BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//NYU Center for Cyber Security - ECPv6.14.2//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://cyber.nyu.edu
X-WR-CALDESC:Events for NYU Center for Cyber Security
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20190101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20190310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20191103T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=UTC:20200702T143000
DTEND;TZID=UTC:20200702T150000
DTSTAMP:20260411T203741
CREATED:20200602T220109Z
LAST-MODIFIED:20200602T220109Z
UID:17777-1593700200-1593702000@cyber.nyu.edu
SUMMARY:Conversations in Cybersecurity—Session 5
DESCRIPTION:Games\, Deception\, and Cybersecurity: Game Theory in Cybersecurity\nConversation with Dr. Quanyan Zhu\nModerated by Dr\, Edward G. Amoroso\nAn expert in the field of game theory shares insights into topics including cyber deception\, autonomous defense\, and cyber-physical system security.
URL:https://cyber.nyu.edu/event/conversations-in-cybersecurity-session-5/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20200625T143000
DTEND;TZID=UTC:20200625T150000
DTSTAMP:20260411T203741
CREATED:20200602T215420Z
LAST-MODIFIED:20200602T222822Z
UID:17775-1593095400-1593097200@cyber.nyu.edu
SUMMARY:Conversations in Cybersecurity—Session 4
DESCRIPTION:Beyond the Arm of the Law?Training Lawyers in Cyber Security\nConversation with Mr. Randy Milch\, Esq.\nModerated  by Dr\, Edward G. Amoroso\nOne of the leading experts in security aspects of corporate law provides an overview of the key issues practitioners and policy-makers must understand.
URL:https://cyber.nyu.edu/event/conversations-in-cybersecurity-session-4/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20200618T143000
DTEND;TZID=UTC:20200618T150000
DTSTAMP:20260411T203741
CREATED:20200602T214825Z
LAST-MODIFIED:20250428T202637Z
UID:17768-1592490600-1592492400@cyber.nyu.edu
SUMMARY:Conversations in Cybersecurity-Session 3
DESCRIPTION:Building Systems Resilient to Nation-State Actors: Advances in Software Security\nConversation with Dr. Justin Cappos\nModerated  by Dr. Edward G. Amoroso\nLearn key issues in security such as building compromise resilient systems\, key management\, and operational security\, with a focus on production systems that need a strong resilience to attack.
URL:https://cyber.nyu.edu/event/conversations-in-cybersecurity-session-3/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20200611T143000
DTEND;TZID=UTC:20200611T150000
DTSTAMP:20260411T203741
CREATED:20200602T211956Z
LAST-MODIFIED:20200602T214527Z
UID:17760-1591885800-1591887600@cyber.nyu.edu
SUMMARY:Conversations in Cybersecurity-Session 2
DESCRIPTION:How Secure? Measurement of Security and Privacy\nConversation with Dr. Damon McCoy\nModerated  by Dr\, Edward G. Amoroso\nLearn about on-going advances in the empirical measurement of security and privacy of technology systems and their intersections with modern societal concerns.
URL:https://cyber.nyu.edu/event/conversations-in-cybersecurity-session-2/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20200604T143000
DTEND;TZID=UTC:20200604T150000
DTSTAMP:20260411T203741
CREATED:20200602T210446Z
LAST-MODIFIED:20200602T213505Z
UID:17755-1591281000-1591282800@cyber.nyu.edu
SUMMARY:Conversations in Cybersecurity-Session 1
DESCRIPTION:Low Power\, High Security: Cybersecurity\, Hardware Design\, and Machine Learning\nConversation with Dr. Siddarth Garg\nModerated  by Dr\, Edward G. Amoroso\nLearn from a world-leading expert how cybersecurity influences hardware design with focus and emphasis on low power design and support for machine learning.
