♫musicjinni

IGF-USA 2015 Breakout - Maintaining Trust Online: Cybersecurity, Encryption, Backdoors, and Privacy

video thumbnail
IGF-USA 2015 Breakout - Maintaining Trust Online: Cybersecurity, Encryption, Backdoors, and Privacy

**PLEASE HELP TRANSCRIBE THIS VIDEO - http://www.amara.org/en/videos/Bh5n5h5TMjkY/ **

Hashtag: #igfusa_cyber - http://twitter.com/hastag/igf_cyber
Transcript: http://isoc-ny.org/usaigf15/07-igf-usa2015-trust.pdf

Organized by: David Vyorst, Co-Founder, Relay Station Digital Strategies @DVyo and Shane Tews, Visiting Fellow, The American Enterprise Institute @ShaneTews

Moderated by: Jon Peha- Professor, Carnegie Mellon University

Speakers:
Eric Burger – Research Professor of Computer Science and Director, The Georgetown Center for Secure Communications in Washington D.C. @ericburger;
Robert “Bobby” Flaim- Special Agent, Federal Bureau of Information;
Mieke Eoyang – Director, National Security Program, Third Way @MiekeEoyang;
Nick Sullivan – Security Engineering Lead, CloudFlare, Inc @grittygrease

Few people outside of IT circles appreciate the extent to which encryption has become a cornerstone of the global economic system. The entire global banking system is dependent on strong and secure encryption to allow secure digital financial transactions. Digital financial capabilities have allowed modern economies to flourish in the digital age. Without trust in the security of these systems, the global economy would diminish. As technology evolves the security implications related to safeguarding technological infrastructure evolve simultaneously, presenting major challenges to current legal and regulatory structures. Against this backdrop, every day seems to bring new horror stories of cyber-security breaches, each more shocking than the last. Calls for enhanced cybersecurity measures including strong encryption are matched by law enforcements calls for access to the encrypted data. Law enforcement officials claim that terrorists and criminals hide behind the anonymity created by strong encryption while cryptologists and cyber security experts demand that back doors create vulnerabilities that criminals and hostile governments will certainly exploit. Can solutions be engineered that will enhance security and protect privacy without hampering law enforcement’s legitimate needs? This panel examines these and other important questions about the future of cybersecurity in light of recent headlines. |

IGF-USA 2015 Breakout - Maintaining Trust Online: Cybersecurity, Encryption, Backdoors, and Privacy

CNIT 123 Ch 1: Overview & Ch 2: TCP/IP (Part 1)

Disclaimer DMCA