Syllabus: Cybersecurity Law Seminar. George Mason University Antonin Scalia Law School Spring 2018 Professors Kiran S. Raj & Scott Ferber
|
|
- Scarlett Hester Miles
- 5 years ago
- Views:
Transcription
1 Brief Course Description: Syllabus: Cybersecurity Law Seminar George Mason University Antonin Scalia Law School Spring 2018 Professors Kiran S. Raj & Scott Ferber This seminar course will provide students exposure to the key legal and policy issues related to cybersecurity, including the legal authorities and obligations of both the government and the private sector with respect to protecting computer systems and networks, as well as the national security aspects of the cyber domain including authorities related to offensive activities in cyberspace. The course will include a survey of federal laws, executive orders, regulations, and cases related to surveillance, cyber intrusions by private and nation-state actors, data breaches, and privacy and civil liberties matters, among other things. The course will also explore the legislative and technology landscape in this dynamic area and will provide students with opportunities to discuss cutting-edge issues at the intersection of law, technology, and policy. Class Format: Seminar of students; two credits; one two-hour class per week. Active participation in class discussions is required and students are expected to be fully prepared for each class session. Grading: Substantive grades will be based on class participation (15%) and student s successful completion of a page paper on cybersecurity law (85%). Paper Due Date: TBD ** Please note that late papers will receive a 1/3 grade deduction for every day the paper is late beyond the due date established in class (i.e., an A- paper that is turned in late would receive a B+. If it is two days late, it would receive a B, etc.). Please turn papers in on time. ** Class Details: Mondays: 8:00 pm 9:50 pm. Office Hours: By appointment. Faculty Contact Information: Kiran Raj: kraj@gmu.edu Scott Ferber: scott.ferber@gmail.com 1
2 Course Materials: The bulk of the course materials are cases or articles available on Westlaw or Lexis-Nexis or materials posted on TWEN. Materials posted on TWEN are indicated below. We have also provided links to information that is easily accessible on the Internet. ** Given the developing nature of this area of law, it is likely that the syllabus and readings will be updated over the course of the semester; therefore, please regularly check your and TWEN for updates to the syllabus and readings. ** Course Assignments: Week 1 Introduction to Computer Networks and Cyber Threats 1. Leiner, Cerf, et. al., A Brief History of the Internet 2. Verizon, 2017 Data Breach Investigations Report pp Dan Coats, Worldwide Threat Assessment of the US Intelligence Community (May 2017) pp. 1-5 Week 2 Vulnerabilities, Federal Cybersecurity, and the Applicable Federal Laws 1. Harvard National Security Law Research Group, Cloud Computing and National Security Law pp. 3-5, 9-14 & Office of Management and Budget, Annual Report to Congress: The Federal Information Security Management Act (Feb. 27, 2015) pp. 1-12, Congressional Research Service, Federal Laws Relating to Cybersecurity: Overview and Discussion of Proposed Revisions (March 2013) pp. 1 20, 22-24, Week 3: Economics of Cyber Threats 1. Nicole Perlroth & David Sanger, Nation s Buying As Hackers Sell Flaws In Computer Code (July 13, 2013) pp The White House, Heartbleed: Understanding Why We Disclose Cyber Vulnerabilities (Apr. 28, 2014) pp Vulnerabilities Equities Policy and Process for the United States Government 4. Ross Anderson, Why Information Security Is Hard An Economic Perspective (2001) pp Andrew Updegrove, Cyber Security and the Vulnerability of the Networks: Why We Need to Rethink Our Cyber Defenses Now (2011) pp Week 4 Anonymity, Privacy, and Data Mining 1. The White House, Big Data: Seizing Opportunities, Preserving Values (May 1, 2014) pp