URL:https://cyber.nyu.edu/event/conversations-in-cybersecurity-session-1/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20200302T090000
DTEND;TZID=UTC:20200302T133000
DTSTAMP:20260411T203741
CREATED:20200630T174837Z
LAST-MODIFIED:20200630T174937Z
UID:17869-1583139600-1583155800@cyber.nyu.edu
SUMMARY:When Seeing Isn't Believing: Deepfakes and the Law
DESCRIPTION:The NYU Center for Cybersecurity and the NYU Journal of Legislation & Public Policy hosted a March 2nd conference on deepfakes and the law. Deepfakes are realistically altered fake videos that make a person appear to have said or done things they never did. The videos have problematic implications for individuals\, companies\, the proliferation of “fake news\,” state security\, and trust in democracy. The event featured a keynote\, two panels\, and a fireside chat. \nVideo of the event is now available\n9:00am: Registration\n\n9:20-9:50am: Keynote\nKathryn Harrison\, Founder & CEO\, DeepTrust Alliance \nKathryn Harrison is the founder and CEO of the DeepTrust Alliance\, a non-profit building the solutions and ecosystem to tackle deepfakes and misinformation. This keynote will provide an introduction to and technical overview of deepfakes. What are they? Where did they come from? What role do they play in the larger ecosystem of misinformation? \n\n9:50-11:05am: Panel 1\nThe Front Line: Big Tech\, Fake News\, and Private Industry’s Deepfake Detection Problem \nOur first panel will focus on the actors on the front lines dealing with deepfake videos\, such as platforms that publish and disseminate them. Companies like Facebook and Reddit have issued new policies to address manipulated media—but how will those policies work in reality? The panel will address a number of important questions: How do these policies interact with current law? What are the legal and business implications for companies that address these issues? Are there legal implications if companies do too much\, or too little\, to address deepfakes? How should companies navigate legal and policy questions about First Amendment rights\, censorship and national/global security? What does company decision making and governance look like in this space? Do these companies even have the technical capability to confidently identify fake videos? Are internal policies enough\, or does the private sector require government intervention? Is self-regulation sufficient\, or would the landscape benefit from different forms of legal intervention? \nSpeakers:  \nSaleela Salahuddin\, Cybersecurity Policy Lead\, Facebook \nTill Daldrup\, Training Coordinator\, Wall Street Journal \nAndrew Gully\, Technical Research Manager\, Google-Jigsaw \nCorin Faife\, Journalist\, WITNESS \nModerator: \nJudi Germano\, Distinguished Fellow\, NYU Center for Cybersecurity \nCLE Materials: \nDeep Fakes: A Looming Challenge for Privacy\, Democracy\, and National Security \nAnalyzing the Commoditization of Deepfakes \nAlphabet-Owned Jigsaw Bought a Russian Troll Campaign as an Experiment \nRegulating deep fakes: legal and ethical considerations \nFree Speech and the Regulation of Social Media Content \n\n11:20-11:55am: Fireside Chat\nA Terrorist’s Tool: Global Implications of Deepfakes & Misinformation for International Security and Human Rights \nThis discussion will address how terrorist organizations have used–and continue to use–misinformation and deepfakes to advance their agendas\, threaten global security and impinge on human rights. The conversation will also cover current efforts\, potential solutions\, and opportunities for global collaboration to address these concerns. \nSpeakers:  \nMounir Ibrahim\, VP of Strategic Initiatives\, Truepic\, Inc. \nEmerita Torres\, Director of Policy Research and Programs\, The Soufan Center \nModerator: \nMatthew Ferraro\, Counsel\, WilmerHale \n\n11:55am-12:10pm: Lunch\n12:10-12:15pm: Awards Presentation\nJLPP 2020 Legislation Competition Awards Presented\, NYU Law Dean Trevor Morrison \n\n12:15-1:30pm: Panel 2\nLegislative Solutions\, Individual Rights\, and the Question of Government Intervention \nA second panel will address larger public policy and legal concerns involved in deepfake video technology. Three states have already passed legislation regulating deepfake videos\, and eleven bills are currently pending in Congress. This panel will discuss various approaches to regulating deepfakes and the thorny issues involved\, such as privacy\, free speech\, and civil liberties. Topics will include election security\, national security\, digital privacy\, and constitutional protections. \nSpeakers:  \nBen Wizner\, Director\, ACLU Speech\, Privacy\, and Technology Project \nLindsay Gorman\, Fellow for Emerging Technologies\, Alliance for Securing Democracy \nRob Volkert\, VP of Threat Investigations\, Nisos \nNoah Stein\, Assistant Attorney General in the Bureau of Internet & Technology\, N.Y. State Attorney General’s Office \nModerator:  \nRandy Milch\, Co-Chair\, NYU Center for Cybersecurity \nCLE Materials: \nDeepfakes laws and proposals flood US \nR. 3220 \nDEEPFAKES Accountability Act would impose unenforceable rules — but it’s a start \nFederal Rules of Evidence\, Rule 902 \n  \nThis event was free of charge. \n3.0 credits of New York State CLE in the Areas of Professional Practice category were available. This event is appropriate for both newly admitted and experienced attorneys.
