POPULARITY
Podcast: Hack the Plant (LS 35 · TOP 3% what is this?)Episode: Bridging the Cybersecurity Resource GapPub date: 2025-04-08Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationBryson Bort welcomes Sarah Powazek, Program Director of Public Interest Cybersecurity at the UC Berkeley Center for Long-Term Cybersecurity, to discuss the organization's work providing cybersecurity resources for the public, and CyberCAN, a project to connect cities and nonprofits providing critical services. How can cities play a larger role in protecting their communities? What are the biggest cybersecurity challenges facing nonprofits? What innovative solutions are being developed to address the cybersecurity resource gap? “It's never going to be enough to have one federal agency help every single organization in a country. We're just too large,” Sarah said. “I think the solution is to create more infrastructure at the state, local, and regional level.”Join us for this and more on this episode of Hack the Plan[e]t. Hack the Plan[e]t is brought to you by ICS Village and the Institute for Security and Technology.The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Sarah Powazek, the Program Director of Public Interest Cybersecurity at the UC Berkeley Center for Long-Term Cybersecurity, joins Dennis Fisher to talk about her work in setting up Cybersecurity Clinics at high education institutions around the country to help bring knowledge and skills to underserved organizations.
Radio show host, Gary Calligas will have Nick Merrill, research fellow, UC Berkeley Center for Long-Term Cybersecurity on his Saturday, April 27th“The Best of Times Radio Hour” at 9:05 AM on News Radio 710 KEEL to discuss suggestions on the precautions to safeguard oneself from cyber crimes. You can also listen to this radio talk show streaming LIVE on the internet at www.710KEEL.com . and streaming LIVE on 101.7 FM or via the RadioPUP or KEEL app on apple and android devices. For more information, please visit these websites at www.thebestoftimesnews.com and www.hebertstandc.com. This radio show is proudly presented by AARP Louisiana and Hebert's Town and Country of Shreveport featuring – Dodge, Chrysler, Ram, and Jeep vehicles and service.
Deepfakes are already affecting the 2024 election, and the technology is only becoming more convincing. UC Berkeley computer scientist Hany Farid shared the stage with Mina Kim on March 2 at the Night of Ideas, held at the San Francisco Public Library before a live audience. We listen back to their conversation about how easy it to make fake digital content with generative A.I. and the impact that's having on our democracy. Guests: Hany Farid, professor, UC Berkeley - with a joint appointment in electrical engineering & computer sciences and the School of Information. He is also a member of the Berkeley Artificial Intelligence Lab and is a senior faculty advisor for the Center for Long-Term Cybersecurity.
Recorded on October 10, 2022, this “Authors Meet Critics” panel focused on the book Voices in the Code: A Story About People, Their Values, and the Algorithm They Made, by David Robinson, a visiting scholar at Social Science Matrix and a member of the faculty at Apple University. Robinson was joined in conversation by Iason Gabriel, a Staff Research Scientist at DeepMind, and Deirdre Mulligan, Professor in the UC Berkeley School of Information. The panel was co-sponsored by the Berkeley Center for Law & Technology, the Center for Long-Term Cybersecurity, and the Algorithmic Fairness and Opacity Group (AFOG). About the Book Algorithms – rules written into software – shape key moments in our lives: from who gets hired or admitted to a top public school, to who should go to jail or receive scarce public benefits. Today, high stakes software is rarely open to scrutiny, but its code navigates moral questions: Which of a person's traits are fair to consider as part of a job application? Who deserves priority in accessing scarce public resources, whether those are school seats, housing, or medicine? When someone first appears in a courtroom, how should their freedom be weighed against the risks they might pose to others? Policymakers and the public often find algorithms to be complex, opaque and intimidating—and it can be tempting to pretend that hard moral questions have simple technological answers. But that approach leaves technical experts holding the moral microphone, and it stops people who lack technical expertise from making their voices heard. Today, policymakers and scholars are seeking better ways to share the moral decisionmaking within high stakes software — exploring ideas like public participation, transparency, forecasting, and algorithmic audits. But there are few real examples of those techniques in use. In Voices in the Code, scholar David G. Robinson tells the story of how one community built a life-and-death algorithm in a relatively inclusive, accountable way. Between 2004 and 2014, a diverse group of patients, surgeons, clinicians, data scientists, public officials and advocates collaborated and compromised to build a new transplant matching algorithm – a system to offer donated kidneys to particular patients from the U.S. national waiting list. Drawing on interviews with key stakeholders, unpublished archives, and a wide scholarly literature, Robinson shows how this new Kidney Allocation System emerged and evolved over time, as participants gradually built a shared understanding both of what was possible, and of what would be fair. Robinson finds much to criticize, but also much to admire, in this story. It ultimately illustrates both the promise and the limits of participation, transparency, forecasting and auditing of high stakes software. The book's final chapter draws out lessons for the broader struggle to build technology in a democratic and accountable way.