3 2. Daniel Solove, Nothing to Hide (Yale Univ. Press 2010) pp Google v. Spanish Data Protection Agency, European Court of Justice Opinion (June 25, 2013) pp EU Schems decision (Opinion of Advocate General): Week 5: Protecting the Internet: Encryption and Interception 1. Peter Swire, From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud (Apr. 12, 2012) pp Economist, Cryptography for Dummies (Nov. 29, 2014) pp Statement for the Record: Deputy Attorney General & FBI Director testimony before the Senate Judiciary Committee (July 2015): 4. In Re: Grand Jury Subpoena, 670 F.3d 1335 (11th Cir. 2012) (Westlaw/LEXIS) Week 6: Electronic Surveillance: Background Legal Principles 1. Katz v. United States, 389 US 347 (1967) (Westlaw/LEXIS) 2. Smith v. Maryland, 442 U.S. 735 (1979) (Westlaw/LEXIS) 3. United States v. McLaren, 957 F. Supp. 215 (M.D. Fla. 1997) (Westlaw/LEXIS) 4. United States v. Warshak, 631 F.3d 266, (6th Cir. 2010) (Westlaw/LEXIS) 5. Paul Rosenzweig, The Evolution of Wiretapping, Engage pp (Sept. 2011) Week 7: Electronic Surveillance & Technological Advances 1. In re: Google Street View Electronic Communications Litigation, 794 F.Supp.2d 1067 (N.D. Cal. 2011) (Westlaw/LEXIS) 2. United States v. Jones, 132 S.Ct. 945 (2012) (Westlaw/LEXIS) 3. United States v. Davis, 785 F.3d 498 (11 th Cir. 2015) 4. Carpenter v. United States, 819 F.3d 880 (6th Cir. 2016), cert. granted, 137 S.Ct (June 5, 2017) (Westlaw/LEXIS); see also Supreme Court oral argument transcript NOTE: PRELIMINARY PAPER TOPICS DUE BEFORE WEEK 8 CLASS Week 8: CALEA, Metadata, and Foreign Intelligence 1. FCC, Communications Assistance for Law Enforcement Act (CALEA) Introduction and Basic Information pp CALEA, 47 USC Klayman v. Obama, 2013 WL (D.D.C. Dec. 16, 2013) (Westlaw/LEXIS) 4. ACLU v. Clapper, 959 F.Supp.2d 724 (SDNY 2013) (Westlaw/LEXIS) 5. Privacy and Civil Liberties Oversight Board, Report on the Surveillance Program Operated Pursuant to Section 702, Executive Summary pp (July 2014) **(Note: Only print pp of the PDF; file is very long)** 3
4 Week 9: Cyber Security and the Fourth Amendment 1. Legal Issues relating to the Testing, Use and Deployment of an Intrusion Detection System (Einstein 2.0) to Protect Unclassified Computer Networks in the Executive Branch, DOJ Office of Legal Counsel (Jan. 9, 2009) pp Legality of Intrusion Detection System to Protect Unclassified Computer Networks in the Executive Branch, DOJ Office of Legal Counsel (August 2009) pp U.S. Department of Homeland Security, Privacy Impact Statement for Einstein 3.0 Program (April 2013) pp In re: Yahoo Mail Litigation, 7 F.Supp.3d 1016 (N.D. Cal. 2014) (Westlaw/LEXIS) 5. Matter of Warrant to Search a Certain Account Controlled and Maintained by Microsoft, 829 F.3d 197 (2d Cir. 2016), rehearing en banc denied, 855 F.3d 53 (2d. Cir. 2017), cert. granted, S.Ct. (Oct. 16, 2017) (Westlaw/LEXIS) amendments to Fed. R. Crim. P. 41(b)(6) (Westlaw/LEXIS) NOTE: FINAL PAPER TOPICS DUE THIS WEEK Week 10: Protecting the Private Sector: Introduction to Information Sharing 1. Bipartisan Policy Center, Cyber Security Task Force: Public-Private Information Sharing (July 2012) 2. Bellovin, et al., Can It Really Work? Problems with Extending EINSTEIN 3.0 to Critical Infrastructure, 3 Harv. Nat l Sec. J. 1 (2011) 3. National Institute on Standards and Technology, NIST Framework on Cybersecurity (Feb. 12, 2014) pp. 1-9 ** (Note: Only print pp of the PDF; file is long) ** 4. Executive Order 13691, Promoting Private Sector Cybersecurity Information Sharing (Feb. 13, 2015) pp. 1-6 Week 11: Information Sharing: Congressional and Administration Efforts 1. Executive Order 13636, Improving Critical Infrastructure Cybersecurity (Feb. 2, 2013) pp Cybersecurity Information Sharing Act (CISA) Week 12: Hacking and Data Breaches 1. Computer Fraud and Abuse Act (CFAA) 2. FTC v. Wyndham Worldwide, (3 rd Cir. Aug 24, 2015) available at 3. Executive Order 13694, Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities (Apr. 1, 2015) 4
