Cybersecurity and Technology - Audio

By Center for Strategic and International Studies

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store.


Category: Technology

Open in iTunes


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 99
Reviews: 0

Description

CSIS looks at how rapidly changing technology and cybersecurity are affecting the world in the twenty-first century. Issues covered include intelligence, surveillance, encryption, privacy, military technology, space, and more. Programs leading the research on this topic include the Technology Policy Program and the International Security Program. Find the latest research from our scholars and CSIS events on this topic below.

Episode Date
Bankruptcy Courts and National Security
20:32
Cyber & Tech Attorney Camille Stewart talks with host Beverly Kirk about how U.S. adversaries access sensitive national security technologies and intellectual property through bankruptcy proceedings. They also discuss what’s being done to better protect information when companies fail.
Aug 07, 2019
5G Innovation and Security
2:57:40

The development of 5G technologies is a focus of intense competition. This event will focus on how the United States can best work to develop a common approach to 5G security while remaining at the forefront of 5G innovation. Please join us for interactive discussions with senior leaders in industry and government. 

Agenda

2:30 pm — Opening Remarks by Director Christopher Krebs, Cybersecurity and Infrastructure Security Agency, U.S. Department of Homeland Security

2:40 pm — Industry Panel – “Security in 5G

Moderator
Kim Hart, Managing Editor, Axios

Panelists
Jason Boswell, Head of Security, Network Product Solutions, North America, Ericsson
John Godfrey, Senior Vice President, Public Policy, Samsung
Susie Armstrong, Senior Vice President, Engineering, Qualcomm
Peter Lord, Vice President, Strategic Initiatives, Oracle

3:25 pm — Conversation on the International Landscape of 5G with Ambassador Robert Strayer, Deputy Assistant Secretary for Cyber and International Communications and Information Policy, U.S. Department of State

3:55 pm — Industry Panel – “Innovation in 5G

Moderator
Denise Zheng, Vice President, Business Roundtable

Panelists
Eric Wenger, Director, Cybersecurity and Privacy Policy,  Cisco
Kevin Linehan, Vice President, Office of Chief Technology Officer, CommScope
Chris Boyer, Assistant Vice President, Global Public Policy, AT&T
Valerie J. Parker, Director, PE Network and Edge Compute Business and Technical Strategy, Intel  
 

4:40 pm — Panel - "U.S. Government Approach to 5G Innovation and Security" 

Moderator
Clete Johnson, Senior Fellow, CSIS & Partner, Wilkinson Barker Knauer LLP
 
Panelists
Commissioner Geoffrey Starks, U.S. Federal Communications Commission
Director Christopher Krebs, Cybersecurity and Infrastructure Security Agency, U.S. Department of Homeland Security
Jennifer Lane, Senior Counsel, Office of the General Counsel, U.S. Department of Commerce
 

This event is made possible with support from Business Roundtable.

Jul 31, 2019
Network Futures: 5G, SDN and the Internet
1:28:25
Telecom technology is changing again, and it's more than the move to 5G.  How and when it changes will have a  major effect on key issues like Huawei's efforts to dominate the telecom market, supply chain diversity, and how your phone, car or factory connects to the internet.  New technologies will reshape the security debate and markets.  Please join us for an interactive discussion of  the policy and business implication of the future of 5G.  Agenda

8:45 am - Registration 

9:00 am - Introductions

James A. Lewis
Senior Vice President & Director, CSIS Technology Policy Program
 
9:05 am - Moderated Discussion

Chris Boyer
Assistant Vice President of Global Public Policy, AT&T

Travis Russell
Director of Cybersecurity, Oracle

Stein Lundby
Head of Corporate Technology Strategy, Qualcomm

Thierry Maupilé
Executive VP, Chief Strategy & Product Management

Moderated by James A. Lewis

10:00 am - Audience Q&A

10:30 am - End

This event is made possible through general support to CSIS. 

Jul 10, 2019
Debate: "Should the United States severely restrict Huawei's business?"
1:29:39
The Yes Team Martijn Rasser
Senior Fellow, Technology and National Security Program
Center for a New American Security

Dan David 
Founder
Wolfpack Research LLC
 
vs.
 
The No Team
 
Paul Triolo
Practice Head, Geo-Technology
Eurasia Group

Erin Ennis
Senior Vice President
US-China Business Council 

In May 2019 the Trump administration took several steps aimed at limiting the business activities of Huawei because of national security concerns. The president issued an executive order banning the sale of Huawei products in the United States, expanding restrictions that were first applied to federal government agencies. Furthermore, the Commerce Department placed Huawei on its “Entities List,” banning American firms from supplying products and services to Huawei. Four days later, the Commerce Department issued a “Temporary General License” (TGL) allowing firms to provide support for previously concluded business. The TGL is set to expire on August 19. These steps represent not only a major adjustment in American treatment of Huawei and potentially American policy toward China, but also how the world should manage the increasingly fraught technology-national security nexus. 
 
This event features a formal debate on the question, “Should the United States severely restrict Huawei’s business?” Arguing “yes” is the team of Martijn Rasser of the Center for a New American Security and Dan David of Wolfpack Research LLC. Arguing “no” is the team of Paul Triolo of the Eurasia Group and Erin Ennis from the US-China Business Council. CSIS’s Scott Kennedy will moderate the debate as well as the subsequent follow-up discussion with the participants and audience about the pros and cons of specific actions toward Huawei and the implications for US-China relations, American foreign policy, and the shape of the global economy. 

