Title:
Cyber MayDay: Who Is in Command When Your Business is in the Crosshairs and How Do You Respond?
Cyber MayDay: Who Is in Command When Your Business is in the Crosshairs and How Do You Respond?
dc.contributor.author | Cross, Stephen | |
dc.contributor.author | Graves, John Thomas | |
dc.contributor.author | Lens, John | |
dc.contributor.author | Mueller, Milton L. | |
dc.contributor.author | Pair, Stephen | |
dc.contributor.author | Sinema, Krysten | |
dc.contributor.author | Swire, Peter | |
dc.contributor.author | Worley, Candace | |
dc.contributor.corporatename | Georgia Institute of Technology. Institute for Information Security & Privacy | en_US |
dc.contributor.corporatename | Georgia. House of Representatives | en_US |
dc.contributor.corporatename | Arizona. House of Representatives | en_US |
dc.contributor.corporatename | McAfee, Inc. | en_US |
dc.contributor.corporatename | Bitpay | en_US |
dc.contributor.corporatename | VMware, Inc. | en_US |
dc.date.accessioned | 2017-05-15T17:14:02Z | |
dc.date.available | 2017-05-15T17:14:02Z | |
dc.date.issued | 2017-05-01 | |
dc.description | This panel presented on May 1, 2017 at 10:00 a.m. in the Technology Square Research Building (TSRB) Auditorium, 85 5th Street NW, Atlanta, GA 30308. | en_US |
dc.description | Stephen E. Cross is the Executive Vice President for Research of the Georgia Institute of Technology. | en_US |
dc.description | Rep. Tom Graves (R-Ga. 14) is the Chairman of the House Committee on Appropriations: Subcommittee on Financial Services & General Government. | en_US |
dc.description | John Lens is the Senior Vice President of Sales in the Network and Security Business Unit at VMware. | en_US |
dc.description | Milton Mueller is an internationally prominent scholar specializing in the political economy of information and communication. Mueller’s prominence in scholarship is matched by his prominence in policy practice. He is the co-founder and co-director of the Internet Governance Project (IGP), a policy analysis center for global Internet governance. | en_US |
dc.description | Stephen Pair is the co-founder, president and CEO of Bitpay. | en_US |
dc.description | Rep. Kyrsten Sinema (D-Ariz. 9) is a member of the House Committee on Financial Services. | en_US |
dc.description | Peter Swire is the Huang Professor of Law and Ethics at the Georgia Tech Scheller College of Business. He has appointments by courtesy with the College of Computing and School of Public Policy. He is Senior Counsel with Alston & Bird, LLP. | en_US |
dc.description | Candace Worley is Vice President and Chief Technical Strategist for McAfee. | en_US |
dc.description | Runtime: 110:32 minutes | en_US |
dc.description.abstract | Rep. Tom Graves (R-Ga. 14), in cooperation with the Georgia Institute of Technology, hosts a conversation for executives and thought leaders in Atlanta about cybersecurity policy and technical challenges that are stifling industry innovation today and leaving companies vulnerable. Of importance to discuss: Who protects critical business infrastructure from cyberattacks? What forms of retaliation should be permissible? Should companies be allowed to take active-defense measures? What will deter hackers? When governments engage in nation-state cyberattacks, how can businesses avoid becoming a proxy battleground? How can public policy be improved to help industry and governments protect one another? | en_US |
dc.format.extent | 110:32 minutes | |
dc.identifier.uri | http://hdl.handle.net/1853/58095 | |
dc.language.iso | en_US | en_US |
dc.publisher | Georgia Institute of Technology | en_US |
dc.relation.ispartofseries | Cybersecurity Lecture Series | |
dc.subject | Cybersecurity | en_US |
dc.subject | Hackback | en_US |
dc.subject | Ransomware | en_US |
dc.title | Cyber MayDay: Who Is in Command When Your Business is in the Crosshairs and How Do You Respond? | en_US |
dc.type | Moving Image | |
dc.type.genre | Lecture | |
dspace.entity.type | Publication | |
local.contributor.author | Mueller, Milton L. | |
local.contributor.corporatename | School of Cybersecurity and Privacy | |
local.contributor.corporatename | College of Computing | |
local.relation.ispartofseries | Institute for Information Security & Privacy Cybersecurity Lecture Series | |
relation.isAuthorOfPublication | 4438cb30-316f-4f43-ae32-b77d69f559dc | |
relation.isOrgUnitOfPublication | f6d1765b-8d68-42f4-97a7-fe5e2e2aefdf | |
relation.isOrgUnitOfPublication | c8892b3c-8db6-4b7b-a33a-1b67f7db2021 | |
relation.isSeriesOfPublication | 2b4a3c7a-f972-4a82-aeaa-818747ae18a7 |
Files
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 3.13 KB
- Format:
- Item-specific license agreed upon to submission
- Description: