Talks in the Category “Panel Discussions and Debates”

Panel Discussion on Terrorism and Surveillance

  • C-SPAN
  • October 24, 2015

Bruce Schneier appeared on a panel with Jessica Stern (co-author of Isis) and Gabriella Blum (co-author of The Future of Violence).

Watch the video on C-SPAN.org

Read More →

Panel at Free and Safe in Cyberspace 2015

  • Free and Safe in Cyberspace
  • September 24, 2015

Bruce Schneier participated in a panel at Free and Safe in Cyberspace 2015, with Bart Preneel, Richard Stallman, Andreas Wild, Jovan Golic, Bjoern Rupp, Michael Sieber, Melle Van den Berg, Pierre Chastanet, and moderator Rufo Guerreschi.

Is it feasible to provide ordinary citizens access to affordable and user-friendly end-2-end IT services with constitutionally-meaningful levels of user-trustworthiness, as a supplement to their every-day computing devices? If so, how? What scale of investments are needed?

Read More →

Panel Discussion of Data and Goliath at Harvard's Berkman Center

  • Berkman Center, Harvard University
  • March 30, 2015

With Berkman Fellow, Bruce Schneier. Moderated by Jonathan Zittrain with special guests Yochai Benkler, Joe Nye, Sara Watson and Melissa Hathaway.

Watch the Video on YouTube

Read More →

How Secure Is Your Data?

  • MPR News
  • March 20, 2015

For this week's Friday Roundtable, we dive into the issues of data security discussed in Bruce Schneier's new book "Data and Goliath."

Schneier writes in his introduction: "Here is what's true: Today's technology gives governments and corporations robust capabilities for mass surveillance."

Schneier and two other technology and security experts joined the Roundtable to talk about the state of data security.

Highlights from the conversation

Cell phones have become surveillance devices - for better or worse.

"The cell phone knows who you talk to, what time you talked to them, what time you wake up in the morning, what time you go to sleep at night. It knows who you sleep with because you've both got a phone," said Schneier. "It is an amazing surveillance device and something we would never allow if the government mandated it.

Read More →

Intelligence Gathering and the Unowned Internet

  • Berkman Center for Internet & Society
  • April 8, 2014

The long-term viability of an unowned, open Internet remains in question. Any analysis of where the Internet is headed as a protocol and a platform must take into account the activities of both public and private entities that see the Internet as a source of intelligence -- and a field of contention. Yochai Benkler, Bruce Schneier, and Jonathan Zittrain of the Berkman Center are joined by John DeLong and Anne Neuberger of the National Security Agency in a conversation moderated by Berkman Faculty Director Terry Fisher on the future of an open internet in the face of challenges to privacy in an unsecure world.

Watch the Video on YouTube

Read More →

They're Watching Us: So What?

  • PEN America
  • November 14, 2013

With James Bamford, Ariel Dorfman, Glenn Greenwald, and Bruce Schneier.

Is the same surveillance that is meant to protect us from danger also harming us?

Are the NSA programs Edward Snowden has revealed inhibiting the way we think, speak, create, and interact? And what about the parallel universe of private sector spying and data mining?

Read More →

Technical Plenary: Hardening the Internet

  • IETF 88
  • November 6, 2013

A technical plenary featuring security researcher Bruce Schneier along with IETF leaders Brian Carpenter, Stephen Farrell and others.

New reports of large-scale Internet traffic monitoring appear almost every day. We were all aware that targeted interception was taking place, but the scale and scope in the recent reports is surprising. Such scale was not envisaged during the design of many Internet protocols; the threat is quite different than expected. Now, the Internet community must consider the consequences.

While details of these attack techniques remain largely unknown, we can talk about possible ways to harden the Internet in light of pervasive Internet monitoring.

