BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//NYU Center for Cyber Security - ECPv6.14.2//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://cyber.nyu.edu
X-WR-CALDESC:Events for NYU Center for Cyber Security
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20190310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20191103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20200308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20201101T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20190101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201105T220000
DTEND;TZID=America/New_York:20201105T233000
DTSTAMP:20260411T190321
CREATED:20200811T224519Z
LAST-MODIFIED:20201022T223307Z
UID:18126-1604613600-1604619000@cyber.nyu.edu
SUMMARY:Additive Manufacturing Security Workshop Series-Session 4: Cybersecurity in Manufacturing—Threat Models and Solutions
DESCRIPTION:The last session in the AM Security series will look at cybersecurity concerns and solutions for the manufacturing industries. \nConfirmed Panelists: Dimitrios Serpanos\, University of Patras; Christoph Meinel\, Hasso Plattner Institute; Chris Adkins\, Identify3D; and Mark Yampolskiy\, Auburn University \nRegistration Link: https://amsecurityseries4.eventbrite.com \nRecordings of Sessions 1 and 2 are available as follows: \nSession 1: https://www.youtube.com/watch?v=ao5l4w6QTh4 \nSession 2: https://www.youtube.com/watch?v=UnUgvFwrOXo \n 
URL:https://cyber.nyu.edu/event/additive-manufacturing-security-workshop-series-session-4-cybersecurity-in-manufacturing/
CATEGORIES:Workshop
ATTACH;FMTTYPE=image/jpeg:https://cyber.nyu.edu/wp-content/uploads/2020/10/Nov-5-Cybersecurity-in-Manufacturing-Threat-Modeling-and-Solutions-1.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201105
DTEND;VALUE=DATE:20201106
DTSTAMP:20260411T190321
CREATED:20200330T204417Z
LAST-MODIFIED:20201104T161602Z
UID:17255-1604534400-1604620799@cyber.nyu.edu
SUMMARY:CSAW '20-Day 1
DESCRIPTION:The 17th edition of the CSAW Cybersecurity Games and Conferences begins at midnight with a Global Welcome Address from CSAW Global Faculty Director Dr. Ramesh Karri. Faculty directors from CSAW sites in Europe\, Mexico\, and MENA (Middle East/North Africa) will also give welcome addresses at that time. Highlights of the rest of the day’s programs will include: \nA keynote address from Jim Routh\, Head of Enterprise Cyber Security for MassMutual on “Data Science as a Foundation for Cybersecurity” \nThe final installment of the Cybersecurity in Manufacturing series\, this one focused on threat modeling and solutions \nA roundtable discussion with CCS faculty describing their latest research \nThe C2 Security Workshop \nPresentation of the Cyber Journalism Award to NY Times Technology Editor Kashmir Hill \nRound one of the Security Quiz \nThis year’s CSAW will be entirely virtual. A complete list of conference events can be found at https://csaw20.sched.com/. \nTo register\, go to https://csaw2020.vfairs.com/. \n 
URL:https://cyber.nyu.edu/event/csaw-20/
CATEGORIES:Workshop
ATTACH;FMTTYPE=image/png:https://cyber.nyu.edu/wp-content/uploads/2020/08/CSAW20logo.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201002T130000
DTEND;TZID=America/New_York:20201002T143000
DTSTAMP:20260411T190321
CREATED:20200811T223704Z
LAST-MODIFIED:20200929T180809Z
UID:18121-1601643600-1601649000@cyber.nyu.edu
SUMMARY:Additive Manufacturing Security Workshop Series-Session 3: Security in Manufacturing: What Materials Scientists Can Do