Welcome to Episode 180 of the Killing Podcast with special guest host Nadia Karatsoreos! Nadia has assisted channel partners and customers in building their businesses by adopting best practices and resources that are proven to accelerate success and deliver an exceptional experience to the businesses they serve. A results-oriented professional who puts partners first, Nadia has many years of experience in business development, community and channel relations. Her career in the MSP space started with Level Platforms in 2010 and since then she has held various roles at other vendors like GFI, Datto, NetApp and now Malwarebytes. She has also served on Executive Councils for CompTIA's Managed Services, Cloud and Future Leaders Communities. Nadia has been recognized by CRN as one of the Top Women of the Channel for multiple years (including 2022) and one of the Top 100 People You Don't Know but Should in 2016. Topic 1: Do we need an AI “Accountability” board? “Governments should protect residents from the harms of artificial intelligence and provide means of redress, according to researchers at the University of California, Berkeley. In a white paper from Berkeley's Center for Long-Term Cybersecurity, the researchers said that anyone who has been harmed or damaged from the deployment of AI should have the right to complain to an agency or department that has oversight of that AI-driven system or be able to take legal action." https://www.nextgov.com/emerging-tech/2022/08/make-ai-accountable-adding-redress-tools-researchers-say/376119/ https://cltc.berkeley.edu/wp-content/uploads/2022/08/AIs_Redress_Problem.pdf Topic 2: Quietly Quitting - The Hot New Fad - without an agreed-upon definition Some articles describe Quietly Quitting as taking back work/life balance. Other describe it as doing the bare minimum. We speculate on what it is, and what it might mean. https://finance.yahoo.com/news/quiet-quitting-workplace-trend-just-120000048.html Is QQ a natural consequence of employers' push to get employees back in the office at any cost? https://finance.yahoo.com/news/jpmorgan-ceo-jamie-dimon-rips-062715020.html?guccounter=1 The real question is: can you sincerely create engagement and community without being in the same office location 5 days a week? (Short answer: yes.) Topic 3: Do you have the right to repair . . . your tractor? Wired magazine discusses “jailbreaking” your John Deere. Seriously: This will affect the larger right to repair debate. https://www.wired.com/story/gadget-lab-podcast-562/ Sponsor Memo: Linode Linode – a top Infrastructure as a Service provider has resources specifically for helping MSPs explore the alternative cloud. Discover this growing market: one of the best-kept secrets in building a scalable, thriving, modern Managed Service Provider business. Learn about the cloud provider landscape, improving KPIs, security, and more in Linode's free ebook, The MSP's Guide to Modern Cloud Infrastructure, available now. This resource and more at http://linode.com/mspradio
Welcome back to the Tech Policy Grind Podcast by the Internet Law and Policy Foundry! In this episode, Class 4 Fellow Lama Mohammed interviews Sophia Baik, a Postdoctoral Researcher at the Center for Long-Term Cybersecurity and incoming Assistant Professor at the Department of Communication Studies at the University of San Diego. Episode 15 follows Sophia and Lama in a detailed discussion on the future of the American Data Protection and Privacy Act (ADPPA) — the United States' most comprehensive federal privacy legislation to date — by breaking the bill down, highlighting its significance and the future of the bill when Congress comes back from the August recess. While the rest of the world responds to the growing ubiquitous nature of technology through its enactment of comprehensive privacy bills, the United States continues to fall behind by failing to pass federal privacy legislation. Our experts use this opportunity to dive into why the ADPPA is such a monumental bill, especially as it relates to protecting civil rights and liberties in the digital era. Although the bill is at risk of failing to pass to the House, Sophia provides listeners with recommendations on how to get involved with the privacy movement and how to protect our online data and digital identities. You can connect with Sophia on Twitter (@jeeyunbaik) and read all her amazing published research on her Google Scholar profile. Thanks for listening, and stay tuned for our next episode!