This event is made possible through general support to CSIS. 
Jun 28, 2019
Dead Cows, Oxblood and Other Cyber Vigilantes: A History of Hacktivism
42:33

Hacktivism – hacking for social change – has a rich history that started with a little-known group called the Cult of the Dead Cow. Jim Lewis talks with Joseph Menn, a renown cybersecurity reporter, to discuss his new book, Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World. They examine the legacy of some of the original cyber vigilantes, and new trends in the hacktivist community, from infiltrating spyware vendors to intelligence agencies.

Jun 25, 2019
Collateral Damage? Research Collaboration in an Age of U.S.-China Competition
1:58:36
Keynote Remarks
Norman R. Augustine
Former Chairman and Chief Executive Officer of Lockheed Martin; former Undersecretary of the Army; current member of advisory boards to the Department of Homeland Security and Department of Energy

Introduced by
Matthew P. Goodman 
Senior Vice President and Simon Chair in Political Economy, CSIS
 
Followed by an expert panel discussion including:
Mikko Huotari
Deputy Director, Mercator Institute for China Studies

Dr. Richard Lester
Associate Provost for International Activities, Massachusetts Institute of Technology

Harvey Rishikof
Director of Policy and Cyber Security Research and Visiting Research Professor at the University of Maryland 

Moderated by
Stephanie Segal
Deputy Director and Senior Fellow, Simon Chair in Political Economy, CSIS

Over the past year, the United States has introduced several new policy initiatives to limit foreign access to critical technologies, including tightening inbound investment screening procedures and expanding export controls on emerging and foundational technologies. At a Senate Intelligence Hearing on Worldwide Threats in February 2018, FBI Director Christopher Wray warned of other countries “exploiting the very open research and development environment” in the United States and counterintelligence risks from “nontraditional collectors, especially in the academic setting, whether it’s professors, scientists, students.” The United States is reevaluating its posture on foreign research collaboration. Various U.S. government agencies have increased scrutiny of researchers from sensitive countries while recent legislative proposals would restrict foreign students’ access to certain research projects.
 
Policymakers have to evaluate the tensions between national security and an open and welcoming investment and innovation environment, as well as the degree to which such efforts should be coordinated with allies and partners. Notably, officials will have to decide whether to expand limits on research collaboration, while ensuring the United States remains the premier destination for top global talent.
 
Please join the CSIS Simon Chair in Political Economy at 2:00pm on Tuesday, June 4, for keynote remarks by Norman R. Augustine, former Chairman and Chief Executive Officer of Lockheed Martin, former Undersecretary of the Army, and current member of advisory boards to the Department of Homeland Security and Department of Energy, followed by an expert panel discussion on balancing national security concerns with research competitiveness.

This event is made possible through the generous support of member governments of the CSIS Allied Economic Forum.
 
Jun 04, 2019
Quantum: Closer Than We Think
31:34

Quantum computing has been an ethereal concept for years, but what is it really? China is investing heavily in its development, but is the United States really falling behind? Jim Lewis sits down with Michael Brett, CEO of QxBranch, to dispel some of the common myths about quantum computing. They discuss how the U.S. can harness quantum’s potential, and how to face current challenges to American innovation.

May 24, 2019
Managing New Style Warfare
31:08

Host Jim Lewis interviews Keith Alexander, a retired four-star general who served as commander of the United States Cyber Command and director of the National Security Agency in the Bush and Obama administrations. Listen in to hear how General Alexander helped establish and structure U.S. Cyber Command. General Alexander talks about NSA modernization, the different responsibilities that the Department of Defense, Federal Bureau of Investigation, and the Department of Homeland Security have to address cybersecurity threats; the current threats in cyberspace; and the merits of persistent engagement.

May 10, 2019
Cyber From The Start: What Keeps You Up At Night?
1:00:42

Host Jim Lewis interviews Admiral Michael McConnell, former Director of the National Security Agency, and the second Director of National Intelligence. As head of the NSA during the early days of the internet, he helped set the path for how the U.S. intelligence community responded to the opportunities and risks of emerging digital technologies. They discuss how the nature of surveillance transformed with the emergence of the internet, how U.S. vulnerability to cyber threats has changed over time, and what needs to be done to confront the growing cyber threat posed by our nation’s adversaries.

Apr 26, 2019
What Keeps You Up At Night?
30:41

Host Jim Lewis interviews Admiral Michael McConnell, former Director of the National Security Agency, and the second Director of National Intelligence. As head of the NSA during the early days of the internet, he helped set the path for how the U.S. intelligence community responded to the opportunities and risks of emerging digital technologies. They discuss how the nature of surveillance transformed with the emergence of the internet, how U.S. vulnerability to cyber threats has changed over time, and what needs to be done to confront the growing cyber threat posed by our nation’s adversaries.

Apr 26, 2019
Supply Chain Security and Software
1:48:32

Please join us for a public event on initiatives for securing the software supply chain on Wednesday, April 24, 2019 from 1:00-3:00 pm at the CSIS headquarters.

