Crossroads Blog | Institute National Security and Counterterrorism

Authentication, cyber attack, Cyber Command, Law, Official Policy, warfare

Vulnerability Assessment: Lessons from Four Cyber Events – Video

The Center for Strategic and International Studies has released a video of its Global Security Forum 2011's session entitled, "Vulnerability Assessment: Lessons from Four Cyber Events," held on June 8, 2011.  The speakers were:

Robert L. Deitz, Former Senior Councilor to Director of the Central Intelligence Agency
Judith Miller, Former General Counsel for the U.S. Department of Defense
Franklin Miller, Former Special Assistant to the President and Senior Director for Defense Policy and Arms Control, National Security Council
Robert J. Giesler, Former Director of Information Operations and Strategic Studies, Office of the Secretary of Defense

Of particular interest to our course, Mr. Giesler "argued that the legal regime needs to allow more accurate attribution by providing tools to trace cyber attacks to their origin.," and Ms. Miller "argued that we should rethink the Internet architecture’s focus on speed in favor of greater security," according to the summaries on CSIS's page.  [Latest year, students wrote papers on each of those topics.]

The event was an hour and thirty six minutes long. A complete transcript of the event is linked, here.  Some PowerPoint slides that were used are here.  An MP2 audio files of the entire event can be downloaded at this link.  Video of the entire program is embedded, below.


 

Leave a Reply

Bitnami