"Navigating Cybersecurity and Public Policy Six Key Issues," Herbert Lin
In this emerging era of truly pervasive computing, cybersecurity is a hot public policy topic. Numerous policy proposals have been advanced to address emerging cyber threats directed at governments and private businesses and vulnerabilities affecting consumer data and individual privacy. These policy proposals have far-reaching implications for the economy, innovation, Internet governance, supply chains for information and communications technologies, and global security.
Herb Lin of the National Research Council will discuss the findings of a recent National Research Council report on cybersecurity and the 6 key things to know about cybersecurity as it intersects with public policy. The report, At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues, identifies leading technical and nontechnical approaches to enhancing cybersecurity that are important for making informed public policy choices. It provides an overview of the cybersecurity policy agenda of the past two decades, the growing cybersecurity threat spectrum, and the anatomy of vulnerabilities and adversarial activities in cyberspace. It concludes that tradeoffs are inevitable and need to be accepted within political and policymaking processes.
How can we better understand and implement public policies to fight cybersecurity threats while preserving innovation, cutting-edge security research, civil liberties, and individual privacy? Join us for this overview and engaging discussion of important technical, legal, and policy issues.
Duration: 30 minutes, including 10 minutes of audience Q&A
Presenter: Herbert Lin, Chief Scientist, Computer Science and Telecommunications Board, National Research Council, National Academies
Herbert Lin is Chief Scientist at the Computer Science and Telecommunications Board, National Research Council of the National Academies, where he has been study director of major projects on public policy and information technology. His projects also have included a number of studies related to cybersecurity: At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues (2014); Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options (2010); Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities (2009); Toward a Safer and More Secure Cyberspace (2007); Engaging Privacy and Information Technology in a Digital Age (2007); Realizing the Potential of C4I: Fundamental Challenges (1999); and Cryptography's Role in Securing the Information Society (1996). Prior to his NRC service, he was a professional staff member and staff scientist for the House Armed Services Committee (1986-1990), where his portfolio included defense policy and arms control issues. He received his Ph.D. in physics from MIT.
Moderator: Jeremy Epstein, Lead Program Officer, National Science Foundation Secure and Trustworthy Cyberspace (SaTC) program; ACM Senior Member; ACM U.S. Public Policy Council
Jeremy Epstein is Lead Program Officer for the National Science Foundation Secure and Trustworthy Cyberspace (SaTC) program, NSF's flagship cybersecurity research program. Jeremy is on loan from SRI International, where his research areas are voting system security and software assurance. He is the Chair of the Voting Committee within the ACM U.S. Public Policy Council (usacm.acm.org). He's also Associate Editor in Chief of IEEE Security & Privacy magazine (www.computer.org/security), and founder of the Scholarships for Women Studying Information Security (www.swsis.org).
Видео "Navigating Cybersecurity and Public Policy Six Key Issues," Herbert Lin канала Association for Computing Machinery (ACM)
Herb Lin of the National Research Council will discuss the findings of a recent National Research Council report on cybersecurity and the 6 key things to know about cybersecurity as it intersects with public policy. The report, At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues, identifies leading technical and nontechnical approaches to enhancing cybersecurity that are important for making informed public policy choices. It provides an overview of the cybersecurity policy agenda of the past two decades, the growing cybersecurity threat spectrum, and the anatomy of vulnerabilities and adversarial activities in cyberspace. It concludes that tradeoffs are inevitable and need to be accepted within political and policymaking processes.
How can we better understand and implement public policies to fight cybersecurity threats while preserving innovation, cutting-edge security research, civil liberties, and individual privacy? Join us for this overview and engaging discussion of important technical, legal, and policy issues.
Duration: 30 minutes, including 10 minutes of audience Q&A
Presenter: Herbert Lin, Chief Scientist, Computer Science and Telecommunications Board, National Research Council, National Academies
Herbert Lin is Chief Scientist at the Computer Science and Telecommunications Board, National Research Council of the National Academies, where he has been study director of major projects on public policy and information technology. His projects also have included a number of studies related to cybersecurity: At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues (2014); Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options (2010); Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities (2009); Toward a Safer and More Secure Cyberspace (2007); Engaging Privacy and Information Technology in a Digital Age (2007); Realizing the Potential of C4I: Fundamental Challenges (1999); and Cryptography's Role in Securing the Information Society (1996). Prior to his NRC service, he was a professional staff member and staff scientist for the House Armed Services Committee (1986-1990), where his portfolio included defense policy and arms control issues. He received his Ph.D. in physics from MIT.
