Talks in the Category “Panel Discussions and Debates”
JOEL ROSENTHAL: I want to begin by welcoming our colleagues from the Carnegie UK Trust. This event is part of a study tour organized by the Trust inquiring into the future of public libraries, and as a subset of that question, the issue of privacy in the digital age. We began the discussion yesterday at the offices of the Carnegie Corporation and at the New York Public Library, and we're delighted for the opportunity to expand it in a broader discussion with all of you today.
One of the advantages of being a Carnegie organization is that we benefit from the ideas, inspirations, and good works of our sister institutions.
Bruce Schneier participated in a panel at Free and Safe in Cyberspace 2015, with Bart Preneel, Richard Stallman, Andreas Wild, Jovan Golic, Bjoern Rupp, Michael Sieber, Melle Van den Berg, Pierre Chastanet, and moderator Rufo Guerreschi.
Is it feasible to provide ordinary citizens access to affordable and user-friendly end-2-end IT services with constitutionally-meaningful levels of user-trustworthiness, as a supplement to their every-day computing devices? If so, how? What scale of investments are needed?
With Berkman Fellow, Bruce Schneier. Moderated by Jonathan Zittrain with special guests Yochai Benkler, Joe Nye, Sara Watson and Melissa Hathaway.
For this week's Friday Roundtable, we dive into the issues of data security discussed in Bruce Schneier's new book "Data and Goliath."
Schneier writes in his introduction: "Here is what's true: Today's technology gives governments and corporations robust capabilities for mass surveillance."
Schneier and two other technology and security experts joined the Roundtable to talk about the state of data security.
Highlights from the conversationCell phones have become surveillance devices - for better or worse.
"The cell phone knows who you talk to, what time you talked to them, what time you wake up in the morning, what time you go to sleep at night. It knows who you sleep with because you've both got a phone," said Schneier. "It is an amazing surveillance device and something we would never allow if the government mandated it.
The long-term viability of an unowned, open Internet remains in question. Any analysis of where the Internet is headed as a protocol and a platform must take into account the activities of both public and private entities that see the Internet as a source of intelligence -- and a field of contention. Yochai Benkler, Bruce Schneier, and Jonathan Zittrain of the Berkman Center are joined by John DeLong and Anne Neuberger of the National Security Agency in a conversation moderated by Berkman Faculty Director Terry Fisher on the future of an open internet in the face of challenges to privacy in an unsecure world.
With James Bamford, Ariel Dorfman, Glenn Greenwald, and Bruce Schneier.
Is the same surveillance that is meant to protect us from danger also harming us?
Are the NSA programs Edward Snowden has revealed inhibiting the way we think, speak, create, and interact? And what about the parallel universe of private sector spying and data mining?
A technical plenary featuring security researcher Bruce Schneier along with IETF leaders Brian Carpenter, Stephen Farrell and others.
New reports of large-scale Internet traffic monitoring appear almost every day. We were all aware that targeted interception was taking place, but the scale and scope in the recent reports is surprising. Such scale was not envisaged during the design of many Internet protocols; the threat is quite different than expected. Now, the Internet community must consider the consequences.
While details of these attack techniques remain largely unknown, we can talk about possible ways to harden the Internet in light of pervasive Internet monitoring.
Has it really been 15 years? Time flies when keeping up with Moore's law is the measure. In 1997, Jeff Moss held the very first Black Hat. He gathered together some of the best hackers and security minds of the time to discuss the current state of the hack. A unique and neutral field was created in which the security community--private, public, and independent practitioners alike could come together and exchange research, theories, and experiences with no vendor influences.
"Software could be more secure" may be the understatement of the century. Vulnerabilities have infested our code for as long as there's *been* code. Nobody refutes the notion that we want more secure code; it is getting there that is the challenge - and also the focus of this debate. Software liability is oft-cited as one potential approach to creating more secure code.
In this keynote panel, explore the complex and evolving issues tied to cybersecurity and conflict in cyberspace in the 21st Century from leading experts in the field. Moderated by Dr. James Lewis of the Center for Strategic and International Studies, this session will include discussion on thresholds for cyberwar, the often confusing terminology used for various types of cyber conflict, and what needs to be done in the international context to secure cyberspace while also deterring the possible escalation of various kinds of cyber attacks and conflict.
At Information Security Decisions 2009, Bruce Schneier and Marcus Ranum took to the stage to discuss some of the most contested issues in information security.
Recent attacks on the power grid, stolen fighter jet plans, and SCADA system security woes have thrust national cybersecurity into the limelight. The reaction has been as expected: Congress is asking tough questions, and the White House has reviewed federal networks and security processes. One key question remains unanswered: Which government agency should be running the show? Many have called for a newly created White House position to oversee cybersecurity and report directly to the president, while others wonder what role intelligence agencies such as the National Security Agency (NSA) will play in leading the country's cybersecurity efforts.
Cloud computing offers enterprises many enticing capabilities that could save companies significant hardware and computing costs. But as with any offloading of services, there is a risk that must be considered and absorbed as well. Companies choosing to buy processing power, services or store data in the cloud must vet their providers well and ultimately trust that their security processes meet your needs. Security experts Bruce Schneier, CTO of BT Global Services, and Marcus Ranum, CTO at Tenable Network Security, debate all sides of the issue in this Face-Off. Schneier and Ranum are at odds over whether there are really any new risks associated with cloud computing, how much trust organizations should have in a provider and what questions you need to ask.
Are we entering an era where individuals gain new control over their public personas, and powerful means to leverage reputations? Or will we be forced to abandon any hope of protecting our privacy and trusting what we encounter online? When is more information the solution… and when is it the problem?
At Supernova 2008, Wharton Professor Andrea Matwyshyn led a discussion featuring Bruce Schneier (BT Counterpane), Fran Maier (TrustE), and Gerard Lewis (Comcast).
Photo of Bruce Schneier by Per Ervland.
Schneier on Security is a personal website. Opinions expressed are not necessarily those of IBM Resilient.