Read More →

Smashing the Future for Fun and Profit

  • Black Hat USA 2012
  • July 25, 2012

Has it really been 15 years? Time flies when keeping up with Moore's law is the measure. In 1997, Jeff Moss held the very first Black Hat. He gathered together some of the best hackers and security minds of the time to discuss the current state of the hack. A unique and neutral field was created in which the security community--private, public, and independent practitioners alike could come together and exchange research, theories, and experiences with no vendor influences.

Read More →

Privacy in the Age of Big Data: What's Going On Out There?

  • Privacy in the Age of Big Data Forum
  • June 5, 2012

On a panel at the Privacy in the Age of Big Data Forum in New Zealand, Bruce Schenier spoke about trends in personal data collection and usage.

Watch the Video on YouTube: Parts 1, 2, and 3

Read the Transcript on Privacy-PC.com

Read More →

Software Liability: Our Saving Grace or Kiss of Death?

  • RSA Conference 2012
  • April 26, 2012

"Software could be more secure" may be the understatement of the century. Vulnerabilities have infested our code for as long as there's *been* code. Nobody refutes the notion that we want more secure code; it is getting there that is the challenge - and also the focus of this debate. Software liability is oft-cited as one potential approach to creating more secure code.

Read More →

Panel: Cyberwar, Cybersecurity, and the Challenges Ahead

  • RSA Conference 2011
  • February 16, 2011

In this keynote panel, explore the complex and evolving issues tied to cybersecurity and conflict in cyberspace in the 21st Century from leading experts in the field. Moderated by Dr. James Lewis of the Center for Strategic and International Studies, this session will include discussion on thresholds for cyberwar, the often confusing terminology used for various types of cyber conflict, and what needs to be done in the international context to secure cyberspace while also deterring the possible escalation of various kinds of cyber attacks and conflict.

Watch the Video on YouTube

Read More →

Schneier-Ranum Face-Off on The Future of Information Security

  • Information Security Decisions
  • October 21, 2009

At Information Security Decisions 2009, Bruce Schneier and Marcus Ranum took to the stage to discuss some of the most contested issues in information security.

Watch the Video or Read the Transcript on TechTarget.com

Read More →

Face-off: Who Should Be in Charge of Cybersecurity?

  • Information Security
  • May 7, 2009

Recent attacks on the power grid, stolen fighter jet plans, and SCADA system security woes have thrust national cybersecurity into the limelight. The reaction has been as expected: Congress is asking tough questions, and the White House has reviewed federal networks and security processes. One key question remains unanswered: Which government agency should be running the show? Many have called for a newly created White House position to oversee cybersecurity and report directly to the president, while others wonder what role intelligence agencies such as the National Security Agency (NSA) will play in leading the country's cybersecurity efforts.

Read More →

Face-off: Assessing Cloud Computing Risks

  • Information Security
  • May 5, 2009

Cloud computing offers enterprises many enticing capabilities that could save companies significant hardware and computing costs. But as with any offloading of services, there is a risk that must be considered and absorbed as well. Companies choosing to buy processing power, services or store data in the cloud must vet their providers well and ultimately trust that their security processes meet your needs. Security experts Bruce Schneier, CTO of BT Global Services, and Marcus Ranum, CTO at Tenable Network Security, debate all sides of the issue in this Face-Off. Schneier and Ranum are at odds over whether there are really any new risks associated with cloud computing, how much trust organizations should have in a provider and what questions you need to ask.

Read More →

Privacy and Security in the Network Age

  • Supernova
  • June 17, 2008

Are we entering an era where individuals gain new control over their public personas, and powerful means to leverage reputations? Or will we be forced to abandon any hope of protecting our privacy and trusting what we encounter online? When is more information the solution… and when is it the problem?

At Supernova 2008, Wharton Professor Andrea Matwyshyn led a discussion featuring Bruce Schneier (BT Counterpane), Fran Maier (TrustE), and Gerard Lewis (Comcast).

Read More →

Photo of Bruce Schneier by Per Ervland.

Schneier on Security is a personal website. Opinions expressed are not necessarily those of IBM Resilient.