SuitsandSpooks 2017 Jan. 11, 2017 to Jan. 11, 2017, washington,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Welcome and Orientation Jeffrey Carr N/A
How Exponential Trends Challenge Our Notions of Public Service, Nation States, and Positive ChangeAgents David Bray Our world is changing exponentially. Technologies that were once only available to large nation-state actors ...
Post DYN DDoS: Is Government Regulation of the Internet of Things on the Horizon? Gunter Ollmann , Greg Elin , Austin Carson , J.c. Herz , Kimberley Raleigh The 2015 DDOS attack on DNS provider DYN exploited vulnerabilities in DVDs and baby monitors ...
Tallinn 2.0: How We Addressed Issues of Sovereignty, Attribution, Espionage, Countermeasures, and Other Key Points of Cyber Warfare Under International Law Michael n. Schmitt The process of establishing international norms between nation states for acts involving cyber attacks is ...
Losing Privacy in the Wild West Levi Gundert The internet remains the new wild west, creating a cascade effect of personal victimization. We ...
Self-Subversion is Not Enough: How the Crowd Becomes the Next Dominant Paradigm of Intelligence Lewis Shepherd Government efforts to address accumulating failures and shortcomings in the performance of US Intelligence already ...
U.S. Intelligence Community Reforms: What Is The Best Path Forward? Graham Plaster , Lewis Shepherd , Bryan Hurd This panel will explore and debate alternative approaches to reforming intelligence analysis in the Intelligence ...
How Targeted Attacks from Russia Will Shape the Cybersecurity Landscape in 2017 Nicholas Palmer N/A
Shadowbrokers, Attribution, and Responsible Disclosure Gunter Ollmann , Anup K. Ghosh , Paul Kurtz , Andrey Nikishin Who are the ShadowBrokers? Their disclosure of stolen NSA documents on Pastebin assisted in assigning ...
Demo TruSTAR Paul Kurtz N/A
Air Traffic Management and Cybersecurity Paul Kurtz , Natesh Manikoth The global aviation system is an incredibly complex and integrated system. As dependence on this ...
Power Grid Under Attack: When Theoretical Risk Becomes Real Disaster Alexey Polyakov , Andrey Nikishin One of the most important pieces of Critical Infrastructure in any country is its Power ...
Conception of State Responsibility and Spatiality: Militarizing Cyberspace from Chinese Perspective Peiran Wang Through human’s military history, with technology innovation, military activities expand to new space seemly to ...
Shedding Light on the Dark Web Jonathan Couch N/A