Moderator: Jeremy Epstein, Lead Program Officer, National Science Foundation Secure and Trustworthy Cyberspace (SaTC) program; ACM Senior Member; ACM U.S. Public Policy Council
Jeremy Epstein is Lead Program Officer for the National Science Foundation Secure and Trustworthy Cyberspace (SaTC) program, NSF's flagship cybersecurity research program. Jeremy is on loan from SRI International, where his research areas are voting system security and software assurance. He is the Chair of the Voting Committee within the ACM U.S. Public Policy Council (usacm.acm.org). He's also Associate Editor in Chief of IEEE Security & Privacy magazine (www.computer.org/security), and founder of the Scholarships for Women Studying Information Security (www.swsis.org).
Видео "Navigating Cybersecurity and Public Policy Six Key Issues," Herbert Lin канала Association for Computing Machinery (ACM)
Показать
Комментарии отсутствуют
Информация о видео
24 июля 2014 г. 2:46:33
00:34:26
Другие видео канала
![CACM Dec. 2018 - Point Counterpoint on AI Regulation](https://i.ytimg.com/vi/B6kVwjChSa8/default.jpg)
![Welcome ACM Associate Editors](https://i.ytimg.com/vi/_svVVsJeCS0/default.jpg)
![CACM Mar. 2017 - Computational Support for Academic Peer Review](https://i.ytimg.com/vi/_aMVUTtRafU/default.jpg)
![CACM Mar. 2016 - Hopes, Fears, and Software Obfuscation](https://i.ytimg.com/vi/-M_ScOjopHs/default.jpg)
![April 2022 CACM: Digital Twins and Artificial Intelligence](https://i.ytimg.com/vi/SUz-dA40kWE/default.jpg)
![KDD 2020: Lecture Style Tutorials: Deep Graph Learning Foundations, Advances and Applications](https://i.ytimg.com/vi/cK1hSxrf01o/default.jpg)
![Visual Data Analysis: How? When? Why?](https://i.ytimg.com/vi/QgHZ9Kdpzjk/default.jpg)
![System Methodology—Holistic Performance Analysis on Modern Systems](https://i.ytimg.com/vi/eO94l0aGLCA/default.jpg)
![KDD 2020: Hands-onTutorials: Deep Learning for Search and Recommender Systems in Practice-Part 5](https://i.ytimg.com/vi/FYil7LtpyN0/default.jpg)
![CACM Nov. 2019 - DeepXplore: Automated Whitebox Testing of Deep Learning Systems](https://i.ytimg.com/vi/4qNK2zUvlvw/default.jpg)
!["Fairness in Machine Learning" with Tulsee Doshi](https://i.ytimg.com/vi/_-OMyAn7LWM/default.jpg)
![Andrew File System Developers Receive 2016 ACM Software System Award](https://i.ytimg.com/vi/02UOfE1ePfc/default.jpg)
![September 2021 CACM: The Future Is Big Graphs](https://i.ytimg.com/vi/Uqs04DEqM0s/default.jpg)
![Learning from Data: The Two Cultures](https://i.ytimg.com/vi/JJnTLNoNTME/default.jpg)
![March 2022 CACM: Automating Data Science](https://i.ytimg.com/vi/gmfSWYXUwQQ/default.jpg)
![CACM August 2016 - Ur/Web: A Simple Model for Programming the Web](https://i.ytimg.com/vi/J3XI6-aZZXk/default.jpg)
![CACM July 2017 - Reimagining the Avatar Dream: Modeling Social Identity in Digital Media](https://i.ytimg.com/vi/wc7mS9RMvY4/default.jpg)
![ReForm: Integrating Physical and Digital Design through Bidirectional Fabrication](https://i.ytimg.com/vi/72p5y9neVxo/default.jpg)
![Running Linux Apps on Windows How and Why?](https://i.ytimg.com/vi/FxdvymZid8s/default.jpg)
![ACM Software Systems Award 2012](https://i.ytimg.com/vi/Tgxe3LXZ4o4/default.jpg)
![CACM July 2018 - Making Machine Learning Robust Against Adversarial Inputs](https://i.ytimg.com/vi/OKkmZunB78Y/default.jpg)