Maxime Lamothe-Brassard, founder of LimaCharlie, has worked for Crowdstrike, Google X and Chronicle Security before starting his own company. This episode goes deep into thinking about your long-term career strategies, so don't miss this one if you're thinking about where you want to go in cybersecurity in two, five or even 10 years from now. – Start learning cybersecurity for free: https://www.infosecinstitute.com/free – View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast0:00 - Intro 2:56 - First getting into cybersecurity 6:46 - Working in Canada's national defense9:33 - Learning on the job10:39 - Security practices in government versus private sector13:50 - Average day at LimaCharlie16:40 - Career journey19:25 - Skills picked up at each position 23:57 - How is time length changing? 27:53 - Security tools and how they could be31:34 - Where do security tool kits fail? 34:04 - Current state of practice and study37:10 - Advice for cybersecurity students in 202238:21 - More about LimaCharlie39:50 - Learn more about LImaCharlie or Maxime40:08 - OutroAbout InfosecInfosec believes knowledge is power when fighting cybercrime. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and privacy training to stay cyber-safe at work and home. It's our mission to equip all organizations and individuals with the know-how and confidence to outsmart cybercrime. Learn more at infosecinstitute.com.
This episode features a return guest to the #BruteCast, and if you joined us last summer for our wargaming panel, you've seen some of his work. Dr. Andrew Reddie is an assistant professor of practice at the University of California, Berkeley's School of Information and senior engineer at Sandia National Laboratories where he works on projects related to cybersecurity, nuclear weapons policy, wargaming, and emerging military technologies. Andrew is currently a Bridging the Gap New Era fellow, Hans J. Morgenthau fellow at Notre Dame University, a non-resident fellow at the Brute Krulak Center at Marine Corps University, and research director at the Center for Long-Term Cybersecurity. His work has appeared in Science, the Journal of Cyber Policy, and the Bulletin of the Atomic Scientists among other outlets and has been variously supported by the Carnegie Corporation of New York, MacArthur Foundation, and the U.S. Department of Energy's Nuclear Science and Security Consortium. So, on our wargaming panel you got a taste of his work; this episode is a deep dive, in his discussion on From Art to Science: Analytical Wargaming and Behavioral Research. Intro/outro music is "Evolution" from BenSound.com (https://www.bensound.com) Follow the Krulak Center: Facebook: https://www.facebook.com/thekrulakcenter Instagram: https://www.instagram.com/thekrulakcenter/ Twitter: @TheKrulakCenter YouTube: https://www.youtube.com/channel/UCcIYZ84VMuP8bDw0T9K8S3g LinkedIn: https://www.linkedin.com/company/brute-krulak-center-for-innovation-and-future-warfare Krulak Center homepage on The Landing: https://unum.nsin.us/kcic
In this episode, Nick Merrill, a research fellow at the UC Berkeley Center for Long-Term Cybersecurity, makes a cybersecurity case for nationalizing major CDNs such as Cloudflare, issues some pretty stark warnings about the dangers of machine learning, and digs into why stereotypical images of hackers in hoodies doesn't help anyone. His viewpoints are sobering if not controversial and worth listening to for anyone who cares about the future of the global internet. ---------Why you should listen:* Get a fresh perspective on some of the biggest risks to the global web: unchecked algorithmic bias, the risk of attacks on massive CDNs, and the growing internet fragmentation.* Consider some of the boldest ideas from one of the sharpest thinkers when it comes to how policymakers can make fundamental changes to protect the internet.* Hear Nick's take on why art matters in cybersecurity -- and why stereotypical images of hackers in hoodies harm the public's perceptions of information security. * Learn more about Fairness, Accountability and Transparency in Machine Learning and the growing movement to look more critically at the hidden algorithms that control the internet and much of technology today. * Consider how ransomware takedowns and other large-scale cyberattacks such as Colonial Pipeline erode public trust in technology.* Get a better understanding of why diversity in the cybersecurity industry matters when it comes to identifying real-world threats.---------Key Quotes:* “That power over the internet is like a huge strategic asset for the U.S. It's analogous to controlling global trade.”* “Imagine a Stuxnet level attack on Cloudflare.”* “I would nationalize Cloudflare. I would make it like a national publicly-run utility company.”* “This word ‘hacker' got so diluted. It means different things to different people. And it became this totally useless way for describing what's actually happening in security.” * “The future of cybersecurity … is the future of machine learning.”* “The real risk of ransomware is just that it freaks people out.” ---------Related Links:* Synack.com* https://nickmerrill.substack.com/about* iSchool (Berkeley) Bio* https://www.synack.com/lp/enterprise-security-testing-101* https://cltc.berkeley.edu/* https://daylight.berkeley.edu/* https://www.codedbias.com/* https://www.fatml.org/
