) April 26, 2012 Edison Electric Institute (EEI) The Edison

More information

Cybersecurity & Privacy Enhancements

Cybersecurity & Privacy Enhancements Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their

More information

Cyber Security and Cyber Fraud

Cyber Security and Cyber Fraud Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa

More information

Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure EXECUTIVE ORDER [13800] - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS

More information

Implementing Executive Order and Presidential Policy Directive 21

Implementing Executive Order and Presidential Policy Directive 21 March 26, 2013 Implementing Executive Order 13636 and Presidential Policy Directive 21 Mike Smith, Senior Cyber Policy Advisor, Office of Electricity Delivery and Energy Reliability, Department of Energy

More information

Jeff Marron, IT Specialist Security National Institute of Standards and Technology (NIST)

Jeff Marron, IT Specialist Security National Institute of Standards and Technology (NIST) Moderated by Daniel Eliot, Director Small Business Programs NCSA Jeff Marron, IT Specialist Security National Institute of Standards and Technology (NIST) Tammy Smith, CISSP Cyber Security Advisor FedEx

More information

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE Association of Corporate Counsel NYC Chapter 11/1 NYC BDO USA, LLP, a Delaware limited liability partnership,

More information

SEARCH 2007 Annual Meeting July 17-20, 2007 Portland, Oregon BJA AND SEX OFFENDER (SO) ISSUES

SEARCH 2007 Annual Meeting July 17-20, 2007 Portland, Oregon BJA AND SEX OFFENDER (SO) ISSUES SEARCH 2007 Annual Meeting July 17-20, 2007 Portland, Oregon BJA AND SEX OFFENDER (SO) ISSUES Dru Sjodin National Sex Offender Public Website Updates to the public website are in development to meet the

More information

GPS Vulnerability and DHS Mitigation Efforts. David Wulf Acting Deputy Assistant Secretary Infrastructure Protection Department of Homeland Security

GPS Vulnerability and DHS Mitigation Efforts. David Wulf Acting Deputy Assistant Secretary Infrastructure Protection Department of Homeland Security GPS Vulnerability and DHS Mitigation Efforts David Wulf Acting Deputy Assistant Secretary Infrastructure Protection Department of Homeland Security The Office of Infrastructure Protection National Protection

More information

300 Riverview Plaza Odysseus Marcopolus, Chief Operating Officer Trenton, NJ POLICY NO: SUPERSEDES: N/A VERSION: 1.0

300 Riverview Plaza Odysseus Marcopolus, Chief Operating Officer Trenton, NJ POLICY NO: SUPERSEDES: N/A VERSION: 1.0 P.O. Box 212 Philip D. Murphy, Governor 300 Riverview Plaza Odysseus Marcopolus, Chief Operating Officer Trenton, NJ 08625-0212 www.tech.nj.gov STATE OF NEW JERSEY TECHNOLOGY CIRCULAR Enterprise Information

More information

Government Contracting. Tech-Savvy World. in a. October InterContinental Miami. Miami, Florida

Government Contracting. Tech-Savvy World. in a. October InterContinental Miami. Miami, Florida Government Contracting in a Tech-Savvy World October 30-31 2014 InterContinental Miami Miami, Florida 2014 Fall Program Government Contracting in a Tech-Savvy World October 30-31, 2014 InterContinental

More information

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania C-PROC Cybercrime Programme Office Council of Europe, Bucharest, Romania ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania The role of legislation in enhancing the cyber

More information

National Strategy for CBRNE Standards

National Strategy for CBRNE Standards National Strategy for CBRNE Standards Franca R. Jones Assistant Director Chemical and Biological Countermeasures National Security and International Affairs Office of Science and Technology Policy 11 September

More information

GAO CYBERSPACE POLICY. Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations, but Sustained Leadership Is Needed

GAO CYBERSPACE POLICY. Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations, but Sustained Leadership Is Needed GAO United States Government Accountability Office Report to Congressional Requesters October 2010 CYBERSPACE POLICY Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations,

More information

ENFORCEMENT POWERS. The EU Perspective. Olivier Proust. Associate Hunton & Williams LLP

ENFORCEMENT POWERS. The EU Perspective. Olivier Proust. Associate Hunton & Williams LLP ENFORCEMENT POWERS The EU Perspective Olivier Proust Associate Hunton & Williams LLP What is enforcement within the EU? Broad sense: Any action leading to better compliance Awareness raising activities

More information

Cybersecurity and the Board of Directors

Cybersecurity and the Board of Directors Cybersecurity and the Board of Directors Key Findings from BITS/FSR Meetings OVERVIEW Board directors are increasingly required to engage in cybersecurity risk management yet some may need better education

More information

NISP Update NDIA/AIA John P. Fitzpatrick, Director May 19, 2015

NISP Update NDIA/AIA John P. Fitzpatrick, Director May 19, 2015 NISP Update NDIA/AIA John P. Fitzpatrick, Director May 19, 2015 Agenda Cybersecurity Information Sharing and the NISP NISP Working Group Update CUI Program Update 2 Executive Order 13691 Promoting Private