URL:https://cyber.nyu.edu/event/when-seeing-isnt-believing-deepfakes-and-the-law/
LOCATION:Greenberg Lounge\, 40 Washington Sq. South\, New York\, NY\, 10012
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20191204T080000
DTEND;TZID=America/New_York:20191204T170000
DTSTAMP:20260411T203741
CREATED:20191202T215206Z
LAST-MODIFIED:20240607T173319Z
UID:16413-1575446400-1575478800@cyber.nyu.edu
SUMMARY:Industry Meet and Greet
DESCRIPTION:Come say hi to industry executives and hopefully get a job!\nCompanies that will be in attendance: \n\nFacebook\nGoogle\nIntel\nMicrosoft\nApple\nNSA\nGoldman-Sachs\nCapital One\nBank of America
URL:https://cyber.nyu.edu/event/industry-meet-and-greet/
LOCATION:Great Hall\, 370 Jay St.\, Brooklyn Wa\, NY\, 11211\, United States
CATEGORIES:Meet & Greet
ORGANIZER;CN="someone soandson":MAILTO:soandso@email.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20191118T090000
DTEND;TZID=UTC:20191118T173000
DTSTAMP:20260411T203741
CREATED:20200630T205914Z
LAST-MODIFIED:20200630T205914Z
UID:17922-1574067600-1574098200@cyber.nyu.edu
SUMMARY:Catching the Cybercriminal: Reforming Global Law Enforcement
DESCRIPTION:Can cybercriminals and the organizations often behind them actually be caught\, and held accountable? What more can\, and should\, be done? \nNew York University’s Center for Cybersecurity\, the Journal of National Security Law & Policy\, and Third Way co-hosted Catching the Cybercriminal: Reforming Global Law Enforcement\, the first-of-its-kind symposium dedicated to answering those vexing questions on November 18\, in New York City. \nThe event\, the culmination of the year-long launch of Third Way’s Cyber Enforcement Initiative\, elevated discussions on policy solutions to identify and impose consequences on malicious cyber actors from the perspective of America’s law enforcement and our international partners. \nParticipants included high-level cyber experts\, policymakers\, and media. Panelists covered topics including the needs and capabilities of U.S. and international law enforcement and diplomats to address cybercrime and digital evidence. \nVideo of the event is now available\nAgenda \n8:30 AM: Doors Open for Breakfast\n9:00 AM: Welcome Remarks\nMieke Eoyang\, Vice President for the National Security Program\, Third Way \n9:30 AM – 10:45 AM: Live Recording of “The Lawfare Podcast:” Creating Cybercrime Solutions\nBen Wittes of Lawfare will sit down with United States Senator Mark Warner (D-VA)\, Vice Chairman of the Senate Select Committee on Intelligence and co-founder of the Senate Cybersecurity Caucus\, and Representative Jim Himes (D-CT)\, Chairman of the STAR Subcommittee of the House Permanent Select Committee on Intelligence\, to discuss responses to the cybercrime threat in a live taping of The Lawfare Podcast. \nSpeakers: Senator Mark Warner (D-VA)\, United States Senator \nRepresentative Jim Himes (D-CT)\, Chairman\, Strategic Technologies and Advanced Research (STAR) Subcommittee\, House Permanent Select Committee on Intelligence \nHost: Ben Wittes\, Editor-in-Chief\, Lawfare and Senior Fellow in Governance Studies\, Brookings \n10:45 AM – 11:00 AM: Coffee Break\n11:00 AM – 11:15 AM: Introduction to the Journal of National Security Law and Policy and Expert Flash Talks Round 1\nThird Way partnered with the Journal of National Security Law and Policy to produce a special edition of the Journal on cybercrime enforcement. Todd Huntley will speak about this special edition and the process for researchers and writers to publish in the future. The authors of research papers that will be published in this Journal edition will present their research during flash talks throughout the day. More detailed abstracts of the papers will be published in the event program. \nTopics discussed during this round will be cybercrime and cyberwar and indicting nation state actors. \nSpeakers: Todd Huntley\, Managing Editor of the Journal of National Security Law and Policy and Director of the National Security Law Program\, Georgetown University Law Center. \nChimène Keitner\, Alfred and Hanna Fromm Professor of International Law\, UC Hastings College of the Law \nGarrett Hinck\, Research Assistant\, Carnegie Endowment for International Peace \n11:15 AM – 12:15 PM: The Who\, What\, When\, Where\, Why of