5 4. Executive Order 13757, Taking Additional Steps to Address the National Emergency With Respect to Significant Malicious Cyber-Enabled Activities (Dec. 28, 2016) 5. Cyber sanctions under Executive Orders and Week 13: Securing Critical Infrastructure: Case Studies of Key Industries 1. Executive Order 13800, Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure (May 11, 2017) 2. TBD Week 14: Offensive Cyber Activities and International Law 1. Jack Goldsmith, Cybersecurity Treaties: A Skeptical View (Feb. 2011) pp Stewart Baker, Testimony Before the Senate Judiciary Committee Subcommittee on Crime and Terrorism, The Attribution Revolution: Raising the Costs for Hackers and Their Customers (May 8, 2013) p
George Mason University Law School Spring Profs. Jamil N. Jaffer & John C. Lipsey
Brief Course Description: Syllabus Law 416: Cybersecurity Law Seminar George Mason University Law School Spring 2019 Profs. Jamil N. Jaffer & John C. Lipsey This seminar course will provide students exposure
More informationHow Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner
How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda Rise in Data Breaches Effects of Increase in Cybersecurity Threats Cybersecurity Framework
More informationCOMPUTER CRIME LAW PROFESSOR KERR
COMPUTER CRIME LAW PROFESSOR KERR 6369-10 SYLLABUS Spring 2017 I. Course Summary This course examines the legal issues raised by computer-related crime. The course coverage divides into three topics: (1)
More informationNational Policy and Guiding Principles
National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework
More informationInvestigating Insider Threats
Investigating Insider Threats February 9, 2016 Jonathan Gannon, AT&T Brenda Morris, Booz Allen Hamilton Benjamin Powell, WilmerHale 1 Panelist Biographies Jonathan Gannon, AT&T, Executive Director & Senior
More informationCYBERSECURITY LEGISLATION IT OUT!
ATTEMPTS TO PASS US U.S. CYBERSECURITY LEGISLATION YOU NEED A SCORECARD TO FIGURE YOU NEED A SCORECARD TO FIGURE IT OUT! Professor Pauline C. Reich Waseda University School of Law cyberasia2@gmail.com
More informationCase3:10-cv RS Document41-8 Filed03/01/12 Page1 of 6. Electronic Frontier Foundation v. DOJ, et al. Vaughn Index for Cardozo FOIA Releases
Case3:10-cv-04892-RS Document41-8 Filed03/01/12 Page1 of 6 1 Electronic Frontier Foundation v. DOJ, et al Vaughn Index for Cardozo FOIA Releases Detailed description of FBI responsive records by category
More informationImplementing the Administration's Critical Infrastructure and Cybersecurity Policy
Implementing the Administration's Critical Infrastructure and Cybersecurity Policy Cybersecurity Executive Order and Critical Infrastructure Security & Resilience Presidential Policy Directive Integrated
More informationCybersecurity and Data Privacy
DECEMBER 2015 NO. 2 Cybersecurity and Data Privacy Landmark Cybersecurity Legislation Included in Omnibus Package Action Item: Congress included the Cybersecurity Act of 2015 (the Act ) in the Consolidated
More informationCYBERSECURITY FEDERAL UPDATE. NCSL Cybersecurity Task Force
CYBERSECURITY FEDERAL UPDATE NCSL Cybersecurity Task Force FY 2018 BUDGET BLUEPRINT President s Management Agenda Identifies cybersecurity as a critical area to improving the federal government Department
More informationThe Promise and Peril of Active Cyber Defense
1 The Promise and Peril of Active Cyber Defense Dr. Irv Lachow Deputy Director, Cyber Strategy and Execution, MITRE August 6, 2018 2017 The MITRE Corporation. All rights reserved. 2 Disclaimer The author's
More informationThe Evolving Threat to Corporate Cyber & Data Security
The Evolving Threat to Corporate Cyber & Data Security Presented by: Sara English, CIPP/US Sara.English@KutakRock.com 1 http://blogs.wsj.com/law/2015/12/09/employee error leading cause of data breaches
