Cybersecurity and Cyberwarfare

The use of computers and the Internet in conducting warfare in cyberspace.

Sponsor: 

Federal Trade Commission

Date: 
Tue, 12/11/2018 - 16:00 to Wed, 12/12/2018 - 22:30

The data security hearings will include five panel discussions and additional discussion of research related to data breaches and data security threats. The first day’s panel discussions will examine incentives to invest in data security and consumer demand for data security. Discussions on the second day will focus on data security assessments, the U.S. framework related to consumer data security, and the FTC’s data security enforcement program.



Sponsor: 

New America’s Open Technology Institute (OTI), Mozilla, and Stiftung Neue Verantwortung

Date: 
Tue, 12/11/2018 - 21:30 to 23:15

Countries around the world are struggling with questions surrounding governments’ acquisition, assessment, use, and management of software and hardware vulnerabilities. When may governments retain a vulnerability for exploitation by law enforcement or intelligence agencies instead of disclosing it for repair?



ITU’s Plenipot: What Happened

Every four years, International Telecommunication Union (ITU) member states meet at a three-week conference, the Plenipotentiary (or the Plenipot), to set the priorities of the organization for the next period and elect its top five leadership positions. The 2018 Plenipot took place in Dubai, from the end of Oct to the middle of Nov. Here are some of the key issues that Public Knowledge followed in the Plenipot:

DOJ charges Iranian hackers with attacks on US cities, companies

The Justice Department unsealed charges against two Iranian criminal hackers who allegedly used ransomware to hit American hospitals, universities, government agencies and the city of Atlanta (GA), causing tens of millions of dollars in damages. More than 200 victims were affected, more than $6 million in ransom was collected and damages exceeded $30 million, officials said. Ransomware encrypts data on affected systems, with an offer to decrypt if a ransom is paid.

Sponsor: 

Congressional Hispanic Caucus Institute

Date: 
Wed, 11/28/2018 - 14:00 to 21:00

 

REGISTRATION & NETWORKING BREAKFAST 8:00AM - 9:00AM

OPENING PLENARY 8:45AM-10:30AM

BREAK-OUT SESSIONS 10:45-11:45AM

LUNCH 12:00PM-1:30PM

CLOSING PLENARY 1:45PM-3:00PM



Sponsor: 

Council to Secure the Digital Economy

Date: 
Thu, 11/29/2018 - 19:30 to 21:00

Industry experts will discuss the development of the report and strategies for government and industry collaboration on combating cyber threats domestically and internationally.

Welcome

  • Robert Mayer, Senior Vice President, Cybersecurity, USTelecom

 

Keynote

  • The Honorable Christopher Krebs, Director, DHS Cybersecurity and Infrastructure Security Agency (CISA)

 

Panel 1: The Development of the International Anti-Botnet Guide



Washington Asks Allies to Drop Huawei

The US government has initiated an extraordinary outreach campaign to foreign allies, trying to persuade wireless and internet providers in these countries to avoid telecommunications equipment from China’s Huawei Technologies Co., apparently. American officials have briefed their government counterparts and telecom executives in friendly countries where Huawei equipment is already in wide use, including Germany, Italy and Japan, about what they see as cybersecurity risks.

Ivanka Trump used a personal email account to send hundreds of emails about government business

In 2017, Ivanka Trump sent hundreds of emails to White House aides, Cabinet officials and her assistants using a personal account, many of them in violation of federal records rules. White House ethics officials learned of Trump’s repeated use of personal email when reviewing emails gathered by five Cabinet agencies to respond to a public records lawsuit.

Review of Controls for Certain Emerging Technologies

The Department of Commerce's Bureau of Industry and Security (BIS) controls the export of dual-use and less sensitive military items through the Export Administration Regulations (EAR), including the Commerce Control List (CCL). As controls on exports of technology are a key component of the effort to protect sensitive U.S. technology, many sensitive technologies are listed on the CCL, often consistent with the lists maintained by the multilateral export control regimes of which the United States is a member.

2018 Report to Congress from the US-China Economic and Security Review Commission

The scale of Chinese state support for the Internet of Things (IoT) and 5G, the close supply chain integration between the United States and China, and China’s role as an economic and military competitor to the United States create enormous economic, security, supply chain, and data privacy risks for the United States.