DESCRIPTION:The third session in the AM Security series will look at how materials scientists can play an important contributing role in improving the security of manufacturing operations. \nPanelists: Dirk Lehmhus\, IFAM; Eric McDonald\, University of Texas; Jian Yu\, US Army Research Lab; Justin Scott\, JOM \nRegistration Link:  https://amsecurityseries3.eventbrite.com \nRecordings of Sessions 1 and 2 are available as follows: \nSession 1: https://www.youtube.com/watch?v=ao5l4w6QTh4 \nSession 2: https://www.youtube.com/watch?v=UnUgvFwrOXo \n  \n 
URL:https://cyber.nyu.edu/event/additive-manufacturing-security-workshop-series-session-3-security-in-manufacturing-what-materials-scientists-can-do/
CATEGORIES:Workshop
ATTACH;FMTTYPE=image/jpeg:https://cyber.nyu.edu/wp-content/uploads/2020/09/AMsecurity3.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200824T130000
DTEND;TZID=America/New_York:20200824T143000
DTSTAMP:20260411T190321
CREATED:20200731T161134Z
LAST-MODIFIED:20250428T204141Z
UID:18069-1598274000-1598279400@cyber.nyu.edu
SUMMARY:Additive Manufacturing Security Workshop Series-Session 2: Increasing Diversity in Cyber-physical System Research and Workforce
DESCRIPTION:The second of a series of workshops dealing with security issues in additive manufacturing. This one will focus on initiatives to diversify the workforce for cyber-physical systems research efforts and companies. \nModerator: Mohsen Seifi\, Director of ASTM International \nConfirmed Panelists: Gaffar Gailani\, City Tech; Stacey DelVecchio\, Stacey D Consulting; .Michel Kinsy\, Boston University; Raheem Beyah\, Georgia Tech \nUpcoming Sessions:  \nOctober 2 – 1-2:30 pm: Security in Manufacturing: What Materials Scientists can do! \nAxel von Hehl\, Leibniz Institute for Materials Engineering;  Jian Yu – US Army Research Lab \nNovember 5 – 10-11:30 pm: Cybersecurity in Manufacturing: Threat Modeling and Solutions \n———————- \nA recording of Session 1\, held on July 31\, can be accessed at https://www.youtube.com/watch?v=ao5l4w6QTh4&feature=youtu.be.
URL:https://cyber.nyu.edu/event/am-security-workshop-series-session-2/
CATEGORIES:Workshop
ATTACH;FMTTYPE=image/jpeg:https://cyber.nyu.edu/wp-content/uploads/2020/07/AMW2.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200731T130000
DTEND;TZID=America/New_York:20200731T143000
DTSTAMP:20260411T190321
CREATED:20200714T194752Z
LAST-MODIFIED:20200929T181205Z
UID:17975-1596200400-1596205800@cyber.nyu.edu
SUMMARY:Additive Manufacturing Security Workshop Series
DESCRIPTION:Join experts from academia and industry for a series of workshops that address current and future challenges in the field of additive manufacturing\, including best defenses against sabotage and intellectual property theft\, future staffing needs in the field\, the role of materials scientists in secure manufacturing\, and dealing with specific threat models facing the field and how they can be resolved. \nHere are the current details. This post will be updated as new details appear: \n  \nJuly 31 – 1:00 – 2:30 PM: IP Protection \nConfirmed Panelists: Ramesh Karri\, NYU; Don Jones\, Carlisle & Co.; Nektarios Tsoutsos\, University of Delaware; \nEventBrite link:https://amsecurityipprotection.eventbrite.com \nAugust 24 – 1-2:30 pm: Increasing Diversity in Cyber-physical System Research and Workforce \nConfirmed Panelists: Gaffar Gailani\, City Tech; Michel Kinsy\, Boston University; Raheem Beyah\, Georgia Tech \nOctober 2 – 1-2:30 pm: Security in Manufacturing: What Materials Scientists can do! \nConfirmed Panelists: Dirk Lehmhus\, IFAM; Eric MacDonald\, University of Texas; Jian Yu\, US Army Research Lab; Justin Scott; JOM \nRegistration Link: https://amsecurityseries3.eventbrite.com \nNovember 5 – 10-11:30 pm: Cybersecurity in Manufacturing—Threat Modeling and Solutions \nConfirmed Panelists: Dimitrios Serpanos\, University of Patras; Christoph Meinel\, Hasso Plattner Institute; Chris Adkins\, Identify3D; Mark Yampolskiy\, Auburn University \nRegistration Link: https://amsecurityseries4.eventbrite.com \nPlease note: The Zoom webinar link will be sent to all registered participants 2 days prior to the event date. \nRecordings of past sessions are available as follows: \nSession 1: https://www.youtube.com/watch?v=ao5l4w6QTh4 \nSession 2: https://www.youtube.com/watch?v=UnUgvFwrOXo