More information- Cyber threat information: information directly pertaining to,
WHAT INFORMATION MAY BE SHARED H.R. 3674, the PRECISE Act of 2011, as reported from HHSC Subcmte on Cybersecurity (Lungren) law, H.R. 3523, the Cyber Intelligence sharing and Protection Act of 2011, as
More informationCybersecurity Information Sharing Legislation
Government entities and private-sector organizations in the United States now have a common framework that encourages the sharing of cybersecurity threat information among each other, thanks to new federal
More informationCybersecurity: Legislation, Hearings, and Executive Branch Documents
Cybersecurity: Legislation, Hearings, and Executive Branch Documents Rita Tehan Information Research Specialist November 17, 2015 Congressional Research Service 7-5700 www.crs.gov R43317 Cybersecurity:
More informationCybersecurity: Legislation, Hearings, and Executive Branch Documents
Cybersecurity: Legislation, Hearings, and Executive Branch Documents Rita Tehan Information Research Specialist July 15, 2015 Congressional Research Service 7-5700 www.crs.gov R43317 Cybersecurity: Legislation,
More information-Eight types of cyber data, (Sec. 708(7))
WHAT INFORMATION MAY BE SHARED H.R. 624, the Cyber Intelligence sharing and Protection Act of 2013 (CISPA) (Rogers- -Notwithstanding any provision of law, S. 3414, the Cybersecurity Act of 2012 (Lieberman-Collins-
More informationStephanie Zierten Associate Counsel Federal Reserve Bank of Boston
Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston Cybersecurity Landscape Major Data Breaches (e.g., OPM, IRS) Data Breach Notification Laws Directors Derivative Suits Federal Legislation
More informationCybersecurity: Legislation, Hearings, and Executive Branch Documents
Cybersecurity: Legislation, Hearings, and Executive Branch Documents Rita Tehan Information Research Specialist October 21, 2015 Congressional Research Service 7-5700 www.crs.gov R43317 Cybersecurity:
More informationRe: Special Publication Revision 4, Security Controls of Federal Information Systems and Organizations: Appendix J, Privacy Control Catalog
April 6, 2012 National Institute of Standards and Technology 100 Bureau Drive, Stop 1070 Gaithersburg, MD 20899-1070 Re: Special Publication 800-53 Revision 4, Security Controls of Federal Information
More informationIncident Handling. Week 4: Incidents, Evidence and the Law
Incident Handling Week 4: Incidents, Evidence and the Law George Berg & Jagdish S. Gangolly University at Albany 4/27/04 Incident Handling (G. Berg & J. Gangolly) 1 Road Map What is digital evidence? What
More informationIncident Handling. Road Map. Week 4: Incidents, Evidence and the Law. Types of Evidence. Digital Evidence. Characteristics of Evidence
Incident Handling Week 4: Incidents, Evidence and the Law George Berg & Jagdish S. Gangolly State University of New York at Albany Road Map What is digital evidence? What are different types of evidence?
More informationStrengthening the Cybersecurity of Federal Networks and Critical Infrastructure
Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening
More informationDeveloping Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite?
Developing Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite? Minnesota RIMS 39 th Annual Seminar Risk 2011-2012: Can You Hack
More informationRobert Holleyman, President and CEO, BSA The Software Alliance
Testimony Bolstering US Cybersecurity Robert Holleyman, President and CEO, BSA The Software Alliance Testimony before the US House of Representatives, Committee on the Judiciary, Subcommittee on Crime,
More informationBuilding Privacy into Cyber Threat Information Sharing Cyber Security Symposium Securing the Public Trust
Building Privacy into Cyber Threat Information Sharing Cyber Security Symposium Securing the Public Trust Jamie Danker Director, Senior Privacy Officer National Protection and Programs Directorate, U.S.