Within the U.S. government, there is increasing awareness of and movement on the need for a coordinated strategy to prevent, identify, and respond to threats stemming from the software supply chain throughout the acquisition process. At this event, we will discuss some of the various initiatives, including the Department of Defense’s Deliver Uncompromised, along with work at the Carnegie Mellon, BSA | The Software Alliance, and the Department of Commerce, designed to minimize the risk of compromised software infiltrating critical systems. 

Opening Speech  1:00 pm -

Registration 12:45 pm -
 William Stephens,Director, Counterintelligence, Defense Security Service, Department of Defense

Moderated Discussion 1:15 pm -
Allan Friedman, Director of Cybersecurity Initiatives, National Telecommunications Information Administration 
Bob Metzger, Co-Author MITRE "Deliver Uncompromised"; Head of DC Office, Rogers Joseph O’Donnell, P.C.
Tommy Ross, Senior Director, Privacy, BSA | The Software Alliance
Roberta Stempfley, Director, CERT Division, Carnegie Mellon University Software Engineering Institute
Derek Weeks, Vice President, Sonatype Inc. 

Moderated by 
James A. Lewis, SVP and Director, CSIS Technology Policy Program

2:45 pm - Audience Q&A

3:00 pm - End

This event is made possible through general support to CSIS. 

Apr 24, 2019
Cyber From The Start: The Fifth Domain
30:08

In this episode Jim Lewis interviews William J. “Bill” Lynn, CEO of Leonardo DRS, a leading defense contractor, about his time as the Comptroller and Deputy Secretary of Defense. At the Department of Defense (DoD) he created a new kind of partnership between companies in the defense industrial base (DIB) through the DIB program and helped reorient DoD to treat cyber as a fifth domain.

Apr 12, 2019
The Fifth Domain
27:28

In this episode Jim Lewis interviews William J. “Bill” Lynn, CEO of Leonardo DRS, a leading defense contractor, about his time as the Comptroller and Deputy Secretary of Defense. At the Department of Defense (DoD) he created a new kind of partnership between companies in the defense industrial base (DIB) through the DIB program and helped reorient DoD to treat cyber as a fifth domain.

Apr 12, 2019
Turf Battles
30:41

Host Jim Lewis interviews Dick Clarke, who served as a senior advisor in the Clinton, Bush and Obama administrations, helping to create the first national cybersecurity strategy. He began looking at cybersecurity as a national security issue in the ‘90s and has been central to thinking about cybersecurity for decades. They discuss the awakening of government and industry to cybersecurity threats, the real implications of cyber attacks, and the difficulties of coordinating government efforts.

Mar 29, 2019
Putting Cybersecurity On The Map
33:48

In this first episode, host Jim Lewis interviews John Hamre, President and CEO of CSIS and Former Deputy Secretary of Defense. He was one of the first to recognize the strategic implications of cybersecurity and cyber conflict, and who helped lead the DoD in its early approaches to emerging cyber issues. He discusses the hacking incidents that first alerted policymakers to the cyber threats faced by the U.S.; the obstacles and successes in working with other agencies, Congress, and the private sector to address cyber threats; and how to chart a path towards developing structures and doctrines to manage cyber risks.

Mar 15, 2019
Whose Rules? Digital Governance and the Pursuit of Technological Leadership
2:24:01

A fragmented model of digital governance is emerging. Data regulation, technical and ethical standards, and market leadership are all in flux, raising questions about whose rules, if any, will become the global standard. This CSIS Simon Chair event will look at the evolution of technology and digital governance in the world’s major economies – the United States, Europe, China, and Japan – and how competing visions and differing priorities are shaping national and regional approaches to digital governance. 

Featuring a keynote address from Representative Suzan DelBene (D-WA)

Closing remarks from former Deputy US Trade Representative Ambassador Robert Holleyman

Expert panel featuring:

  • Peter FatelnigMinister Counsellor for Digital Economy Policy, Delegation of the European Union to the United States

  • Naoki Ota, Founder, New Stories Ltd. Former Special Adviser to the Minister, Ministry of Internal Affairs and Communications, Japan 

  • Diane RinaldoDeputy Assistant Secretary, National Telecommunications and Information Administration (NTIA), Department of Commerce

  • Paul TrioloPractice Head, Geotechnology, Eurasia Group
  • Shaundra WatsonDirector, Policy, BSA | The Software Alliance 

  • Stephanie Segal (Moderator), Simon Chair Senior Fellow and Deputy Director, CSIS

This event was made possible by support from the Japanese Embassy.

Mar 04, 2019
Mitigating Security Risks to Emerging 5G Networks
1:30:00

Please join us for a public event on mitigating security risks for emerging 5G wireless networks on Wednesday, February 6th, 2019 from 1:00 pm - 2:30 pm at the CSIS headquarters. 

At this event, our keynote speaker FCC Commissioner Jessica Rosenworcel and the following expert panel will discuss the challenges and opportunities presented by emerging 5G networks, and how standards and security procedures can create a resilient and secure framework for 5G network implementation. They will also discuss the findings and recommendations in the Communications Security, Reliability, and Interoperability Council (CSRIC) VI's report on 5G security released in September 2018. 