URL:https://cyber.nyu.edu/event/am-security-ip-protection-a-panel-discussion/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20200723T150000
DTEND;TZID=UTC:20200723T153000
DTSTAMP:20260411T190321
CREATED:20200602T222448Z
LAST-MODIFIED:20250428T204044Z
UID:17785-1595516400-1595518200@cyber.nyu.edu
SUMMARY:Conversation in Cybersecurity—Session 8
DESCRIPTION:Trust But Verify: Trustworthy Intelligent Systems\nConversation with Dr. Rachel Greenstadt\nModerated  by Dr\, Edward G. Amoroso\nLearn about current research in the design of trustworthy intelligent systems that act autonomously and with the integrity necessary to be trusted with important data and decisions.
URL:https://cyber.nyu.edu/event/conversation-in-cybersecurity-session-8/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20200716T143000
DTEND;TZID=UTC:20200716T150000
DTSTAMP:20260411T190321
CREATED:20200602T222130Z
LAST-MODIFIED:20250428T203945Z
UID:17783-1594909800-1594911600@cyber.nyu.edu
SUMMARY:Conversations in Cybersecurity—Session 7
DESCRIPTION:Hacking Reality: Technology for Detecting Deep Fakes\nConversation with Dr. Nasir Memon\nModerated  by Dr. Edward G. Amoroso\nDr. Memon will talk about the new threats that Deep Fakes bring to the cybersecurity landscape and the technology needed to identify and alleviate them.
URL:https://cyber.nyu.edu/event/conversations-in-cybersecurity-session-7/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20200715T100000
DTEND;TZID=UTC:20200715T120000
DTSTAMP:20260411T190321
CREATED:20200623T020349Z
LAST-MODIFIED:20250428T203751Z
UID:17853-1594807200-1594814400@cyber.nyu.edu
SUMMARY:Decoding Cybersecurity for Corporate Boards: Experts Weigh In
DESCRIPTION:  \nThe event consists of two panels\, one focused on the Board’s Role in Cyber Oversight: Shifting Trends & Regulatory Developments\, and the other on Communicating with the Board About Cyber: Effective Strategies\, Before and After a Breach. Each will feature a team of female senior leaders from corporations (including Procter and Gamble\, CVS\, and Home Depot) and government agencies (including the Federal Trade Commission and the Securities and Exchange Commission) sharing their insights. The program\, which is hosted by Women in Cyber™ and the NYU Center for Cybersecurity\, will be moderated by Judi Germano (New York University) and Kim Peretti (Alston & Bird LLP). \nRSVP to https://nyu.zoom.us/webinar/register/WN_kxLTVoVFSmitSbu3KM-x2g \nCLE materials folder \n  \n 
URL:https://cyber.nyu.edu/event/decoding-cybersecurity-for-corporate-boards-experts-weigh-in/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20200715T100000
DTEND;TZID=UTC:20200715T113000
DTSTAMP:20260411T190321
CREATED:20200714T171815Z
LAST-MODIFIED:20200714T171951Z
UID:17949-1594807200-1594812600@cyber.nyu.edu
SUMMARY:Decoding Cybersecurity for Corporate Boards: Experts Weigh In