More informationU.S. v. Weaver, 636 F.Supp.2d 769 (C.D. Ill., 2009)
636 F.Supp.2d 769 UNITED STATES of America, Plaintiff, v. Justin D. WEAVER, Defendant. No. 09-30036. United States District Court, C.D. Illinois, Springfield Division. July 15, 2009. Elham M. Peirson,
More informationDecember 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development
December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination
More informationDHS Hackers and the Lawyers Who Advise Them
SESSION ID: LAW-T08 DHS Hackers and the Lawyers Who Advise Them MODERATOR: Gabriel Taran Assistant General Counsel, Cybersecurity DHS Office of General Counsel (OGC) PANELISTS: From the Cybersecurity and
More informationComprehensive Study on Cybercrime
Federal Ministry of Justice and 17 August 2016 Consumer Protection German Comments on the Comprehensive Study on Cybercrime (Draft February 2013) The United Nations Office on Drugs and Crime (UNODC) invited
More informationLegal Considerations for Incident Response
Legal Considerations for Incident Response ISSA Phoenix Chapter Q2/16 Chapter Meeting April 12, 2016 Patrick Fowler and Tony King Snell & Wilmer L.L.P. One Arizona Center Phoenix, AZ 85023 1 Legal Considerations
More informationHacking and Cyber Espionage
Hacking and Cyber Espionage September 19, 2013 Prophylactic and Post-Breach Concerns for In-House Counsel Raymond O. Aghaian, McKenna Long & Aldridge LLP Elizabeth (Beth) Ferrell, McKenna Long & Aldridge
More informationData Breach Preparation and Response. April 21, 2017
Data Breach Preparation and Response April 21, 2017 King & Spalding Data, Privacy & Security King & Spalding s 60 plus lawyer Data, Privacy & Security ( DPS ) Practice is best known for: Experienced crisis
More informationPROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM
PROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM THE THREAT WE FACE On average, the Department of Administration information officers identify: 200 brute force attempts per day;
More informationProgram 1. THE USE OF CYBER ACTIVE DEFENSE BY THE PRIVATE SECTOR
Program The structure of the workshop will be fully participatory for each session. We will ask several participants to take the lead in some panels, and to present the main challenges or comment on certain
More informationTHE WHITE HOUSE. Office of the Press Secretary EXECUTIVE ORDER
THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE May 11, 2017 EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority
More informationThis Webcast Will Begin Shortly
This Webcast Will Begin Shortly If you have any technical problems with the Webcast or the streaming audio, please contact us via email at: webcast@acc.com Thank You! 1 Cybersecurity Changing Landscape
More informationINFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity
INFORMATION SESSION MS Software Engineering, specialization in Cybersecurity Presenter Afifa Hamad Program Specialist Graduate & Extended Studies Charles W. Davidson College of Engineering San Jose State
More informationTHE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER
FOR IMMEDIATE RELEASE May 11, 2017 THE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority
More informationMaster of Cyber Security, Strategy and Risk Management. CECS PG Information Session April 17, 2018
Master of Cyber Security, Strategy and Risk Management CECS PG Information Session April 17, 2018 2 Program Purpose Provide a working understanding of information, network and software security, across
More informationCLE Alabama. Banking Law Update. Embassy Suites Hoover Hotel Birmingham, Alabama Friday, February 19, 2016
CLE Alabama Banking Law Update Embassy Suites Hoover Hotel Birmingham, Alabama Friday, February 19, 2016 Best Practices on Managing Cyber-Security Risks J.T. Malatesta III and Sarah S. Glover Maynard Cooper
More informationLegal, Ethical, and Professional Issues in Information Security
Legal, Ethical, and Professional Issues in Information Security Downloaded from http://www.utc.edu/center-information-securityassurance/course-listing/cpsc3600.php Minor Changes from Dr. Enis KARAARSLAN
More informationITU Model Cybercrime Law: Project Overview
ITU Model Cybercrime Law: Project Overview Jody R. Westby ICT Applications and Cybersecurity Division Policies and Strategies Department, BDT International Telecommunication Union International
More informationCloud Security. Copyright Ramesh Nagappan. All rights reserved.
