Skip to main content
  • Sections
  • Search

Center for Strategic & International Studies

User menu

  • Subscribe
  • Sign In

Topics

  • Climate Change
  • Cybersecurity and Technology
    • Cybersecurity
    • Data Governance
    • Intellectual Property
    • Intelligence, Surveillance, and Privacy
    • Military Technology
    • Space
    • Technology and Innovation
  • Defense and Security
    • Counterterrorism and Homeland Security
    • Defense Budget
    • Defense Industry, Acquisition, and Innovation
    • Defense Strategy and Capabilities
    • Geopolitics and International Security
    • Long-Term Futures
    • Missile Defense
    • Space
    • Weapons of Mass Destruction Proliferation
  • Economics
    • Asian Economics
    • Global Economic Governance
    • Trade and International Business
  • Energy and Sustainability
    • Energy, Climate Change, and Environmental Impacts
    • Energy and Geopolitics
    • Energy Innovation
    • Energy Markets, Trends, and Outlooks
  • Global Health
    • Family Planning, Maternal and Child Health, and Immunizations
    • Multilateral Institutions
    • Health and Security
    • Infectious Disease
  • Human Rights
    • Building Sustainable and Inclusive Democracy
    • Business and Human Rights
    • Responding to Egregious Human Rights Abuses
    • Civil Society
    • Transitional Justice
    • Human Security
  • International Development
    • Food and Agriculture
    • Governance and Rule of Law
    • Humanitarian Assistance
    • Human Mobility
    • Private Sector Development
    • U.S. Development Policy

Regions

  • Africa
    • North Africa
    • Sub-Saharan Africa
  • Americas
    • Caribbean
    • North America
    • South America
  • Arctic
  • Asia
    • Afghanistan
    • Australia, New Zealand & Pacific
    • China
    • India
    • Japan
    • Korea
    • Pakistan
    • Southeast Asia
  • Europe
    • European Union
    • NATO
    • Post-Soviet Europe
    • Turkey
  • Middle East
    • The Gulf
    • Egypt and the Levant
    • North Africa
  • Russia and Eurasia
    • The South Caucasus
    • Central Asia
    • Post-Soviet Europe
    • Russia

Sections menu

  • Programs
  • Experts
  • Events
  • Analysis
    • Blogs
    • Books
    • Commentary
    • Congressional Testimony
    • Critical Questions
    • Interactive Reports
    • Journals
    • Newsletter
    • Reports
    • Transcript
  • Podcasts
  • iDeas Lab
  • Transcripts
  • Web Projects

Main menu

  • About Us
  • Support CSIS
    • Securing Our Future
CSIS PRESENTS
Past Event
Share
  • LinkedIn
  • Facebook
  • Twitter
  • Email
  • Printfriendly.com

Cyber Disrupt 2017

Wednesday, March 15, 2017 9:00 am - 6:00 pm
CSIS Headquarters

The Center for Strategic and International Studies is hosting Cyber Disrupt 2017, a one-day summit in Washington, D.C. on March 15, 2017.

Cyber Disrupt 2017 is the premier event on cybersecurity in Washington, D.C. The summit will feature keynotes, interactive debates, and panel discussions on strategies, policies, and technology practices for Congress and the Administration that will be disruptive to the current status quo and improve cybersecurity.
 
Speaker Bios for Cyber Disrupt 2017.

Agenda

9:00                 KEYNOTE
NEXT STEPS FOR CYBERSECURITY AFTER A DECADE OF LESSONS LEARNED 
This keynote session will address lessons learned from the last decade, evaluate existing cybersecurity frameworks, and discuss what the new Administration will do on cybersecurity.
 