DESCRIPTION:Introductions:  Judi Germano (NYU) and Kim Peretti (Alston & Bird LLP) \nPanel 1: The Board’s Role in Cyber Oversight: Shifting Trends & Regulatory Developments \nPanel 2: Communicating with the Board About Cyber: Effective Strategies\, Before and After a Breach \n————— \nPanelists:  \nDeborah Platt Majoras\, Chief Legal Officer & Secretary\, The Procter & Gamble Company; former Chairman of the Federal Trade Commission \nJenny Menna\, Senior Vice President\, Deputy Chief Information Security Officer\, Business Security Solutions\, U.S. Bank \nManeesha Mithal\, Associate Director\, FTC Division of Privacy and Identity Protection \nDebora Plunkett\, Principal of Plunkett Associates LLC; Senior Fellow\, Harvard Belfer Center; Former Director of the NSA’s Information Assurance Directorate \nTeresa Wynn Roseborough\, Executive Vice President\, General Counsel and Corporate Secretary\, The Home Depot \nTracey Scraba\, Vice President\, Chief Privacy Officer\, CVS Health \nCarolyn Welshhans\, Associate Director\, SEC Division of Enforcement \nQuestions? Contact Rebecca Wright at 404.881.7921 or rebecca.wright@alston.com \nRSVP to https://nyu.zoom.us/webinar/register/WN_kxLTVoVFSmitSbu3KM-x2g \nAlston & Bird is the sponsor of CLE credit. CLE credit is pending for New York. Additional states may be available upon request. 
URL:https://cyber.nyu.edu/event/decoding-cybersecurity-for-corporate-boards-experts-weigh-in-2/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20200709T143000
DTEND;TZID=UTC:20200709T150000
DTSTAMP:20260411T190321
CREATED:20200602T221752Z
LAST-MODIFIED:20200602T223000Z
UID:17779-1594305000-1594306800@cyber.nyu.edu
SUMMARY:Conversations in Cybersecurity—Session 6
DESCRIPTION:Too Big to Fail: Cybersecurity Issues in Financial Services\nConversation with Mr.Joel Caminer\nModerated  by Dr\, Edward G. Amoroso\nDevelop insights into the threat and protection issues that are emerging in modern global financial services.
URL:https://cyber.nyu.edu/event/conversations-in-cybersecurity-session-6/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20200702T143000
DTEND;TZID=UTC:20200702T150000
DTSTAMP:20260411T190321
CREATED:20200602T220109Z
LAST-MODIFIED:20200602T220109Z
UID:17777-1593700200-1593702000@cyber.nyu.edu
SUMMARY:Conversations in Cybersecurity—Session 5
DESCRIPTION:Games\, Deception\, and Cybersecurity: Game Theory in Cybersecurity\nConversation with Dr. Quanyan Zhu\nModerated by Dr\, Edward G. Amoroso\nAn expert in the field of game theory shares insights into topics including cyber deception\, autonomous defense\, and cyber-physical system security.
URL:https://cyber.nyu.edu/event/conversations-in-cybersecurity-session-5/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20200625T143000
DTEND;TZID=UTC:20200625T150000
DTSTAMP:20260411T190321
CREATED:20200602T215420Z
LAST-MODIFIED:20200602T222822Z
UID:17775-1593095400-1593097200@cyber.nyu.edu
SUMMARY:Conversations in Cybersecurity—Session 4
DESCRIPTION:Beyond the Arm of the Law?Training Lawyers in Cyber Security\nConversation with Mr. Randy Milch\, Esq.\nModerated  by Dr\, Edward G. Amoroso\nOne of the leading experts in security aspects of corporate law provides an overview of the key issues practitioners and policy-makers must understand.
URL:https://cyber.nyu.edu/event/conversations-in-cybersecurity-session-4/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20200618T143000
DTEND;TZID=UTC:20200618T150000
DTSTAMP:20260411T190321
CREATED:20200602T214825Z
LAST-MODIFIED:20250428T202637Z
UID:17768-1592490600-1592492400@cyber.nyu.edu
SUMMARY:Conversations in Cybersecurity-Session 3
DESCRIPTION:Building Systems Resilient to Nation-State Actors: Advances in Software Security\nConversation with Dr. Justin Cappos\nModerated  by Dr. Edward G. Amoroso\nLearn key issues in security such as building compromise resilient systems\, key management\, and operational security\, with a focus on production systems that need a strong resilience to attack.