Cloud Security 1 Cloud Security Week 1 Lecture 1 Ramesh Nagappan Harvard University Extension School Brandeis University GPS 2 Week 1 Lecture - 1 Course Introduction Evolution of Cloud Computing Introduction
More information79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90
th OREGON LEGISLATIVE ASSEMBLY-- Regular Session Senate Bill 0 Printed pursuant to Senate Interim Rule. by order of the President of the Senate in conformance with presession filing rules, indicating neither
More informationISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015
ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO 27001 FRAMEWORK AUGUST 19, 2015 Agenda Coalfire Overview Threat Landscape What is ISO Why ISO ISO Cycle Q&A 2 Presenters
More informationWelcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time
TM Plan. Protect. Respond. Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time Registration is open for the April webinar:
More informationESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN THE DEPARTMENT OF JUSTICE
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN
More informationAnatomy of a Data Breach: A Practical Guide for Small Law Departments
Anatomy of a Data Breach: A Practical Guide for Small Law Departments Judy Branzelle is the Chief Legal Officer and General Counsel for Goodwill Industries International, Inc. where she has been employed
More informationSTRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE
STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby
More informationCyberUSA Government Cyber Opportunities for your Region: The Federal Agenda - Federal, Grants & Resources Available to Support Community Cyber
CyberUSA Government Cyber Opportunities for your Region: The Federal Agenda - Federal, Grants & Resources Available to Support Community Cyber Initiatives 30 January 2018 1 Agenda Federal Landscape Cybersecurity
More informationSearching Securely: Technical Issues with Warrants for Remote Search. Steven M. Bellovin June 28,
Searching Securely: Technical Issues with Warrants for Remote Search Steven M. Bellovin June 28, 2015 1 The Fourth Amendment to the U.S. Constitution The right of the people to be secure in their persons,
More informationLEHMAN COLLEGE OF THE CITY UNIVERSITY OF NEW YORK. Department of Economics and Business. Curriculum Change
Senate Meeting of April 28, 2010 Graduate Studies Committee Hegis Code: 0502 Program Code: 32786 LEHMAN COLLEGE OF THE CITY UNIVERSITY OF NEW YORK Department of Economics and Business Curriculum Change
More informationCybersecurity and Hospitals: A Board Perspective
Cybersecurity and Hospitals: A Board Perspective Cybersecurity is an important issue for both the public and private sector. At a time when so many of our activities depend on information systems and technology,
More informationRegulating Information: Cybersecurity, Internet of Things, & Exploding Rules. David Bodenheimer Evan Wolff Kate Growley
Regulating Information: Cybersecurity, Internet of Things, & Exploding Rules David Bodenheimer Evan Wolff Kate Growley Regulating Information The Internet of Things: Peering into the Future Cybersecurity
More informationResolution: Advancing the National Preparedness for Cyber Security
Government Resolution No. 2444 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing the National Preparedness for Cyber Security It is hereby resolved: Further to Government
More informationLegal and Regulatory Developments for Privacy and Security
Legal and Regulatory Developments for Privacy and Security Rodney Petersen Government Relations Officer and Director of EDUCAUSE Cybersecurity Initiative Overview Context for Federal Policy Policy Directions
More informationCybersecurity: Legislation, Hearings, and Executive Branch Documents
Cybersecurity: Legislation, Hearings, and Executive Branch Documents Rita Tehan Information Research Specialist July 8, 2016 Congressional Research Service 7-5700 www.crs.gov R43317 Cybersecurity: Legislation,
More informationISAO SO Product Outline
Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing
More informationNATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium
NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,
More informationPrivacy Year in Review: Privacy and VoIP Technology
Privacy Year in Review: Privacy and VoIP Technology JOHN B. MORRIS, JR.* ABSTRACT Voice over internet protocol ("VoIP") technology is increasingly being used throughout the nation. VoIP technology provides
More informationCyber Risks, Coverage, and the Board of Directors.
Cyber Risks, Coverage, and the Board of Directors PCI Northeastern General Counsel Seminar September 19-20, 2016 Vincent J. Vitkowsky Seiger Gfeller Laurie LLP vvitkowsky@sgllawgroup.com CYBER RISKS and
More informationCybersecurity: Legislation, Hearings, and Executive Branch Documents
Cybersecurity: Legislation, Hearings, and Executive Branch Documents Rita Tehan Information Research Specialist October 21, 2016 Congressional Research Service 7-5700 www.crs.gov R43317 Cybersecurity:
