Recent Old Events

Records 48 / 78

Cybersecurity Regulations and Power Grid Resilience

May 24, 2016

Abstract: The NERC-CIP standards are the only federally mandated cybersecurity standards for critical infrastructure in the United States.  Targeting the electric system, the standards have been...

CISAC Honors Students Prize-Winning Presentations

May 18, 2016

- To ensure an accurate headcount for lunch, RSVPs are required -  

Cybersecurity Governance: Contested Norms, Organizational Challenges and Pressing Policy Issues in Software Vulnerability Disclosure

March 30, 2016

Abstract: The disclosure of software vulnerabilities has stirred controversy for decades among security researchers and software vendors, and more recently governments.

Deterrence and Arms Control in Cyberspace

March 22, 2016

Abstract: For four years running now, the Director of National Intelligence’s Worldwide Threat Assessment to Congress has led with cyber threats to national and international security.  Under...

Winning an Innovation War: Managing Risks from Emerging Technologies

March 14, 2016

Abstract: Faster evolving technologies, new peer adversaries, and the increased role of non-government entities changes how we think about decisions to develop and adopt new technology....

Ideology and Cybersecurity: Explaining the Origin and Structure of Civilian Cyber Defense

January 7, 2016

Abstract: Cybersecurity depends heavily on civilian cyber defense, which is decentralized, private, and voluntary.

Intelligence in the Cyber Age: (r)Evolution?

December 3, 2015

- This event is offered as a joint sponsorship with the Hoover Institution -  Abstract: Writing on matters relating to the cyber era dominate government and academia alike.  Much of the focus tends...

Cybersecurity and the Future of U.S. - China Relations

May 20, 2015

 Registration is required.

From "Olympic Games" to the Sony Hack: The Future of Offensive Cyber in Statecraft

May 5, 2015

Abstract: When President Obama approved the "Olympic Games'' cyber attacks on Iran, he told aides that he was worried about what would happen when nations around the world began to use destructive...

Privacy and Security: Can We Achieve Both with Cryptography?

May 4, 2015

Abstract: In many real-world settings, the need for security is often at odds with the desire to protect user privacy.

Who Controls A Computer? A Predictive Theory of Comparative Strength in Computer Security Conflicts

April 27, 2015

Abstract: Any given computer or network runs code from an enormous number of sources, including the producer of the operating system, the hardware, built-in and user-installed applications,...

Rewiring the Pentagon: Charting a New Path on Innovation and Cybersecurity

April 23, 2015

The Freeman Spogli Institute for International Studies, the Center for International Security & Cooperation, and the Hoover Institution are honored to co-sponsor the 2015 Drell Lecture with The...

Bulk Collection of Signal Intelligence: Technical Alternatives

April 20, 2015

Abstract: The first Snowden disclosure was that Verizon was providing daily updates of telephony metadata to the NSA.

Modern Surveillance

March 19, 2015

Abstract: NSA stands for National Security Agency, but the agency is at odds with itself in its security mission.

Thinking about Nuclear and Cyber Conflict: Same Questions, Different Answers

February 9, 2015

Abstract: Senior policy makers often talk as though cyber conflict poses the same kind of existential threat as does nuclear conflict.

Stuxnet and the Age of Digital Warfare

February 2, 2015

Abstract: In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate.

Cybersecurity at the United Nations

January 22, 2015

Abstract: With the development of cyber capabilities by an increasing number of states, policymakers as well as scholars have been calling for the negotiation of a new international treaty to...

Cybersecurity and Military Strategy: The Effectiveness of Attribution as a Deterrence

January 5, 2015

Abstract: The increasing frequency of cyber attacks and technological change have amplified the potential adverse effects of successful, large-scale cyber attacks.

How the Internet Became Untrustworthy

March 17, 2014

About the Topic: The Internet in 2014 is a marvelous communication utility. It provides cheap and fast transfer of information to and from most places on or near the surface of Earth.

Safety and Security in a Transnational Environment

January 23, 2014

Drell Lecture Recording: NA     Drell Lecture Transcript: NA   Speaker's Biography: Vinton G. Cerf has served as vice president and chief Internet evangelist for Google since October 2005.

Measuring NSA Surveillance

December 9, 2013

About the Topic: What do the National Security Agency’s bulk surveillance programs reveal about Americans?  This talk presents ongoing studies of Internet and telephone metadata.  Preliminary...

Cyber Operations: A Look into the 5th Domain

November 11, 2013

About the Topic: Air, sea, land, and space are the traditional domains of military operations. Now, as the Information Age unfolds, cyberspace has become the fifth domain.

Disrupting the Security Landscape

November 5, 2013

About the Topic: The cyber security landscape has seen dramatic changes in recent years with the advent and evolution of new, growing, and ever-present adversaries.