URL:https://cyber.nyu.edu/event/conversations-in-cybersecurity-session-3/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20200611T143000
DTEND;TZID=UTC:20200611T150000
DTSTAMP:20260411T190321
CREATED:20200602T211956Z
LAST-MODIFIED:20200602T214527Z
UID:17760-1591885800-1591887600@cyber.nyu.edu
SUMMARY:Conversations in Cybersecurity-Session 2
DESCRIPTION:How Secure? Measurement of Security and Privacy\nConversation with Dr. Damon McCoy\nModerated  by Dr\, Edward G. Amoroso\nLearn about on-going advances in the empirical measurement of security and privacy of technology systems and their intersections with modern societal concerns.
URL:https://cyber.nyu.edu/event/conversations-in-cybersecurity-session-2/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20200604T143000
DTEND;TZID=UTC:20200604T150000
DTSTAMP:20260411T190321
CREATED:20200602T210446Z
LAST-MODIFIED:20200602T213505Z
UID:17755-1591281000-1591282800@cyber.nyu.edu
SUMMARY:Conversations in Cybersecurity-Session 1
DESCRIPTION:Low Power\, High Security: Cybersecurity\, Hardware Design\, and Machine Learning\nConversation with Dr. Siddarth Garg\nModerated  by Dr\, Edward G. Amoroso\nLearn from a world-leading expert how cybersecurity influences hardware design with focus and emphasis on low power design and support for machine learning.
URL:https://cyber.nyu.edu/event/conversations-in-cybersecurity-session-1/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20200302T090000
DTEND;TZID=UTC:20200302T133000
DTSTAMP:20260411T190321
CREATED:20200630T174837Z
LAST-MODIFIED:20200630T174937Z
UID:17869-1583139600-1583155800@cyber.nyu.edu
SUMMARY:When Seeing Isn't Believing: Deepfakes and the Law
DESCRIPTION:The NYU Center for Cybersecurity and the NYU Journal of Legislation & Public Policy hosted a March 2nd conference on deepfakes and the law. Deepfakes are realistically altered fake videos that make a person appear to have said or done things they never did. The videos have problematic implications for individuals\, companies\, the proliferation of “fake news\,” state security\, and trust in democracy. The event featured a keynote\, two panels\, and a fireside chat. \nVideo of the event is now available\n9:00am: Registration\n\n9:20-9:50am: Keynote\nKathryn Harrison\, Founder & CEO\, DeepTrust Alliance \nKathryn Harrison is the founder and CEO of the DeepTrust Alliance\, a non-profit building the solutions and ecosystem to tackle deepfakes and misinformation. This keynote will provide an introduction to and technical overview of deepfakes. What are they? Where did they come from? What role do they play in the larger ecosystem of misinformation? \n\n9:50-11:05am: Panel 1\nThe Front Line: Big Tech\, Fake News\, and Private Industry’s Deepfake Detection Problem \nOur first panel will focus on the actors on the front lines dealing with deepfake videos\, such as platforms that publish and disseminate them. Companies like Facebook and Reddit have issued new policies to address manipulated media—but how will those policies work in reality? The panel will address a number of important questions: How do these policies interact with current law? What are the legal and business implications for companies that address these issues? Are there legal implications if companies do too much\, or too little\, to address deepfakes? How should companies navigate legal and