Introduction
Frances F. Townsend, Executive Vice President, MacAndrews & Forbes Incorporated
 
Keynote
Thomas Bossert, Assistant to the President, Homeland Security and Counterterrorism
 

10:00               LAWFUL HACKING: ACCESS TO DIGITAL EVIDENCE IN THE 21ST CENTURY
New applications and devices are being designed with features that present challenges to traditional investigative techniques used by law enforcement. As a result, other means of gaining access to digital evidence such as expanding law enforcement authorities to hack endpoints have been a topic of much discussion. Experts will weigh the privacy, public safety, and security equities of new proposals to facilitate lawful access to digital evidence.

John Lynch, Chief, Computer Crime and Intellectual Property Section, Criminal Division, U.S. Department of Justice 
Joseph Lorenzo Hall, Chief Technologist, Center for Democracy & Technology
Rajesh De, Partner, Mayer Brown; former General Counsel, National Security Agency
Moderator: Susan Hennessey, Fellow, National Security in Governance Studies and Managing Editor, Lawfare, Brookings Institution

11:00               SHOULD WE WAIT FOR NORMS?

Significant national cybersecurity incidents in the last year reflect a growing willingness by nation-state adversaries to use cyber tools to conduct cybercrime and espionage, threaten personal information and company data, and commit politically coercive cyber acts. Experts will assess the changing international security environment and potential responses to increased hostility in cyberspace.

Christopher Painter, Coordinator for Cyber Issues, U.S. Department of State
James N. Miller, President, Adaptive Strategies LLC; former Under Secretary for Policy, U.S. Department of Defense
Moderator: James A. Lewis, Senior Vice President, CSIS

12:00               LUNCH

                          CSIS will provide lunch to all registered participants.

12:30               Tech talks
The Tech Talks will feature expert remarks on emerging cybersecurity and technology issues. 

12:30 Threats and Opportunities with IoT Security
Matt Hartley, Director, ForeScout Technologies

12:50 Current Threat Landscape
Scott Montgomery, Vice President, Chief Technical Strategist, Intel Security

Moderator: William A. Carter, Associate Director, Technology Policy Program, CSIS


1:15                 keynote panel
FUTURE OF SECURITY & PRIVACY ON THE INTERNET
As Internet of Things devices continue to spread and new technologies like AI and quantum computing become commercially available, how should policymakers and industry leaders adapt to the changing environment for digital security and privacy? 

Nuala O'Connor, President & CEO, Center for Democracy & Technology 
John Launchbury, Director, Information Innovation Office, DARPA
Daniel Weitzner, Founding Director, MIT Internet Policy Research Initiative
Moderator: Denise E. Zheng, Director and Senior Fellow, Technology Policy Program, CSIS

2:15                FROM PREVENTION TO RESPONSE: CYBER CRISIS MANAGEMENT

In recent years, a series of high-profile breaches demonstrated that traditional network defenses alone are not enough to prevent attackers from accessing and exploiting sensitive data. For government agencies and private companies, developing an organization-wide crisis response strategy is just as important as strengthening network defenses. This panel will discuss organizational, technical, and policy approaches to help mitigate and manage major cyber incidents.

Michael Daniel, President, Cyber Threat Alliance; former Cybersecurity Coordinator, Executive Office of the President
Eric Rosenbach, Former Chief of Staff, Office of the Secretary of Defense
Dmitri Alperovitch, Co-founder & CTO, Crowdstrike Inc.
Moderator: Clete Johnson, Senior Fellow (Non-resident), Technology Policy Program, CSIS


3:15                 GAME-CHANGING TECHNOLOGY FOR CYBERSECURITY
Researchers and entrepreneurs are developing novel technologies for monitoring and isolating threats, managing authentication and identity, and controlling data. These TED-style talks will discuss emerging technologies and capabilities that can fundamentally alter the cybersecurity landscape. 

