Talks in the Category "Panel Discussions and Debates"
Page 2 of 3
Video: Intelligence Gathering and the Unowned Internet
The long-term viability of an unowned, open Internet remains in question. Any analysis of where the Internet is headed as a protocol and a platform must take into account the activities of both public and private entities that see the Internet as a source of intelligence—and a field of contention. Yochai Benkler, Bruce Schneier, and Jonathan Zittrain of the Berkman Center are joined by John DeLong and Anne Neuberger of the National Security Agency in a conversation moderated by Berkman Faculty Director Terry Fisher on the future of an open internet in the face of challenges to privacy in an unsecure world…
Video: They're Watching Us: So What?
With James Bamford, Ariel Dorfman, Glenn Greenwald, and Bruce Schneier.
Is the same surveillance that is meant to protect us from danger also harming us?
Are the NSA programs Edward Snowden has revealed inhibiting the way we think, speak, create, and interact? And what about the parallel universe of private sector spying and data mining?
Join luminaries from the fields of literature, technology, media, and policy for a discussion of what we know—and don’t yet know—about how surveillance is reshaping our public and private lives.
Video: Technical Plenary: Hardening the Internet
A technical plenary featuring security researcher Bruce Schneier along with IETF leaders Brian Carpenter, Stephen Farrell and others.
New reports of large-scale Internet traffic monitoring appear almost every day. We were all aware that targeted interception was taking place, but the scale and scope in the recent reports is surprising. Such scale was not envisaged during the design of many Internet protocols; the threat is quite different than expected. Now, the Internet community must consider the consequences.
While details of these attack techniques remain largely unknown, we can talk about possible ways to harden the Internet in light of pervasive Internet monitoring. We can take a closer look at our protocols and the security properties that they provide…
Video: Smashing the Future for Fun and Profit
Has it really been 15 years? Time flies when keeping up with Moore’s law is the measure. In 1997, Jeff Moss held the very first Black Hat. He gathered together some of the best hackers and security minds of the time to discuss the current state of the hack. A unique and neutral field was created in which the security community—private, public, and independent practitioners alike could come together and exchange research, theories, and experiences with no vendor influences. That idea seems to have caught on. Jeff knew that Black Hat could serve the community best if it concentrated on finding research by some of the brightest minds of the day, and he had an uncanny knack for finding them. Please join Black Hat for this very special session, as we bring together 5 of the original 1997-98 speakers: Jeff Moss, Bruce Schneier, Marcus Ranum, Adam Shostack, and Jennifer Granick to share their vision of security over the next 15 years. One of Black Hat’s core values is its focus on cutting edge research and emergent technologies. So there will be no war stories in this session. Each speaker will have the opportunity to deliver his or her own view. Based on the track records, take good notes…
Video: Privacy in the Age of Big Data: What's Going On Out There?
On a panel at the Privacy in the Age of Big Data Forum in New Zealand, Bruce Schenier spoke about trends in personal data collection and usage.
Watch the Video on YouTube: Parts 1, 2, and 3
Read the Transcript on Privacy-PC.com
Video: Software Liability: Our Saving Grace or Kiss of Death?
“Software could be more secure” may be the understatement of the century. Vulnerabilities have infested our code for as long as there’s *been* code. Nobody refutes the notion that we want more secure code; it is getting there that is the challenge – and also the focus of this debate. Software liability is oft-cited as one potential approach to creating more secure code. Clearly, there are strong advocates and as strong detractors. Today is the day we work everything out and decide whether software liability would be our saving grace or the kiss of death…
Video: Panel: Cyberwar, Cybersecurity, and the Challenges Ahead
In this keynote panel, explore the complex and evolving issues tied to cybersecurity and conflict in cyberspace in the 21st Century from leading experts in the field. Moderated by Dr. James Lewis of the Center for Strategic and International Studies, this session will include discussion on thresholds for cyberwar, the often confusing terminology used for various types of cyber conflict, and what needs to be done in the international context to secure cyberspace while also deterring the possible escalation of various kinds of cyber attacks and conflict…
Video: Schneier-Ranum Face-Off on The Future of Information Security
At Information Security Decisions 2009, Bruce Schneier and Marcus Ranum took to the stage to discuss some of the most contested issues in information security.
Video: Face-off: Who Should Be in Charge of Cybersecurity?
Recent attacks on the power grid, stolen fighter jet plans, and SCADA system security woes have thrust national cybersecurity into the limelight. The reaction has been as expected: Congress is asking tough questions, and the White House has reviewed federal networks and security processes. One key question remains unanswered: Which government agency should be running the show? Many have called for a newly created White House position to oversee cybersecurity and report directly to the president, while others wonder what role intelligence agencies such as the National Security Agency (NSA) will play in leading the country’s cybersecurity efforts. Security experts Bruce Schneier, CTO of BT Global Services, and Marcus Ranum, CTO at Tenable Network Security, debate all sides of the issue in this Face-Off, a recorded version of their popular point-counterpoint columns published regularly in Information Security magazine…
Video: Face-off: Assessing Cloud Computing Risks
Cloud computing offers enterprises many enticing capabilities that could save companies significant hardware and computing costs. But as with any offloading of services, there is a risk that must be considered and absorbed as well. Companies choosing to buy processing power, services or store data in the cloud must vet their providers well and ultimately trust that their security processes meet your needs. Security experts Bruce Schneier, CTO of BT Global Services, and Marcus Ranum, CTO at Tenable Network Security, debate all sides of the issue in this Face-Off. Schneier and Ranum are at odds over whether there are really any new risks associated with cloud computing, how much trust organizations should have in a provider and what questions you need to ask. This is a recorded version of their popular point-counterpoint columns published regularly in Information Security magazine…
Sidebar photo of Bruce Schneier by Joe MacInnis.