policy questions about First Amendment rights\, censorship and national/global security? What does company decision making and governance look like in this space? Do these companies even have the technical capability to confidently identify fake videos? Are internal policies enough\, or does the private sector require government intervention? Is self-regulation sufficient\, or would the landscape benefit from different forms of legal intervention? \nSpeakers:  \nSaleela Salahuddin\, Cybersecurity Policy Lead\, Facebook \nTill Daldrup\, Training Coordinator\, Wall Street Journal \nAndrew Gully\, Technical Research Manager\, Google-Jigsaw \nCorin Faife\, Journalist\, WITNESS \nModerator: \nJudi Germano\, Distinguished Fellow\, NYU Center for Cybersecurity \nCLE Materials: \nDeep Fakes: A Looming Challenge for Privacy\, Democracy\, and National Security \nAnalyzing the Commoditization of Deepfakes \nAlphabet-Owned Jigsaw Bought a Russian Troll Campaign as an Experiment \nRegulating deep fakes: legal and ethical considerations \nFree Speech and the Regulation of Social Media Content \n\n11:20-11:55am: Fireside Chat\nA Terrorist’s Tool: Global Implications of Deepfakes & Misinformation for International Security and Human Rights \nThis discussion will address how terrorist organizations have used–and continue to use–misinformation and deepfakes to advance their agendas\, threaten global security and impinge on human rights. The conversation will also cover current efforts\, potential solutions\, and opportunities for global collaboration to address these concerns. \nSpeakers:  \nMounir Ibrahim\, VP of Strategic Initiatives\, Truepic\, Inc. \nEmerita Torres\, Director of Policy Research and Programs\, The Soufan Center \nModerator: \nMatthew Ferraro\, Counsel\, WilmerHale \n\n11:55am-12:10pm: Lunch\n12:10-12:15pm: Awards Presentation\nJLPP 2020 Legislation Competition Awards Presented\, NYU Law Dean Trevor Morrison \n\n12:15-1:30pm: Panel 2\nLegislative Solutions\, Individual Rights\, and the Question of Government Intervention \nA second panel will address larger public policy and legal concerns involved in deepfake video technology. Three states have already passed legislation regulating deepfake videos\, and eleven bills are currently pending in Congress. This panel will discuss various approaches to regulating deepfakes and the thorny issues involved\, such as privacy\, free speech\, and civil liberties. Topics will include election security\, national security\, digital privacy\, and constitutional protections. \nSpeakers:  \nBen Wizner\, Director\, ACLU Speech\, Privacy\, and Technology Project \nLindsay Gorman\, Fellow for Emerging Technologies\, Alliance for Securing Democracy \nRob Volkert\, VP of Threat Investigations\, Nisos \nNoah Stein\, Assistant Attorney General in the Bureau of Internet & Technology\, N.Y. State Attorney General’s Office \nModerator:  \nRandy Milch\, Co-Chair\, NYU Center for Cybersecurity \nCLE Materials: \nDeepfakes laws and proposals flood US \nR. 3220 \nDEEPFAKES Accountability Act would impose unenforceable rules — but it’s a start \nFederal Rules of Evidence\, Rule 902 \n  \nThis event was free of charge. \n3.0 credits of New York State CLE in the Areas of Professional Practice category were available. This event is appropriate for both newly admitted and experienced attorneys.