Agenda
12:45 pm - Registration
 
1:00 pm - Keynote Speech
The Honorable Jessica Rosenworcel, Commissioner, Federal Communications Commission
 
1:20 pm - Moderated Discussion
Chris Boyer, Assistant Vice President, Global Public Policy, AT&T

John Costello, Director of Strategy, Policy, and Plans, Cybersecurity and Infrastructure Security Agency, U.S. Department of Homeland Security

Travis Russell, Director, Cybersecurity, Oracle Communications; Chairman, Working Group 3, FCC Communications Security, Reliability, and Interoperability Council

Ambassador Robert Strayer, Deputy Assistant Secretary for Cyber and International Communications and Information Policy, U.S. State Department

Moderated by Clete Johnson, Partner, Wilkinson, Barker, Knauer LLP; Senior Fellow, CSIS

 
2:15 pm - Audience Q&A
 
2:30 pm - End
 

This event is made possible through general support to CSIS. 

Feb 06, 2019
China's Digital Silk Road
1:53:23

Launched in 2013, China's Belt and Road Initiative (BRI) strives to improve infrastructure, trade, financial integration, and people-to-people bonds across more than 80 countries. Its digital dimensions are far-reaching, including fiber optic cables, 5G networks, satellites, and devices that connect to these systems. Please join the CSIS Reconnecting Asia Project for a discussion of these developments and their implications for U.S. economic and strategic interests.

 
Featuring an expert panel discussion with
Dr. Robert Atkinson
President, Information Technology and Innovation Foundation

Lt. Gen. William Mayville (Ret.)
Former Deputy Commander, U.S. Cyber Command

Emily Rauhala
Staff Writer, The Washington Post
 
Moderated by
Kate O'Keeffe
Reporter, The Wall Street Journal
 
Welcoming remarks by
Matthew P. Goodman
Senior Vice President; William E. Simon Chair in Political Economy and Senior Adviser for Asian Economics
 
With special presentations by

Hirobumi Kayama
Special Advisor, Japan Ministry of Economy, Trade, and Industry

Jonathan E. Hillman
Senior Fellow, Simon Chair in Political Economy, and Director, Reconnecting Asia Project
 
This event is made possible by generous support from JETRO NY.

Feb 05, 2019
The Business of Software Innovation
1:25:48

The speakers will discuss business models through which the U.S. government and industry can work together in developing software for national security capabilities. The discussion will explore how the government and industry can create the right incentives to develop and iteratively modernize software for government applications with the goal of delivering innovation and advanced capabilities at the speed of relevance in a highly competitive international security environment.  At the same time, the government’s business model for software development must present a return on investment that makes this an attractive business proposition for industry. Increasingly, software is the driver for advances in critical warfighting systems like the Aegis Combat System, the Global Positioning System, the Battlefield Communications Node, and many other systems. As a result, the business model for software acquisition is a key enabler for the National Defense Strategy.

This event is made possible through general support from Northrop Grumman.

Jan 29, 2019
Dawn of the Code War
1:28:29
Please join us for an armchair discussion on responses to national security threats in cyberspace from the Department of Justice, featuring John P. Carlin, Former Assistant Attorney General, National Security Division; and John C. Demers, Assistant Attorney General, National Security Division, on Tuesday, January 15th from 5:30 pm - 7:00 pm at the CSIS headquarters. 

In his new book, Dawn of the Code War, Mr. Carlin discusses the rise of cyber threats from U.S. adversaries, and the strategies that have been developed to combat them. At this event, Mr. Carlin and Mr. Demers will discuss the nature of these threats and, more importantly, the U.S. response, including indictments of Russian, Chinese, Iranian, and North Korean nationals. The discussion will focus on the actions the Department of Justice is already taking to combat cyber threats and mitigate risks, and how this could change the cyber threat environment. 
  John P. Carlin
Partner, Morrison & Foerster LLP; Former Assistant Attorney General, National Security Division, Department of Justice 

John C. Demers
Assistant Attorney General, National Security Division, Department of Justice

Moderated by 
James A. Lewis
Senior Vice President and Director, CSIS Technology Policy Program 

This event is made possible through general support to CSIS. 
Jan 15, 2019
Extending Federal Cybersecurity to the Endpoint
1:22:49
Please join us for a panel discussion on Thursday, December 13th at the Center for Strategic and International Studies on extending federal cybersecurity to endpoint devices. While cybersecurity awareness in the federal government has improved, along with efforts to provide more secure architectures and managed security services for federal networks, these efforts are focused on systemic risks and vulnerabilities in core infrastructures. Few extend to the millions of endpoint devices connected to these systems.

The panel will discuss how federal agencies can move toward a more flexible, user-centered architecture for federal networks to manage evolving security threats. We will also consider how the federal government should think about managing vulnerabilities in the rapidly growing number of consumer devices connected to federal networks.

1:00 pm - Keynote Remarks
Suzette Kent, Federal Chief Information Officer, Office of Management and Budget, Executive Office of the President 

1:20 pm - Panel Discussion
Ryan Gillis, Vice President, Cybersecurity Strategy and Global Policy, Palo Alto Networks
Daniel Chenok, Executive Director, IBM Center for Business of Government 
Todd Gustafson, President & Head of US Public Sector, HP Federal LLC

This event was made possible through support from HP, Inc. 