More informationCybersecurity in Higher Ed
Cybersecurity in Higher Ed 1 Overview Universities are a treasure trove of information. With cyber threats constantly changing, there is a need to be vigilant in protecting information related to students,
More informationCybersecurity: CRS Experts
July 23, 2012 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research Service 7-5700 www.crs.gov R42619 T he following table provides names and contact information
More informationCybersecurity: Legislation, Hearings, and Executive Branch Documents
Cybersecurity: Legislation, Hearings, and Executive Branch Documents Rita Tehan Information Research Specialist November 9, 2017 Congressional Research Service 7-5700 www.crs.gov R43317 Cybersecurity:
More informationBefore the House Committee on Homeland Security, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies
WRITTEN STATEMENT OF MARY ELLEN CALLAHAN Partner and Chair, Privacy and Information Governance Practice, Jenner & Block Former Chief Privacy Officer, U.S. Department of Homeland Security Before the House
More informationThe Simple Guide to GDPR Data Protection: Considerations for and File Sharing
The Simple Guide to GDPR Data Protection: Considerations for Email and File Sharing The European Union s General Data Protection Regulation (GDPR) Uncovering Key Requirements and Methods for Compliance
More informationSmart Grid Update. Christopher J. Eisenbrey. Director, Business Information Edison Electric Institute (EEI)
1 Smart Grid Update Christopher J. Eisenbrey Director, Business Information Edison Electric Institute (EEI) The Council of State Governments (CSG) April 26, 2012 Edison Electric Institute (EEI) The Edison
More informationCybersecurity & Privacy Enhancements
Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their
More informationCyber Security and Cyber Fraud
Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa
More informationPresidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure
Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure EXECUTIVE ORDER [13800] - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS
More informationImplementing Executive Order and Presidential Policy Directive 21
March 26, 2013 Implementing Executive Order 13636 and Presidential Policy Directive 21 Mike Smith, Senior Cyber Policy Advisor, Office of Electricity Delivery and Energy Reliability, Department of Energy
More informationJeff Marron, IT Specialist Security National Institute of Standards and Technology (NIST)
Moderated by Daniel Eliot, Director Small Business Programs NCSA Jeff Marron, IT Specialist Security National Institute of Standards and Technology (NIST) Tammy Smith, CISSP Cyber Security Advisor FedEx
More informationTIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE
TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE Association of Corporate Counsel NYC Chapter 11/1 NYC BDO USA, LLP, a Delaware limited liability partnership,
More informationSEARCH 2007 Annual Meeting July 17-20, 2007 Portland, Oregon BJA AND SEX OFFENDER (SO) ISSUES
SEARCH 2007 Annual Meeting July 17-20, 2007 Portland, Oregon BJA AND SEX OFFENDER (SO) ISSUES Dru Sjodin National Sex Offender Public Website Updates to the public website are in development to meet the
More informationGPS Vulnerability and DHS Mitigation Efforts. David Wulf Acting Deputy Assistant Secretary Infrastructure Protection Department of Homeland Security
GPS Vulnerability and DHS Mitigation Efforts David Wulf Acting Deputy Assistant Secretary Infrastructure Protection Department of Homeland Security The Office of Infrastructure Protection National Protection
More information300 Riverview Plaza Odysseus Marcopolus, Chief Operating Officer Trenton, NJ POLICY NO: SUPERSEDES: N/A VERSION: 1.0
P.O. Box 212 Philip D. Murphy, Governor 300 Riverview Plaza Odysseus Marcopolus, Chief Operating Officer Trenton, NJ 08625-0212 www.tech.nj.gov STATE OF NEW JERSEY TECHNOLOGY CIRCULAR Enterprise Information
More informationGovernment Contracting. Tech-Savvy World. in a. October InterContinental Miami. Miami, Florida
Government Contracting in a Tech-Savvy World October 30-31 2014 InterContinental Miami Miami, Florida 2014 Fall Program Government Contracting in a Tech-Savvy World October 30-31, 2014 InterContinental
More informationISACA National Cyber Security Conference 8 December 2017, National Bank of Romania
C-PROC Cybercrime Programme Office Council of Europe, Bucharest, Romania ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania The role of legislation in enhancing the cyber
More informationNational Strategy for CBRNE Standards
National Strategy for CBRNE Standards Franca R. Jones Assistant Director Chemical and Biological Countermeasures National Security and International Affairs Office of Science and Technology Policy 11 September
More informationGAO CYBERSPACE POLICY. Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations, but Sustained Leadership Is Needed