URL:https://cyber.nyu.edu/event/when-seeing-isnt-believing-deepfakes-and-the-law/
LOCATION:Greenberg Lounge\, 40 Washington Sq. South\, New York\, NY\, 10012
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20191204T080000
DTEND;TZID=America/New_York:20191204T170000
DTSTAMP:20260411T190321
CREATED:20191202T215206Z
LAST-MODIFIED:20240607T173319Z
UID:16413-1575446400-1575478800@cyber.nyu.edu
SUMMARY:Industry Meet and Greet
DESCRIPTION:Come say hi to industry executives and hopefully get a job!\nCompanies that will be in attendance: \n\nFacebook\nGoogle\nIntel\nMicrosoft\nApple\nNSA\nGoldman-Sachs\nCapital One\nBank of America
URL:https://cyber.nyu.edu/event/industry-meet-and-greet/
LOCATION:Great Hall\, 370 Jay St.\, Brooklyn Wa\, NY\, 11211\, United States
CATEGORIES:Meet & Greet
ORGANIZER;CN="someone soandson":MAILTO:soandso@email.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20191118T090000
DTEND;TZID=UTC:20191118T173000
DTSTAMP:20260411T190321
CREATED:20200630T205914Z
LAST-MODIFIED:20200630T205914Z
UID:17922-1574067600-1574098200@cyber.nyu.edu
SUMMARY:Catching the Cybercriminal: Reforming Global Law Enforcement
DESCRIPTION:Can cybercriminals and the organizations often behind them actually be caught\, and held accountable? What more can\, and should\, be done? \nNew York University’s Center for Cybersecurity\, the Journal of National Security Law & Policy\, and Third Way co-hosted Catching the Cybercriminal: Reforming Global Law Enforcement\, the first-of-its-kind symposium dedicated to answering those vexing questions on November 18\, in New York City. \nThe event\, the culmination of the year-long launch of Third Way’s Cyber Enforcement Initiative\, elevated discussions on policy solutions to identify and impose consequences on malicious cyber actors from the perspective of America’s law enforcement and our international partners. \nParticipants included high-level cyber experts\, policymakers\, and media. Panelists covered topics including the needs and capabilities of U.S. and international law enforcement and diplomats to address cybercrime and digital evidence. \nVideo of the event is now available\nAgenda \n8:30 AM: Doors Open for Breakfast\n9:00 AM: Welcome Remarks\nMieke Eoyang\, Vice President for the National Security Program\, Third Way \n9:30 AM – 10:45 AM: Live Recording of “The Lawfare Podcast:” Creating Cybercrime Solutions\nBen Wittes of Lawfare will sit down with United States Senator Mark Warner (D-VA)\, Vice Chairman of the Senate Select Committee on Intelligence and co-founder of the Senate Cybersecurity Caucus\, and Representative Jim Himes (D-CT)\, Chairman of the STAR Subcommittee of the House Permanent Select Committee on Intelligence\, to discuss responses to the cybercrime threat in a live taping of The Lawfare Podcast. \nSpeakers: Senator Mark Warner (D-VA)\, United States Senator \nRepresentative Jim Himes (D-CT)\, Chairman\, Strategic Technologies and Advanced Research (STAR) Subcommittee\, House Permanent Select Committee on Intelligence \nHost: Ben Wittes\, Editor-in-Chief\, Lawfare and Senior Fellow in Governance Studies\, Brookings \n10:45 AM – 11:00 AM: Coffee Break\n11:00 AM – 11:15 AM: Introduction to the Journal of National Security Law and Policy and Expert Flash Talks Round 1\nThird Way partnered with the Journal of National Security Law and Policy to produce a special edition of the Journal on cybercrime enforcement. Todd Huntley will speak about this special edition and the process for researchers and writers to publish in the future. The authors of research papers that will be published in this Journal edition will present their research during flash talks throughout the day. More detailed abstracts of the papers will be published in the event program. \nTopics discussed during this round will be cybercrime and cyberwar and indicting nation state actors. \nSpeakers: Todd Huntley\, Managing Editor of the Journal of National Security Law and Policy and Director of the National Security Law Program\, Georgetown University Law Center. \nChimène Keitner\, Alfred and Hanna Fromm Professor of International Law\, UC Hastings College of the Law \nGarrett Hinck\, Research Assistant\, Carnegie Endowment for International Peace \n11:15 AM – 12:15 PM: The Who\, What\, When\, Where\, Why of