This week, the AEI Podcast Channel features the latest episode of https://www.aei.org/tag/explain-to-shane-podcast/ (Explain to Shane). You can find Explain to Shane on https://podcasts.apple.com/us/podcast/explain-to-shane/id1523693011 (Apple Podcasts), https://open.spotify.com/show/3ZPhP6FBGDVblkzR3hJzz3?si=9135ca93bd094f45 (Spotify) or wherever you get your podcasts. The potential for a fragmented, decentralized global internet (or “splinternet”) is a concern on many levels. Two aspects of internet governance are at play here: the technical aspects of connectivity (or lack thereof), and content delivery — in essence, what material is permitted, censored, or filtered. As China, Russia, and authoritarian-leaning regimes advance top-down visions of the internet that reflect their national interests, will the internet fragment further? And what would moving away from the status quo of a free, open internet mean for global cybersecurity? To help make sense of these complex questions, https://www.aei.org/profile/shane-tews/ (Shane) is joined by https://cltc.berkeley.edu/about-us/researchers/nick-merrill/ (Nick Merrill), director of the https://daylight.berkeley.edu/ (Daylight Security Research Lab) at the University of California, Berkeley's https://cltc.berkeley.edu/ (Center for Long-Term Cybersecurity). In addition to recent national news appearances, Nick's work includes https://cltc.berkeley.edu/internet-atlas/ (The Internet Atlas) — a visual indicator of the global internet's structural risks. He joins the podcast to discuss how individual countries' internet governance decisions shape user experiences and the global cybersecurity landscape.
The potential for a fragmented, decentralized global internet (or “splinternet”) is a concern on many levels. Two aspects of internet governance are at play here: the technical aspects of connectivity (or lack thereof), and content delivery — in essence, what material is permitted, censored, or filtered. As China, Russia, and authoritarian-leaning regimes advance top-down visions of the internet that reflect their national interests, will the internet fragment further? And what would moving away from the status quo of a free, open internet mean for global cybersecurity? To help make sense of these complex questions, https://www.aei.org/profile/shane-tews/ (Shane) is joined by https://cltc.berkeley.edu/about-us/researchers/nick-merrill/ (Nick Merrill), director of the https://daylight.berkeley.edu/ (Daylight Security Research Lab) at the University of California, Berkeley's https://cltc.berkeley.edu/ (Center for Long-Term Cybersecurity). In addition to recent national news appearances, Nick's work includes https://cltc.berkeley.edu/internet-atlas/ (The Internet Atlas) — a visual indicator of the global internet's structural risks. He joins the podcast to discuss how individual countries' internet governance decisions shape user experiences and the global cybersecurity landscape.
Recorded on February 11, 2021, this "Authors Meet Critics" panel discussion, features Professor Steven Weber, a political scientist and professor in the UC Berkeley School of Information, discussing his book, "Bloc by Bloc: How to Build a Global Enterprise for the New Regional Order," together with Vinod K. Aggarwal, Professor of Political Science, and Homa Bahrami, Senior Lecturer in the Haas School of Business. The panel was introduced by Marion Fourcade, Director of Matrix, and moderated by AnnaLee Saxenian, Professor in the UC Berkeley School of Information. "Bloc by Bloc" puts forward a compelling model for global organization that integrates modern developments in technology and governance. Weber argues that the global political economy is decomposing into regional systems that are more densely linked internally and much more loosely linked to each other. But the new regions are not defined by familiar physical boundaries like mountains and oceans. They are defined by technology rules and standards, which means we need to re-envision a region as a logical not physical space, with no need for geographic contiguity. The panel was presented by the University of California, Berkeley's Social Science Matrix (https://matrix.berkeley.edu) and the Center for Long-Term Cybersecurity (https://cltc.berkeley.edu).
Dave reviews an essay from top US officials on persistent engagement as US cyber doctrine, Ben describes the potential implications of a ruling on geofencing, and later in the show our conversation with Sean Brooks, Director of the Center for Long-Term Cybersecurity’s Citizen Clinic program on his recent report, "Digital Safety Technical Assistance at Scale." While this show covers legal topics, and Ben is a lawyer, the views expressed do not constitute legal advice. For official legal advice on any of the topics we cover, please contact your attorney. Links to stories: Orin Kerr via Twitter How to Compete in Cyberspace: Cyber Command’s New Approach Got a question you'd like us to answer on our show? You can send your audio file to caveat@thecyberwire.com or simply leave us a message at (410) 618-3720. Hope to hear from you. Thanks to our sponsor, KnowBe4.