Dec 13, 2018
Security and Technology in the Air
19:11

Linda Jojo, Executive Vice President for Technology and Chief Digital Officer, United Airlines, joins Beverly Kirk on the Smart Women, Smart Power Podcast for a conversation on how technology is transforming the airline industry and how airlines are thinking about security in the digital age. 

Nov 21, 2018
Countering Adversary Attacks on Democracy—It's not just about elections
1:13:18


This discussion, following the midterm elections, will assess what we saw--and didn't see--in those elections.  It will also examine foreign influence operations that go beyond elections to undermine other democratic institutions, such as our justice system, and democracy itself.   Finally, we will discuss ways to counter this national security threat.


This event is made possible with the help of the American Bar Association Committee on Law and National Security and the financial support of the William and Flora Hewlett Foundation and the Democracy Fund.

Nov 15, 2018
Harnessing Artificial Intelligence to Innovate and Grow - A Conversation with Julie Sweet, CEO - Accenture North America
57:23


Please join the Center for Strategic and International Studies for a Smart Women, Smart Power conversation with Julie Sweet, Chief Executive Officer of Accenture North America. She will discuss artificial intelligence, innovation, and re-skilling the workforce for the future.

Ms. Sweet leads Accenture's business in the United States, its largest market, as well as Canada. She is also a member of Accenture’s Global Management Committee. Prior to assuming this role, she served as Accenture’s general counsel, secretary and chief compliance officer. Before joining Accenture in 2010, she was a partner in the Corporate department of Cravath, Swaine & Moore, LLP.

Julie Sweet is a leader on issues including innovation, the impact of technology on business, and inclusion and diversity. In 2018, she was named to FORTUNE’s list of “Most Powerful Women” for the third consecutive year. Ms. Sweet co-chairs the Canada-United States Council for Advancement of Women Entrepreneurs and Business Leaders. In addition, she serves on the Board of the Business Roundtable and chairs the Business Roundtable’s Technology Committee.

Ms. Sweet holds a Bachelor of Arts degree from Claremont McKenna College and a Juris Doctor degree from Columbia Law School.

This event is made possible through support from Citi.
Nov 05, 2018
Artificial Intelligence and National Security: The Importance of the AI Ecosystem
1:49:47

Join the Defense-Industrial Initiatives Group and the International Security Program for a discussion on national security, artificial intelligence, and the nexus between AI’s national security applications and its broader commercial applications. At this launch event, we will present the research and findings of our newest report, Artificial Intelligence and National Security: The Importance of the AI Ecosystem. A public panel discussion will follow, where dialogue will focus on opportunities and challenges in AI investment, adoption, and operational management in the context of national and international security.

This report is made possible by the generous support from Thales USA, Inc.

Nov 05, 2018
Modernizing the Social Security Number: A Better Basis for Identity Innovation
1:37:16


Please join us on Wednesday, October 10, for a discussion on a new CSIS report Modernizing the Social Security Number (SSN), with opening keynote remarks by Congressman Sam Johnson (R-TX). Congressman Johnson is a member of the House Committee on Ways and Means where he serves as the Chairman of the Social Security Subcommittee. The opening remarks will be followed by remarks by Candace Worley, Vice President and Chief Technical Strategist at McAfee, and a panel discussion.

The main identity credential in the U.S. is a paper Social Security Card largely unchanged since the 1930s. The SSN serves as a starting point for confirming identity in the U.S. and is central to the U.S. economy, but it is easily stolen and not designed to work in a digital environment. Modernizing the SSN with a secure process for verifying its use would make it harder to steal and create a foundation for innovation in authentication technology. 

The panel will discuss the challenges in improving identity authentication systems and what initial steps can be taken to improve privacy and security. We will also discuss the issues that have arisen from using the SSN as an authenticator and explore potential models for a modernized identity system.

8:45 am—Light Refreshments 

9:00 am—Opening Keynote Remarks
Congressman Sam Johnson (R - TX), Chairman, Social Security Subcommittee

9:05 am—Keynote Remarks
Candace Worley, Vice President and Chief Technical Strategist, McAfee, LLC

9:20 am—Panel Discussion
Paul Rosenzweig, Senior fellow, R Street Institute
Naomi Lefkovitz, Senior Privacy Policy Advisor, National Institute of Standards and Technology
Candace Worley, Vice President and Chief Technical Strategist, McAfee, LLC

Moderated by
James A. Lewis, Senior Vice President, Center for Strategic and International Studies

This event is made possible by general support to CSIS.

Oct 10, 2018
The Future of Blockchain Technology
1:24:12

Blockchain is increasingly recognized as a potentially transformative technology for business transaction infrastructure with its decentralized and transparent networks which form nodes or “blocks” linked by cryptography. Although its decentralized networks make blockchain less vulnerable to cyberattacks, it poses challenges for governments seeking to understand the technology’s many applications and develop appropriate regulatory “rules of the road.” How are governments thinking about the increased use of blockchain technology and its regulatory environment? How are businesses viewing the future of blockchain? What are the future trends in this space? Please join us on September 12th as our distinguished panel of experts will discuss the future of blockchain technology.