GAO United States Government Accountability Office Report to Congressional Requesters October 2010 CYBERSPACE POLICY Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations,
More informationENFORCEMENT POWERS. The EU Perspective. Olivier Proust. Associate Hunton & Williams LLP
ENFORCEMENT POWERS The EU Perspective Olivier Proust Associate Hunton & Williams LLP What is enforcement within the EU? Broad sense: Any action leading to better compliance Awareness raising activities
More informationCybersecurity and the Board of Directors
Cybersecurity and the Board of Directors Key Findings from BITS/FSR Meetings OVERVIEW Board directors are increasingly required to engage in cybersecurity risk management yet some may need better education
More informationNISP Update NDIA/AIA John P. Fitzpatrick, Director May 19, 2015
NISP Update NDIA/AIA John P. Fitzpatrick, Director May 19, 2015 Agenda Cybersecurity Information Sharing and the NISP NISP Working Group Update CUI Program Update 2 Executive Order 13691 Promoting Private
More informationCyber Risks in the Boardroom Conference
Cyber Risks in the Boardroom Conference Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks
More informationIncident Response and Cybersecurity: A View from the Boardroom
IT, Privacy & Data Security Webinar Incident Response and Cybersecurity: A View from the Boardroom Gerard M. Stegmaier, Reed Smith Partner IT, Privacy & Data Security Samuel F. Cullari, Reed Smith Counsel
More informationBoston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018
Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security BRANDEIS UNIVERSITY PROFESSOR ERICH SCHUMANN MAY 2018 1 Chinese military strategist Sun Tzu: Benchmark If you know your
More informationBRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES. Geneva 18 April David Satola
BRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES Geneva 18 April 2016 David Satola Why combatting cybercrime matters to the World Bank Demand for a single source of access
More informationDigital Forensics. Module 1 CS 996
Digital Forensics Module 1 CS 996 Instructors Dr. Frederick Scholl Office Hours: 5-6 PM, Mondays E-mail: freds@monarch-info.com Phone 212-869-4458 I am not a lawyer! Kulesh Shanmugasundaram Professor Nasir
More informationMapping to the National Broadband Plan
The National Telecommunications and Information Administration Mapping to the National Broadband Plan 37 th Annual PURC Conference Smart Technology vs. Smart Policy February 3, 2010 1 About NTIA The National
More informationUNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21
National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security
More informationComponents and Considerations in Building an Insider Threat Program
Components and Considerations in Building an Insider Threat Program Carly Huth Insider Threat Researcher, CEWM Carly L. Huth is an insider threat researcher in the Cyber Enterprise and Workforce Management
More informationData Security and Breach Notification Legislative Update: What You Need to Know (SESSION CODE CRM001)
Data Security and Breach Notification Legislative Update: What You Need to Know (SESSION CODE CRM001) Speakers: James T. McIntyre Partner McIntyre & Lemon, PLLC Janice Ochenkowski International Director
More informationISAO SP 4000: Protecting Consumer Privacy in Cybersecurity Information Sharing v1.0
ISAO SP 4000: Protecting Consumer Privacy in Cybersecurity Information Sharing v1.0 July 26, 2017 ISAO SP 4000 Protecting Consumer Privacy in Cybersecurity Information Sharing v1.0 ISAO Standards Organization
More informationSUPERIOR COURT OF THE DISTRICT OF COLUMBIA CRIMINAL DIVISION FELONY BRANCH
SUPERIOR COURT OF THE DISTRICT OF COLUMBIA CRIMINAL DIVISION FELONY BRANCH In the Matter of the Search of www.disruptj20.org ) Special Proceeding No. 17 CSW 3438 that Is Stored at Premises Owned, Maintained,
More informationPrivacy Policy Effective May 25 th 2018
Privacy Policy Effective May 25 th 2018 1. General Information 1.1 This policy ( Privacy Policy ) explains what information Safety Management Systems, 2. Scope Inc. and its subsidiaries ( SMS ), it s brand
More informationH2020 WP Cybersecurity PPP topics
Info Day 2017 SC7 Secure Societies 06-07/03/2017 H2020 WP 2017 - Cybersecurity PPP topics Rafael Tesoro Cybersecurity & Digital Privacy, DG CNECT Cyberspace: a backbone of digital society & economic growth
More informationMYTH vs. REALITY The Revised Cybersecurity Act of 2012, S. 3414
MYTH vs. REALITY The Revised Cybersecurity Act of 2012, S. 3414 The Cybersecurity Act of 2012, S. 3414, has not been the subject of a legislative hearing and has skipped regular order. HSGAC has not marked
More informationU.S. Private-sector Privacy Certification
1 Page 1 of 5 U.S. Private-sector Privacy Certification Outline of the Body of Knowledge for the Certified Information Privacy Professional/United States (CIPP/US ) I. Introduction to the U.S. Privacy
More information