Open Source Researchers of Color (OSROC), a collective of open-source researchers and investigators, recently published a guide to help protestors protect themselves against police surveillance both online and offline. Their guide includes tips on how to communicate safely before and during protests, how to evade facial recognition technology, and how to responsibly post or preserve photos and videos. Access the Protestor Privacy Guide here: https://docs.google.com/document/d/12On3cg4figX2arDOl3ymDGOyBqbtpB1bNVh7maCurRU/edit Read more about the project here: https://citizenevidence.org/2020/06/03/protecting-protester-privacy-against-police-surveillance/ Shakiba Mashayekhi is a member of OSROC and has previously worked as a Project Manager at UC Berkeley’s Human Rights Investigations Lab. @shxiba Leenah Bassouni previously worked as an open source investigator at the Human Rights Investigations Lab at UC Berkeley and is currently a postgraduate student in MA Human Rights Law at SOAS. @diasporaleenah Rachael Cornejo previously worked as an open source investigator at the Human Rights Investigations Lab at UC Berkeley and also works at the Center for Long-Term Cybersecurity. @RachaelCornejo
Meet Ann Cleaveland, the Executive Director of the Center for Long-Term Cybersecurity, a research and collaboration think tank housed within the University of California, Berkeley School of Information. Anne will tell us about the work that the CLTC is doing, why "Long-Term" is in the name, and introduce us to their recent joint study with Booz Allen that researched "Considerations for Effective Oversight of Cyber Risk" based on interviews of a cross-section of board level positions. Visit https://www.securityweekly.com/scw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/SCWEpisode29
Meet Ann Cleaveland, the Executive Director of the Center for Long-Term Cybersecurity, a research and collaboration think tank housed within the University of California, Berkeley School of Information. Anne will tell us about the work that the CLTC is doing, why "Long-Term" is in the name, and introduce us to their recent joint study with Booz Allen that researched "Considerations for Effective Oversight of Cyber Risk" based on interviews of a cross-section of board level positions. Visit https://www.securityweekly.com/scw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/SCWEpisode29
This week, we welcome Ann Cleaveland, the Executive Director of the Center for Long-Term Cybersecurity, a research and collaboration think tank housed within the University of California, Berkeley School of Information! We have the pleasure of having Ann for the entire show today in this two part interview! Show Notes: https://wiki.securityweekly.com/SCWEpisode29 Visit https://www.securityweekly.com/scw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, we welcome Ann Cleaveland, the Executive Director of the Center for Long-Term Cybersecurity, a research and collaboration think tank housed within the University of California, Berkeley School of Information! We have the pleasure of having Ann for the entire show today in this two part interview! Show Notes: https://wiki.securityweekly.com/SCWEpisode29 Visit https://www.securityweekly.com/scw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
In breaking news from 1995, the Washington Post takes advantage of a leaked CIA history paper to retell the remarkable tale of Crypto AG, a purveyor of encryption products to dozens of governments – and allegedly a wholly controlled subsidiary of US and German intelligence. Nick Weaver, Paul Rosenzweig, and I are astonished at the derring-do and unapologetic enthusiasm for intelligence collection. I mean, really: The Pope? This week's interview is with Jonathan Reiber, a writer and strategist in Oakland, California, and former Chief Strategy Officer for Cyber Policy and Speechwriter at the Department of Defense, currently senior advisor at Technology for Global Security and visiting scholar at the UC Berkeley Center for Long-Term Cybersecurity. His recent report offers a candid view of strained relations between Silicon Valley and the Pentagon. The interview explores the reasons for that strain, the importance of bridging the gap and how that can best be done. Nick reports that four PLA members have been indicted over the Equifax breach. He speculates that the US government is sending a message by disclosing a photo of one soldier that appears to have been taken by his own webcam. Paul and I note that China's motivation for the hack was very likely the assembly of records on Americans not dissimilar to the records we know the Chinese keep on Uighurs – which are extraordinarily detailed and surprisingly artisanal. The arrest of a Bitcoin mixer allows Nick to explain how Bitcoin mixing services work and why they're illegal. Paul lays out the potentially serious impact of Amazon's lawsuit to stop a $10 billion Microsoft-DOD cloud contract. We note that Amazon wants to take testimony from President Trump. Thanks to his Twitter habit, we conclude, that's not out of the question. I preview my remarks at a February 19 Justice Department workshops on Section 230. I will reprise my article in Lawfare and the encryption debate with Nick Weaver that inspired it. And I hope to dig as well into the question whether Section 230 provides too much protection for Silicon Valley's censors. Speaking of which, Jeff Bezos's company has joined the censors but won't tell us which books it's suppressing. Nick and I give a favorable review to CISA's new #Protect2020 election strategy. We search for deeper meaning in the Internet Assigned Numbers Authority's (IANA's) failure to complete its Domain Name System Security Extensions (DNSSEC) root key signing ceremony because of… a physical safe. And we all take a moment to mock the latest vote-by-phone snake-oil app seller, Voatz. Download the 300th Episode (mp3). You can subscribe to The Cyberlaw Podcast using iTunes, Google Play, Spotify, Pocket Casts, or our RSS feed! As always, The Cyberlaw Podcast is open to feedback. Be sure to engage with @stewartbaker on Twitter. Send your questions, comments, and suggestions for topics or interviewees to CyberlawPodcast@steptoe.com. Remember: If your suggested guest appears on the show, we will send you a highly coveted Cyberlaw Podcast mug! The views expressed in this podcast are those of the speakers and do not reflect the opinions of the firm.