This event is made possible by the generous support of the Embassy of Lichtenstein.
Sep 12, 2018
The Future of Warfare Technology
51:59

Rebecca Hersman, Director of the Project of Nuclear Issues at CSIS; Katherine Charlet, Director Technology and International Affairs Program at Carnegie Endowment for International Peace; Dr. Lindsay Cohn, Associate Professor at the U.S. Naval War College; and Dr. Rupal Mehta, Assistant Professor at the University of Nebraska-Lincoln discuss the opportunities and challenges of current and future warfare tools and technology.
 
Jul 26, 2018
Interview with the Winners of the National Collegiate Cyber Defense Competition
20:55

William A. Carter of the Technology Policy Program interviews the UVA Cyber Defense Team, 2018 winners of the National Collegiate Cyber Defense Competition (NCCDC). NCCDC is a national red/blue team cyber defense competition in which undergraduates defend the networks of fictional companies against teams of real world professional hackers and contractors. The UVA team, formed just 3 months before the competition, describe how they came together to defeat 230 experienced teams from across the country, and the lessons they learned from the competition that can be applied to the challenges faced by real-world companies and policymakers.

Jul 09, 2018
Combatting Transnational Threats: Policing Crime and Terrorism in a Borderless World
58:44
Join Andrew Colvin, Commissioner of the Australian Federal Police (AFP), as he discusses the implications of destabilization in fragile and failed states for combatting transnational terrorism and organized crime in the West. After Commissioner Colvin’s remarks, Seth G. Jones, Harold Brown Chair and Director of the CSIS Transnational Threats Project, will host a moderated armchair discussion. This event is made possible through general support to CSIS.
Jun 14, 2018
How To Get to a Start-Up Continent
25:59

How do entire economies become more innovative?  Jackson Streeter, an expert on technology transfer, maps the ecosystem of innovation. Strong intellectual property rights, investments in research and development, a risk-taking mentality, and seed funding are all necessary parts. Can they be nurtured and developed in Latin America? Sarah’s Big Little News is the rise of marriage fraud in Costa Rica.  

Apr 26, 2018
Global Fragmentation in Cyber Policy
1:13:31
Governments around the world face daunting challenges in securing cyberspace, protecting online privacy, and managing the flows of data.  As these governments consider laws and policies to confront these challenges, there is growing divergence of approaches across the European Union, Asia, and the United States, potentially fragmenting global markets.  With regional views from Europe and Estonia, China, India, and the United States, our discussion will focus on the need for harmonization and cooperation on global approaches to cybersecurity and regulating emerging technologies.

Discussion will be moderated by Samm Sacks, senior fellow, Technology Policy Program, and speakers will include Chris Painter, the former coordinator for cyber issues at the U.S. Department of State; Helen Popp, the second secretary of digital policy and economic affairs at the Estonian Embassy; Tommy Ross, the senior director for Policy at BSA | The Software Alliance; and Jay Gullish, the head for digital economy, media and entertainment at the U.S.-India Business Council.

Light refreshments will be served from 9:00 - 9:30 AM. 

This event is made possible through the support of BSA | The Software Alliance.
Apr 25, 2018
Investigations and Cross-border Data After the CLOUD Act
1:57:30

Join us for a series of discussions with experts from industry, law enforcement, and government on how the recent passage of the CLOUD Act will reshape how U.S. and other law enforcement agencies can access cross-border data to conduct investigations. 

9:00 AM        Coffee & light refreshments

9:30 AM        Panel I: US Warrants for Data, Conflict of Laws and Comity Analysis in the aftermath of the CLOUD Act

Sandra Moser, David Bitkower, Alexander Berengaut, Kelly Hagedorn 

10:30 am      Panel II: Future of Cross-border Law Enforcement Cooperation

Kevin Adams, Hasan Ali, Richard Downing, Jennifer Daskal

 

Additional speakers to be announced.

This event is made possible through general support to CSIS.

Apr 04, 2018
"Star Wars" and Cyber: Can History Help Us Build Today's Defenses?
1:18:43

Building effective cyber defenses is a major challenge for defense planners, just as missile defense has been since the original Strategic Defense Initiative. In both realms the offense has the advantage, making effective defense difficult. Missile defense, however, now has several decades of experience producing and fielding new technologies. Are there lessons to be learned — or avoided?

The Project on Military and Diplomatic History will host a panel discussion of CSIS experts on the history of missile defense, its experience in developing new technologies, and what these tell us about the challenges for building effective cyber defenses. The session will include a briefing by U.S. Army Captain James Torrence on his award-winning essay “Cyber Defense and the Strategic Defense Initiative”.

This event was made possible by donations in support of the Project on Military and Diplomatic History.

Mar 23, 2018
Responding to Russia: Deterring Russian Cyber and Grey Zone Activities
1:31:09

Russian efforts to sow discord in democratic societies have leveraged traditional covert and clandestine tools, military confrontation, and new technologies such as social media platforms, to shape political events beyond their borders. This approach is low cost, seemingly low risk, and has been more successful than Russian leaders could have imagined.  Responding to these tactics requires some kind of response if we are to change Russian behavior. Join us for a public discussion of what are the options are for responding to Russian activities. Speakers will discuss what tools the U.S. government has at its disposal to impose consequences and combat Russian encroachment.

This event is made possible through general support to CSIS.

