Talks in the Category "Medium"

Page 10 of 15

Video: Day Two Keynote

  • Managing Digital Identity in a Networked World
  • May 1, 2012

Bruce Schneier spoke on “Digital Security in a Networked World.”

Watch the Video on BizViz.co.nz

Video: Software Liability: Our Saving Grace or Kiss of Death?

  • RSA Conference 2012
  • April 26, 2012

“Software could be more secure” may be the understatement of the century. Vulnerabilities have infested our code for as long as there’s *been* code. Nobody refutes the notion that we want more secure code; it is getting there that is the challenge – and also the focus of this debate. Software liability is oft-cited as one potential approach to creating more secure code. Clearly, there are strong advocates and as strong detractors. Today is the day we work everything out and decide whether software liability would be our saving grace or the kiss of death…

Video: Trust, Security, and Society

  • InfoShare
  • April 24, 2012

Bruce Schneier spoke on “Trust, Security, and Society” at InfoShare 2012.

Watch the Video on Vimeo

Video: Cybersecurity, Scientific Data and Public Trust

  • H5N1 Research Symposium
  • April 4, 2012

Bruce Schneier spoke on “Cybersecurity, scientific data and public trust” at the H5N1 Research Symposium, organised by the Royal Society in partnership with the Academy of Medical Sciences and the Foundation for Vaccine Research with support from the American Society for Microbiology, the Bill & Melinda Gates Foundation, Fondation Mérieux, the German National Academy of Sciences Leopoldina, Institut Pasteur, and the Society for General Microbiology.

Watch the Video on Voiceprompt.co.uk

Video: New Threats to the Internet Infrastructure

  • RSA Conference 2012
  • March 25, 2012

Today’s Internet threats are not technical; they’re social and political. They aren’t criminals, hackers, or terrorists. They’re the government and corporate attempts to mold the Internet into what they want it to be, either to bolster their business models or facilitate social control. Right now, these two goals coincide, making it harder than ever to keep the Internet free and open.

Watch the Video on YouTube

Read the Transcript on Privacy-PC.com

Video: New and Emerging Security Threats

  • BT Australasia
  • March 20, 2012

This short video gives an overview of new and emerging security threats.

Watch the Video on YouTube

Video: Liars and Outliers

  • YouTube
  • February 14, 2012

Author Bruce Schneier introduces his new book Liars and Outliers.

Watch the Video on YouTube

Video: Security Theater

  • a short film by Joe Hollier
  • August 1, 2011

A video made for a CNN project called the “Ripple Effect,” in which various artists were commissioned to make pieces of art that talk about some of the rippling, less talked about effects of September 11th.

Watch the Video on Vimeo

Audio: Cyberwar Rhetoric

  • Computers, Freedom and Privacy Conference
  • June 16, 2011

Bruce Schneier gave a keynote address at the Computers, Freedom, and Privacy Conference.

Listen to the Audio

Video: Cyberwar

  • Blackhat EU 2011
  • May 21, 2011

The world is gearing up for cyberwar. The US Cyber Command became operational in November. Nato has enshrined cyber security among its new strategic priorities. The head of Britain’s armed forces said recently that boosting cyber capability is now a huge priority for the UK. And we know China is already engaged in broad cyber espionage attacks against the west. So how can we control a burgeoning cyber arms race? We may already have seen early versions of cyberwars in Estonia and Georgia, possibly perpetrated by Russia. It’s hard to know for certain, not only because such attacks are often impossible to trace, but because we have no clear definitions of what a cyberwar actually is. Do the 2007 attacks against Estonia, traced to a young Russian man living in Tallinn and no one else, count? What about a virus from an unknown origin, possibly targeted at an Iranian nuclear complex? Or espionage from within China, but not specifically directed by its government? To such questions one must add even more basic issues, like when a cyberwar is understood to have begun, and how it ends…

1 8 9 10 11 12 15

Sidebar photo of Bruce Schneier by Joe MacInnis.