How can scenario planning and stories help leaders to think about the future, plan for it, and invest to mitigate risk? In this episode Jonathan and DJ talk with Jesse Goldhammer, Managing Director of Deloitte’s West Coast Cybersecurity practice and one of the world’s leading scenario thinkers, about the role of scenarios and futures thinking in cybersecurity and national security planning. Scenario planning began as a practice in the 1970s with Royal Dutch Shell following the Organization of Petroleum Exporting Companies (OPEC) crisis that caught oil companies off-guard. After the market was disrupted, Shell began to invest in scenarios to get ahead of future risks -- and companies and governments have adopted the practice ever since, using scenarios to think about everything from technology adoption to cybersecurity to the future of work to the nature of warfare. Additional Reading Peter Schwartz, The Art of the Long View: Planning for the Future in an Uncertain World, Crown Business Report, 1996, https://www.amazon.com/Art-Long-View-Planning-Uncertain/dp/0385267320 Jesse Goldhammer, The Headless Republic: Sacrificial Violence in Modern French Thought, Cornell University Press, 2005, http://www.cornellpress.cornell.edu/book/?GCOI=80140100618060 UC Berkeley Center for Long-Term Cybersecurity, Cybersecurity Futures 2025, spring, 2019, https://cltc.berkeley.edu/scenarios2025/
All our RSA Conference coverage, including these chats on the road, is made possible by the generosity of our sponsors. We’d like to thank edgescan, Bugcrowd, STEALTHbits, Devo, Onapsis, and Nintex for their support and encourage you to have a look at their directory listing on ITSPmagazine to see how they can help you with your risk, security and compliance programs. Edgescan: www.itspmagazine.com/company-directory/edgescan Bugcrowd: www.itspmagazine.com/company-directory/bugcrowd STEALTHbits: www.itspmagazine.com/company-directory/stealthbits Devo: www.itspmagazine.com/company-directory/devo Onapsis: www.itspmagazine.com/company-directory/onapsis Nintex: www.itspmagazine.com/company-directory/nintex This Podcast is to introduce a session called: Cybersecurity Futures 2025 Our guests are: Dawn Thomas and Alan Cohn Your hosts are: Sean Martin and Marco Ciappelli What is this presentation about? Well let’s start with something we should all know by now: Cybersecurity is a global issue. How could it be otherwise considering that technology has connected all of us? Literally connected. It is not just a matter of communication between people far away or making distances much shorter; we are talking about connecting all of us in a way that we would not have thought possible a few decades ago. Technology is somehow part of almost everything we do nowadays, and there is no going back. Sure it is nice to be able to unplug some of our devices here and there, but that is not stopping the future from happening. Despite what some people like to think, for the most part, we do not live in little, or big, bubbles anymore, and even when we consider our homes, towns or countries to be unique, independent or even isolated from the rest of the world, we are still very much connected with each other. The future is a globalized world of technology all connected together, and denying it or ignoring it is quite dangerous. It is an exciting time to be alive with so many incredible scientific and technological advancements in every area of our lives, with states interacting together and cultures mixing in a global boundary-less cyberspace. It is also a dangerous time to be alive in this new technological era where cybersecurity issues encompass every area of our lives and affect geopolitical dynamics, and the way societies evolve. The decisions we are making today about technology interacting with humans are going to affect our society in 2025 and way beyond that time. It is now that we must force ourselves to think about fundamental philosophical questions and come up with good answers and courses of action, because those, or the lack of those, are already affecting us now and will affect us even more in our future. To predict how this future may look, in 2016 The World Economic Forum Global Future Council on Cybersecurity and the UC Berkeley Center for Long-Term Cybersecurity began a collaboration to develop a set of future-looking cybersecurity scenarios. These scenarios are very diverse and, as they may appear like a Sci-Fi movie script, contain elements that exist, or are developing, in our present society. By opening the conversations about technology outside of the technology field, using a multidisciplinary approach, and making the stage the place where these conversations happen, the whole world — instead of just individual nations — might actually succeed in addressing this issue before it is too late. 2025 is not that far away. As far as I am concerned, the future is today because it is today where we shape it. So listen up and if you are at RSA Conference in San Francisco join this engaging and interactive presentation that will take place on March 6, 2019, | 1:30 PM – 2:20 PM | Moscone South #301 But now it is time to listen up. Enjoy. For more Chats on the Road to RSA Conference 2019, please visit: https://www.itspmagazine.com/itsp-chronicles/chats-on-the-road-to-rsa-conference-2019-san-francisco