Mar 16, 2018
Talking China, Tech, & Ethics with Kaiser Kuo
15:05

In this podcast, we talk with Kaiser Kuo, longtime China technology watcher and practitioner, and co-host of the Sinica podcast. In an environment where Xi Jinping is president for life, understanding China’s approach to emerging technology, innovation, and the Chinese Communist Party’s censorship of new media is fundamental for tracking geopolitics in East Asia. As the former director for international communications for Baidu, a Chinese search engine giant, Kaiser is uniquely positioned to assess trends in China’s innovation ecosystem, Chinese discussions about the ethics of emerging technologies, and the differences between the tech space in the United States and China.    

Hosted by Will Colson. Audio edited by Ribka Gemalingsari. Written and Produced by Jeffrey Bean.    

Learn more about China on the Sinica podcast via SupChina here.  

Mar 05, 2018
A National Machine Intelligence Strategy for the United States
1:15:01
The Technology Policy Program invites you to the launch of our upcoming report, A National Machine Intelligence Strategy for the United States.
The United States is at the precipice of a defining moment in history. Over the past five years, progress in machine intelligence (MI) has greatly accelerated. From the defeat of Go champion Lee Sedol by DeepMind’s AlphaGo program to the first deployments of fully-autonomous vehicles on public roads,  recent events are challenging us to re-evaluate what may soon be possible for computerized systems. MI systems have already begun to quietly pervade a growing share of businesses, governments, and individual lives around the world, and we are only just beginning to grasp the impacts that this technological revolution will have on our economy, our society, and our national security. In our paper, we outline they key elements of a comprehensive national strategy for the United States to promote the safe and responsible development of MI, and to maintain U.S. leadership in MI technology. MI will transform both economic and strategic power around the world, and leadership in MI technology will be essential to securing our future.

This project is made possible with support from Booz Allen Hamilton.
Mar 01, 2018
Winning the Frontier: U.S.-Japan Cooperation on Global Standards for Emerging Technologies, from AI to 5G
1:22:48
Please join the Simon Chair in Political Economy for an event on February 13, 2018, at 9:00am on the importance of cooperation on international standards in emerging technologies. As developments in artificial intelligence (AI), fifth generation (5G) mobile networks, big data, and autonomous vehicles become key drivers in the global economy, shaping the international dialogue on standards around new technologies has become essential to commercial and strategic interests. As technological leaders, the U.S. and Japan are well positioned to lead this effort and to ensure that fair, transparent, and efficient standards are put in place that will encourage continued innovation and efficiency, consumer welfare, and security. 

Featuring an expert panel, this event seeks to explore some of the key technologies where this debate is already underway, the actors involved in this space, and the competition to shape the emerging technological landscape. 

This event is made possible with the generous support of the Embassy of Japan. 
Feb 13, 2018
China’s Digital Economy and Cyber Governance
31:22
Samm Sacks, a senior fellow in the CSIS Technology Policy Program, tells host Beverly Kirk about advances and challenges in China’s digital economy and its cyber governance law and analyzes the likelihood of a trade war between the U.S. and China.
Jan 31, 2018
The Future of Technology for Development
19:36

This podcast features Ambassador Casper Klynge, Denmark’s first Technology Ambassador. In this interview, Ambassador Klynge discusses his new role and the growing importance of technology and Silicon Valley in the development agenda. Ambassadors are typically found in Washington D.C., but Ambassador Klynge has been tasked with strengthening Denmark's relationship with technology giants like Facebook and Google. To hear more from Ambassador Klynge, listen to the entire podcast.

Jan 29, 2018
Media and Ideology in Xi’s China
1:21:37

Please join the Freeman Chair for an exciting presentation by Georgia State University's Maria Repnikova, who will share with us the ways in which the Chinese party-state has adapted to the latest media technology environment and has changed not only the content of its message but the means by which it reaches its audiences. Professor Repnikova will put these developments in larger context and share illustrative examples from the Chinese media. Kaiser Kuo, a veteran of China’s media and pop culture, will then offer his insights and offer some ideas for further discussion. Freeman Chair Christopher K. Johnson will moderate the event.

The China Reality Check Series presents perspectives from academia, industry, and government in order to promote a sustained dialogue on critical and insufficiently understood issues related to China's reemergence as a global power.

Jan 29, 2018
Russia’s Electronic Warfare Capabilities to 2025
1:25:18

Roger McDermott examines how and why Russia’s military has turned its attention to more fully exploiting the electromagnetic spectrum by employing electronic warfare (EW) assets. He will discuss many of the key findings of extensive research in this area, including assessing current Russian EW capabilities and the future role of disruptive technologies in this domain. Mike Kofman, Research Scientist in the Russia Studies Program at CNA, will serve as discussant. Olga Oliker will moderate.

This event is made possible by the generous support of Carnegie Corporation of New York.

Jan 29, 2018
Taiwan’s Cybersecurity Environment: Challenges and Opportunities
1:21:36

Listen as the Freeman Chair effectively addressing Taiwan’s cybersecurity situation in a broader context and discuss recent developments, challenges requires Taiwan taking steps both internally as well as through cooperation with others.