3:15 The Greatest Source for Cyber Threat Intel: You
Ryan Kazanciyan, Chief Security Architect, Tanium

3:35 Extending the Reach of the Cyber Expert
Valecia Maclin, Director, Cybersecurity & Special Missions, Raytheon

3:55 Meet the World's First Automated Cyber Defense Systems
Michael Walker, Program Manager, Information Innovation Office, DARPA

Moderator: William A. Carter, Associate Director, Technology Policy Program, CSIS

4:15                 break

4:30                 INTERACTIVE POLICY DEBATE ​
This debate will follow the Oxford style debate format. Two teams will argue for the Affirmative and Negative of a proposition. After the closing statements, audience members will vote for the team they found the most convincing.  
 
Proposition: U.S. companies should be authorized to hack back against attackers in cyberspace.
 
Affirmative
Stewart Baker, Partner Steptoe & Johnson; former Assistant Secretary for Policy, U.S. Department of Homeland Security; former General Counsel, National Security Agency
Jeremy Rabkin, Professor of Law, George Mason University
 
Negative
Greg Nojeim, Senior Counsel and Director, Freedom, Security, and Technology Project, Center for Democracy & Technology
Jamil Jaffer, Vice President for Strategy & Business Development, IronNet Cybersecurity; former Chief Counsel and Senior Advisor, U.S. Senate Committee on Foreign Relations
 
Moderator
Shane Harris, Senior Writer, National Security, Wall Street Journal
 
5:30                 CLOSING RECEPTION

Event Partners
SponsorSponsorSponsorSponsorSponsorSponsor
Downloads
Speaker Bios
Transcript - Keynote
Contact
Contact Technology Policy Program
Media Queries
Contact H. Andrew Schwartz
Chief Communications Officer
Tel: 202.775.3242

Contact Paige Montfort
Media Relations Coordinator, External Relations
Tel: 202.775.3173
Related
Cybersecurity, Cybersecurity and Technology, Intelligence, Surveillance, and Privacy, Strategic Technologies Program, Technology and Innovation

Featured

Transcript
Cyber Disrupt 2017: Keynote: Next Steps for Cybersecurity After a Decade of Lessons Learned
March 15, 2017

Related Content

On Demand Event
Memorandum Of Agreement Signing -Umass Amherst And National Institute Of Wind Energy, India
September 22, 2021
On Demand Event
Online Event: A Conversation with AFSOC Commander Lt. Gen. Jim Slife
November 23, 2020
Blog Post
First Takes: Our Initial Reactions to USTR Tai’s CSIS Speech on China Policy
By Scott Kennedy, Ilaria Mazzocco, Daniel H. Rosen, Claire Reade, Deborah Seligsohn, Jeannette Chu, John L. Holden
In Trustee China Hand
October 5, 2021
On Demand Event
Online Event: International Security at the Nuclear Nexus (Day 2)
October 22, 2020
On Demand Event
PONI Capstone Conference
May 5, 2021
On Demand Event
Online Event: International Security at the Nuclear Nexus (Day 1)
October 21, 2020
On Demand Event
Consolidating Democracy: A Candid Discussion with Kenyan Deputy President William Ruto
March 4, 2022
On Demand Event
Online Event: Doubling Down on China, Inc.: An Initial Analysis of China’s 14th Five-Year Plan
November 12, 2020
Footer menu
  • Topics
  • Regions
  • Programs
  • Experts
  • Events
  • Analysis
  • Web Projects
  • Podcasts
  • iDeas Lab
  • Transcripts
  • About Us
  • Support Us
Contact CSIS
Email CSIS
Tel: 202.887.0200
Fax: 202.775.3199
Visit CSIS Headquarters
1616 Rhode Island Avenue, NW
Washington, DC 20036
Media Queries
Contact H. Andrew Schwartz
Chief Communications Officer
Tel: 202.775.3242

Contact Paige Montfort
Media Relations Coordinator, External Relations
Tel: 202.775.3173

Daily Updates

Sign up to receive The Evening, a daily brief on the news, events, and people shaping the world of international affairs.

Subscribe to CSIS Newsletters

Follow CSIS
  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
  • Instagram

All content © 2022. All rights reserved.

Legal menu
  • Credits
  • Privacy Policy
  • Reprint Permissions