Bio Betsy Cooper (@BetsOnTech) is the founding Director of the Aspen Tech Policy Hub. A cybersecurity expert, Ms. Cooper joined Aspen’s Cybersecurity & Technology Program after serving as the Executive Director of the Berkeley Center for Long-Term Cybersecurity at the University of California, Berkeley. Previously, she served at the U.S. Department of Homeland Security as an attorney advisor to the Deputy General Counsel and as a policy counselor in the Office of Policy. She has worked for over a decade in homeland security consulting, managing projects for Atlantic Philanthropies in Dublin, the Prime Minister’s Strategy Unit in London, and the World Bank, and other organizations. In addition, Ms. Cooper has clerked for Berkeley Law professor and Judge William Fletcher on the Ninth Circuit Court of Appeals. She completed a postdoctoral fellowship at Stanford’s Center for International Security and Cooperation (where she currently is a nonresident affiliate), as well as a Yale Public Interest Fellowship. Ms. Cooper has written more than twenty manuscripts and articles on U.S. and European homeland security policy. She is also a Senior Advisor at Albright Stonebridge Group. Ms. Cooper earned a J.D. from Yale University, a D.Phil. in Politics from Oxford University, an M.Sc. in Forced Migration from Oxford University, and a B.A. in Industrial and Labor Relations from Cornell University. She speaks advanced French. She is based in the San Francisco Bay Area. Resources Aspen Tech Policy Hub Aspen Tech Policy Hub Fellowship Application News Roundup Coates tells Senate committee that Russia and China are working together to undermine the 2020 election In his annual threat assessment report, Director of National Intelligence Dan Coates told the Senate intelligence committee that Russia and China will try and interfere with the 2020 presidential election. The report lists social media threats as second on a list of several threats to U.S. national security. DC Circuit Appeals panel hears net neutrality oral arguments A three-judge panel of the DC Circuit Court of Appeals heard oral arguments from the government and consumer advocates last week as consumer advocates’ lawsuit against the FCC for repealing the 2015 open internet rules presses on. Two of the judges—Particia Millett and Robert Wilkins—both Obama appointees—seemed to side with the consumer advocates as the FCC struggled to persuade the court that the agency had the authority to reclassify broadband as an information service. Report: FamilyTreeDNA works with the FBI BuzzFeed reported that popular home DNA testing company Family Tree DNA is working with the FBI, allowing agents to access its database to investigate violent crimes. Privacy advocates object to the partnership. But others say that as more people sign up for genetic tests, the data has become increasingly valuable to solve cold cases, with the arrest last year of the suspected Golden State Killer being a prime example. Feds charge second Chinese Apple car worker with data theft The feds have charged a second Apple engineer with stealing company trade secrets with a plan to bring them back to China. Another Apple employee spotted Jizhong Chen taking snapshots of his workspace with a wide angle lens even though he was working under an NDA. Apparently Chen had some 2,000 files on his hard drive, including manuals and schematics. He says he was going to China to see family. But the feds allege he was actually planning to bring the files back to a Chinese car manufacturer he’d applied for a job with. It’s the second Apple employee charged with stealing trade secrets from the company’s self-driving car unit. Apple reports Group FaceTime bug Apple reported a bug with Group FaceTime that allowed callers to hear the people they were calling before they answered. The company took down Group Facetime when it learned of the bug, apologized, and announced that it would release a fix for the problem this week. Facebook hires three leading privacy critics from Access Now, EFF, and OTI The Information reports that Facebook has hired three leading privacy critics from Access Now, EFF, and OTI as the company tries to deal with the onslaught of backlash around its privacy woes. Robyn Greene, Nathan White, and Nate Cardozo have been critical of Facebook and all joined the company within the last month. Mignon Clyburn to advise TMobile/Sprint TMobile and Sprint have tapped former FCC Chair and Commissioner Mignon Clyburn to help advise them on their $26 billion merger. Clyburn said in a statement that she will be advising the two companies as a continuation of her work to ensure vulnerable populations have affordable access to 5G.