Jan 05, 2018
Taiwan’s Cybersecurity Environment: Challenges and Opportunities
1:21:39

Information and communications technologies (ICT), including the Internet, have long been central to Taiwan’s economic prosperity. At the same time, the island faces complex cybersecurity challenges internally as well as vis-a-vis mainland China and the rest of the world. Effectively addressing these challenges requires Taiwan taking steps both internally as well as through cooperation with others. Join the Freeman Chair on Friday, January 5 for a presentation by Dr. Joseph Hwang on these issues. Dr. Hwang will place Taiwan’s cybersecurity situation in a broader context and discuss recent developments, followed by comments from CSIS Technology Program Senior Fellow, Samm Sacks. CSIS's Freeman Chair in China Studies and Senior Adviser, Christopher K. Johnson, will serve as moderator and will invite members of the audience to ask questions to the speakers. 

Jan 05, 2018
Xi Runs This Town
35:16

In this podcast, we take a deep dive into the outcomes of the Chinese Communist Party’s 19Party Congress.  Now that the dust has settled following Xi Jinping’s resounding win, we turned to two leading China-watchers to analyze the implications for China’s economic planning, PLA reform, foreign policy, anti-corruption effort, and censorship. Dr. Oriana Skylar Mastro, assistant professor of security studies at Georgetown University, and Christopher Johnson, chair of the CSIS Freeman Chair in China Studies, join us to help assess the takeaways across Chinese politics.

Hosted by Will Colson. Audio edited by Ribka Gemilangsari. Written and Produced by Jeffrey Bean.    

Read more from Dr. Oriana Mastro on China’s military reform and strategy here. Read Christopher Johnson’s analysis of the 19 Party Congress here.

Nov 20, 2017
U.S.-China Competition in Outer Space
31:47

In the 10 years since China’s first successful anti-satellite test, the vulnerability of essential U.S. space systems has been underscored and competition in outer space has resumed. How has the United States responded? What are the implications for strategy and deterrence in this new era?

In this podcast, CSIS experts Todd Harrison and Dr. Zack Cooper along with Secure World Foundation’s Dr. Brian Weeden talk about the changes in the space domain since the end of the Cold War and China’s expanding capabilities, describe how the proliferation of space technology has impacted other countries in the Indo-Pacific, and assess the implications for international cooperation in space exploration. Hosted by Will Colson. Audio edited by Ribka Gemilangsari. Written and Produced by Jeffrey Bean.

Read Todd Harrison and Zack Cooper’s new CSIS report: Escalation and Deterrence in the Second Space Agehere

See Brian Weeden’s recent work on U.S. space systems and U.S.-China strategic relations in space: U.S.-China Strategic Relations in Space (report chapter w/ Xiao He), NBR here.

The End of Sanctuary in Space, War is Boring here.

Use Outer Space to Strengthen U.S.-China Ties (w/ Xiao He), War on the Rocks here.

Nov 06, 2017
Report Launch: Innovation-Led Economic Growth
1:27:58
Innovation and technology are increasingly at the heart of economic growth around the world and will be crucial tools for addressing emerging issues such as global urbanization and growing demand for food, energy, and water. In this report, CSIS and RTI International assess the challenges and opportunities facing developing countries as they pursue innovation and technology-driven economic growth. The report includes analysis of three different sub-topics—education and human capital development, translational research and development and commercialization, and the innovation policy environment—as well as case studies from Kenya, Malaysia, and Gujarat, India. From this research collaboration, CSIS and RTI International hope to create a platform for engaging a broad set of actors to support the creation of knowledge-based economies and innovation-led economic growth in places where we never expected to find it before.
Oct 03, 2017
Strengthening the Federal Government's Cyber Defenses
1:57:07
After decades of effort to strengthen the federal government’s cyber defenses, are we really more secure? The federal government operates a patchwork of IT systems across multiple agencies, many of which are decades old, costly to maintain and contain known vulnerabilities. The President recently signed an executive order which highlighted the importance of strengthening the security of federal networks and outlined the new administration’s approach to dealing with these challenges. The order echoes Congressional efforts to provide agencies with the budget, authority, and legislative mandate to access cutting edge technologies and adopt shared services to increase efficiency, reduce costs, and improve security. CSIS is hosting an event to discuss how Congress and the Administration can strengthen the federal government’s cyber defenses.

Panel of experts to follow keynote addresses by Jeanette Manfra and Congressman Hurd.
Sep 29, 2017
Harnessing the Data Revolution with Dr. Naohiro Kitano
34:33

Dan hosted Dr. Kitano, Director of JICA-RI, for a discussion of our recent report, Harnessing the Data Revolution to Achieve the Sustainable Development Goals. The report analyzes the challenges and opportunities that exist in the pursuit of the revolution in development data globally. The conversation addresses the importance of both small and big data. Dr. Kitano also shares insights into Africa’s attempts to launch their first satellite into space.

Sep 29, 2017
Ransomware and Cybersecurity Cooperation
21:30
A spate of ransomware attacks in early 2017 hit millions of computer systems worldwide, including those of National Health Service hospitals in England and radiation monitoring stations in Chernobyl. The persistent spread of simple, cheap ransomware tools puts the onus on businesses and law enforcement to reconsider their tactics for mitigating the effects of cybercrime. CSIS will host a panel discussion on ransomware proliferation and effective tactics for business-law enforcement cooperation on cybersecurity.
Sep 14, 2017