More information

Cyber Risks in the Boardroom Conference

Cyber Risks in the Boardroom Conference Cyber Risks in the Boardroom Conference Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks

More information

Incident Response and Cybersecurity: A View from the Boardroom

Incident Response and Cybersecurity: A View from the Boardroom IT, Privacy & Data Security Webinar Incident Response and Cybersecurity: A View from the Boardroom Gerard M. Stegmaier, Reed Smith Partner IT, Privacy & Data Security Samuel F. Cullari, Reed Smith Counsel

More information

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018 Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security BRANDEIS UNIVERSITY PROFESSOR ERICH SCHUMANN MAY 2018 1 Chinese military strategist Sun Tzu: Benchmark If you know your

More information

BRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES. Geneva 18 April David Satola

BRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES. Geneva 18 April David Satola BRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES Geneva 18 April 2016 David Satola Why combatting cybercrime matters to the World Bank Demand for a single source of access

More information

Digital Forensics. Module 1 CS 996

Digital Forensics. Module 1 CS 996 Digital Forensics Module 1 CS 996 Instructors Dr. Frederick Scholl Office Hours: 5-6 PM, Mondays E-mail: freds@monarch-info.com Phone 212-869-4458 I am not a lawyer! Kulesh Shanmugasundaram Professor Nasir

More information

Mapping to the National Broadband Plan

Mapping to the National Broadband Plan The National Telecommunications and Information Administration Mapping to the National Broadband Plan 37 th Annual PURC Conference Smart Technology vs. Smart Policy February 3, 2010 1 About NTIA The National

More information

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21 National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security

More information

Components and Considerations in Building an Insider Threat Program

Components and Considerations in Building an Insider Threat Program Components and Considerations in Building an Insider Threat Program Carly Huth Insider Threat Researcher, CEWM Carly L. Huth is an insider threat researcher in the Cyber Enterprise and Workforce Management

More information

Data Security and Breach Notification Legislative Update: What You Need to Know (SESSION CODE CRM001)

Data Security and Breach Notification Legislative Update: What You Need to Know (SESSION CODE CRM001) Data Security and Breach Notification Legislative Update: What You Need to Know (SESSION CODE CRM001) Speakers: James T. McIntyre Partner McIntyre & Lemon, PLLC Janice Ochenkowski International Director

More information

ISAO SP 4000: Protecting Consumer Privacy in Cybersecurity Information Sharing v1.0

ISAO SP 4000: Protecting Consumer Privacy in Cybersecurity Information Sharing v1.0 ISAO SP 4000: Protecting Consumer Privacy in Cybersecurity Information Sharing v1.0 July 26, 2017 ISAO SP 4000 Protecting Consumer Privacy in Cybersecurity Information Sharing v1.0 ISAO Standards Organization

More information

SUPERIOR COURT OF THE DISTRICT OF COLUMBIA CRIMINAL DIVISION FELONY BRANCH

SUPERIOR COURT OF THE DISTRICT OF COLUMBIA CRIMINAL DIVISION FELONY BRANCH SUPERIOR COURT OF THE DISTRICT OF COLUMBIA CRIMINAL DIVISION FELONY BRANCH In the Matter of the Search of www.disruptj20.org ) Special Proceeding No. 17 CSW 3438 that Is Stored at Premises Owned, Maintained,

More information

Privacy Policy Effective May 25 th 2018

Privacy Policy Effective May 25 th 2018 Privacy Policy Effective May 25 th 2018 1. General Information 1.1 This policy ( Privacy Policy ) explains what information Safety Management Systems, 2. Scope Inc. and its subsidiaries ( SMS ), it s brand

More information

H2020 WP Cybersecurity PPP topics

H2020 WP Cybersecurity PPP topics Info Day 2017 SC7 Secure Societies 06-07/03/2017 H2020 WP 2017 - Cybersecurity PPP topics Rafael Tesoro Cybersecurity & Digital Privacy, DG CNECT Cyberspace: a backbone of digital society & economic growth

More information

MYTH vs. REALITY The Revised Cybersecurity Act of 2012, S. 3414

MYTH vs. REALITY The Revised Cybersecurity Act of 2012, S. 3414 MYTH vs. REALITY The Revised Cybersecurity Act of 2012, S. 3414 The Cybersecurity Act of 2012, S. 3414, has not been the subject of a legislative hearing and has skipped regular order. HSGAC has not marked

More information

U.S. Private-sector Privacy Certification

U.S. Private-sector Privacy Certification 1 Page 1 of 5 U.S. Private-sector Privacy Certification Outline of the Body of Knowledge for the Certified Information Privacy Professional/United States (CIPP/US ) I. Introduction to the U.S. Privacy

More information