We follow up on critical feedback of last week's show. Dave describes how online extortionists have pivoted from sex to explosives. We've got an auto-responding catch of the day from one of Joe's colleagues. Guest is Sean Brooks, Director of the Citizen Clinic and a Research Fellow at the Center for Long-Term Cybersecurity at UC Berkeley. He shares their research into online attacks of politically vulnerable organizations. From our EV certs follow-up: https://www.troyhunt.com/extended-validation-certificates-are-dead/ https://casecurity.org/2018/12/06/ca-security-council-casc-2019-predictions-the-good-the-bad-and-the-ugly/ Bomb threat catch of the day: https://www.zdnet.com/article/extortion-emails-carrying-bomb-threats-cause-panic-across-the-us/ Sean Brooks interview: Report: http://cltc.berkeley.edu/defendingpvos/ Clinic: http://cltc.berkeley.edu/citizen-clinic/ Thanks to our sponsors at KnowBe4.
The world in 2018 is interconnected. Cybersecurity threats are widespread — even at the 2018 Winter Olympics. As we recorded this episode in January, our guest warned us of potential cybersecurity attacks. And just last week organizers in Pyeongchang confirmed that a cyberattack crippled important IT systems, bringing down display monitors, Wi-Fi and the Olympics website just ahead of the opening ceremony. Government, private and corporate data is constantly under attack from bad actors like this. That’s where cybersecurity comes in. In this episode we are joined by Dr. Betsy Cooper, the Executive Director of the Berkeley Center for Long-Term Cybersecurity. Dr. Cooper breaks down “cybersecurity”: defining and assessing it, the risks it carries, and the future of cybersecurity.
In our 139th episode of the Steptoe Cyberlaw Podcast, Stewart Baker, Alan Cohn, and Katie Cassel discuss: Personnel is Policy in new Trump Administration: Will the head of NSA be fired or promoted? Mike Rogers at the center of the storm; President-elect Donald Trump's surprise decision Friday to nominate Rep. Mike Pompeo to run the CIA; Sen. Jeff Sessions pick "could be a sign that the Trump administration may take a tougher approach with the nation's tech industry; Personnel is Policy in the Senate: In one of the biggest shake-ups, Sen. Dianne Feinstein will leave her spot as the No. 1 Democrat on the Intelligence Committee; An advertising industry initiative has launched an anti-malware certification program; DHS releases recommendations for protecting internet-connected devices; NIST issues small business guidance; Two for the price of one: Secret “backdoor” software uncovered in Androids for sending users’ personal data to China; A piece of Chinese firmware for cheap Android phones has been found that allows unsecured firmware updates; Kaspersky whines about Microsoft Defender; Rule 41 override still dead as General Franco. Our interview is with Steven Weber and Betsy Cooper from the UC Berkeley Center for Long Term Cybersecurity. The views expressed in this podcast are those of the speakers and do not reflect the opinions of the firm.
What will be the state of digital security in five and 10 years? That's the question Steve Weber, director of the University of California - Berkeley's Center for Long-Term Cybersecurity, and his team tried to tackle in a major research project. Weber joins The Cybersecurity Podcast to talk about the maybe not-so-far out possibilities that people may soon start to see insecurity as the status quo on the Web – and that with the spread of the Internet of Things even their emotions could soon be hacked. Podcast cohosts Peter Singer from New America and Sara Sorcher from Passcode, The Christian Science Monitor's section on digital security and privacy, discuss the cybersecurity highlight from their own work this past month. Singer explores the relatively unknown threats to the country's ports and ships – while Sorcher explains the sometimes-controversial process of deciding exactly how much a security flaw is worth in cash.
03b28161-3e13-4a93-8b06-1d6eb46e86ee Power, Politics, and Preventive Action nohttps://cfr-org-prod-media-files.s3.amazonaws.com/audio-files/2016%2011-22%20Cooper%20and%20Weber.mp3