Cybercrime\nCybercrime is committed by a host of different actors with different motivations. Former American federal and local law enforcement members will join the private sector to discuss the real-world people\, places\, and motivations behind crimes conducted in cyberspace. \nSpeakers: Eileen Decker\, President\, Los Angeles Police Commission and Former US Attorney for the Central District of California \nJim Baker\, Director of National Security and Cybersecurity\, R Street Institute and Former General Counsel\, Federal Bureau of Investigation \nRon Bushar\, Vice President and CTO – Government Solutions\, FireEye \nKristin Judge\, President\, Cybercrime Support Network \nModerator: Ambassador (ret.) Gina Abercrombie-Winstanley\, Member of the Cyber Enforcement Initiative Advisory Board and Former United States Ambassador \n12:15 PM – 1:15 PM: Lunch Discussion: A Conversation with Google \nGoogle’s Director of Law Enforcement and Information Security Richard Salgado will discuss Google’s perspective on the role of the tech industry in the enforcement of cybercrime\, and the trade-offs in public-private cooperation in bringing to justice malicious cyber actors. \nSpeaker: Richard Salgado\, Director of Law Enforcement and Information Security\, Google \nModerator: Jennifer Daskal\, Professor and Faculty Director\, Tech\, Law\, Security Program\, American University Washington College of Law \n1:15 – 2:15 PM: Cybercrime: Who You Gonna Call?\nLaw enforcement has had to extensively retool to deal with cybercrime. Officials from two leading US enforcement agencies on cybercrime will discuss the successes and challenges of investigating and apprehending cybercriminals. \nSpeakers: Tonya Ugoretz\, Deputy Assistant Director\, Cyber Division\, Federal Bureau of Investigation \nMichael D’Ambrosio\, Assistant Director of the Office of Investigations\, US Secret Service \nModerator: Judith Germano\, Distinguished Fellow\, New York University Center for Cybersecurity\, Adjunct Professor\, New York University School of Law\, and Founder\, GermanoLawLLC \n2:15 PM – 2:25 PM: Expert Flash Talks Round 2\nTopics discussed during this round will be state and local cybercrime enforcement and the need for better cybercrime metrics. \nSpeakers: Margaret Brunner\, Program Director\, Homeland Security & Public Safety Division\, National Governors Association \nStephen Cobb\, CISSP\, Independent Researcher \n2:30 PM – 2:45 PM: Coffee Break\n2:45 PM – 3:45 PM: A Little Help from Our Friends: Working With International Partners\nCybercrime is a transnational and borderless threat. How are countries developing and supporting their own law enforcement bodies to tackle this issue? What international cooperation mechanisms exist for countries to coordinate in these investigations and how can they work more effectively? \nSpeakers: Neil Walsh\, Chief\, Cybercrime and Anti-Money Laundering Section\, United Nations Office on Drugs and Crime \nNorikazu Otaki\, Legal Attache\, Embassy of Japan in the United States \nTerlumun George-Maria Tyendezwa\, Assistant Director and Head Cybercrime Prosecution Unit\, Federal Ministry of Justice\, Federal Republic of Nigeria \nAllison Peters\, Deputy Director of the National Security Program\, Third Way \nModerator: Jenna McLaughlin\, National Security and Investigations Reporter\, Yahoo News \n3:45 PM – 3:55 PM: Expert Flash Talks Round 3\nTopics discussed during this round will be cyber insurers and the definition of “possession\, custody\, or control” as used in the US law known as the CLOUD Act. \nSpeakers: Asaf Lubin\, Affiliate\, Berkman Klein Center for Internet & Society\, Harvard University and Lecturer\, Yale University \nJustin Hemmings\, Research Faculty Member\, Georgia Institute of Technology and Project Attorney at Alston & Bird LLP \n3:55 PM – 4:00 PM: Closing Remarks\nSpeaker: Ari Schwartz\, Managing Director of Cybersecurity Services\, Venable LLP and Former Special Assistant to the President and Senior Director for Cybersecurity on the US National Security Council (2013-2015) \n4:00 PM – 5:30 PM: Cocktail Reception Sponsored by Venable LLP
URL:https://cyber.nyu.edu/event/catching-the-cybercriminal-reforming-global-law-enforcement/
LOCATION:Greenberg Lounge\, 40 Washington Sq. South\, New York\, NY\, 10012
END:VEVENT
END:VCALENDAR