Cybercrime\nCybercrime is committed by a host of different actors with different motivations. Former American federal and local law enforcement members will join the private sector to discuss the real-world people\, places\, and motivations behind crimes conducted in cyberspace. \nSpeakers: Eileen Decker\, President\, Los Angeles Police Commission and Former US Attorney for the Central District of California \nJim Baker\, Director of National Security and Cybersecurity\, R Street Institute and Former General Counsel\, Federal Bureau of Investigation \nRon Bushar\, Vice President and CTO – Government Solutions\, FireEye \nKristin Judge\, President\, Cybercrime Support Network \nModerator: Ambassador (ret.) Gina Abercrombie-Winstanley\, Member of the Cyber Enforcement Initiative Advisory Board and Former United States Ambassador \n12:15 PM – 1:15 PM: Lunch Discussion: A Conversation with Google \nGoogle’s Director of Law Enforcement and Information Security Richard Salgado will discuss Google’s perspective on the role of the tech industry in the enforcement of cybercrime\, and the trade-offs in public-private cooperation in bringing to justice malicious cyber actors. \nSpeaker: Richard Salgado\, Director of Law Enforcement and Information Security\, Google \nModerator: Jennifer Daskal\, Professor and Faculty Director\, Tech\, Law\, Security Program\, American University Washington College of Law \n1:15 – 2:15 PM: Cybercrime: Who You Gonna Call?\nLaw enforcement has had to extensively retool to deal with cybercrime. Officials from two leading US enforcement agencies on cybercrime will discuss the successes and challenges of investigating and apprehending cybercriminals. \nSpeakers: Tonya Ugoretz\, Deputy Assistant Director\, Cyber Division\, Federal Bureau of Investigation \nMichael D’Ambrosio\, Assistant Director of the Office of Investigations\, US Secret Service \nModerator: Judith Germano\, Distinguished Fellow\, New York University Center for Cybersecurity\, Adjunct Professor\, New York University School of Law\, and Founder\, GermanoLawLLC \n2:15 PM – 2:25 PM: Expert Flash Talks Round 2\nTopics discussed during this round will be state and local cybercrime enforcement and the need for better cybercrime metrics. \nSpeakers: Margaret Brunner\, Program Director\, Homeland Security & Public Safety Division\, National Governors Association \nStephen Cobb\, CISSP\, Independent Researcher \n2:30 PM – 2:45 PM: Coffee Break\n2:45 PM – 3:45 PM: A Little Help from Our Friends: Working With International Partners\nCybercrime is a transnational and borderless threat. How are countries developing and supporting their own law enforcement bodies to tackle this issue? What international cooperation mechanisms exist for countries to coordinate in these investigations and how can they work more effectively? \nSpeakers: Neil Walsh\, Chief\, Cybercrime and Anti-Money Laundering Section\, United Nations Office on Drugs and Crime \nNorikazu Otaki\, Legal Attache\, Embassy of Japan in the United States \nTerlumun George-Maria Tyendezwa\, Assistant Director and Head Cybercrime Prosecution Unit\, Federal Ministry of Justice\, Federal Republic of Nigeria \nAllison Peters\, Deputy Director of the National Security Program\, Third Way \nModerator: Jenna McLaughlin\, National Security and Investigations Reporter\, Yahoo News \n3:45 PM – 3:55 PM: Expert Flash Talks Round 3\nTopics discussed during this round will be cyber insurers and the definition of “possession\, custody\, or control” as used in the US law known as the CLOUD Act. \nSpeakers: Asaf Lubin\, Affiliate\, Berkman Klein Center for Internet & Society\, Harvard University and Lecturer\, Yale University \nJustin Hemmings\, Research Faculty Member\, Georgia Institute of Technology and Project Attorney at Alston & Bird LLP \n3:55 PM – 4:00 PM: Closing Remarks\nSpeaker: Ari Schwartz\, Managing Director of Cybersecurity Services\, Venable LLP and Former Special Assistant to the President and Senior Director for Cybersecurity on the US National Security Council (2013-2015) \n4:00 PM – 5:30 PM: Cocktail Reception Sponsored by Venable LLP
URL:https://cyber.nyu.edu/event/catching-the-cybercriminal-reforming-global-law-enforcement/
LOCATION:Greenberg Lounge\, 40 Washington Sq. South\, New York\, NY\, 10012
END:VEVENT
END:VCALENDAR