Series
Institute for Information Security & Privacy Cybersecurity Lecture Series

Series Type
Event Series
Description
Associated Organization(s)
Associated Organization(s)
Organizational Unit

Publication Search Results

Now showing 1 - 4 of 4
  • Item
    Data Portability and Cross-Border Data Flows
    (Georgia Institute of Technology, 2020-10-09) Swire, Peter
  • Item
    The Growing Importance of the Non-Code Aspects of Cybersecurity
    (Georgia Institute of Technology, 2019-10-04) Swire, Peter
    According to the National Initiative for Cybersecurity Education, half of the cybersecurity specialties now involve primarily non-code work. This lecture draws on the "Pedagogic Cybersecurity Framework" published in 2018 in the Communications of the ACM. It extends the OSI stack to layer 8 (organizations), layer 9 (government), and layer 10 (international), showing the broader range of subject-matter expertise that organizations now need for effective cybersecurity. The lecture will also extend the PCF to privacy as well as cybersecurity.
  • Item
    The Non-Code Aspects of Cybersecurity and the Globalization of Criminal Evidence
    (Georgia Institute of Technology, 2017-10-13) Swire, Peter
    In this session, Professor Peter Swire will present two current research topics in cybersecurity. The first addresses the non-code aspects of cybersecurity. Computer scientists are familiar with the seven layers of the OSI model, from physical to application layer. Swire is developing a 10-layer model for cybersecurity, adding the “natural language” layers. Layer 8 applies to private-sector organizations, and is dominated by firm management decisions and contracts. Layer 9 is the government, which sets laws. Layer 10 is international, where diplomacy operates. Significant vulnerabilities exist at each of these layers, and can undermine cybersecurity efforts at the traditional seven layers if organizations, governments, and international relations are not handled effectively. The second topic is the globalization of criminal evidence. Today, a typical crime in France, for instance, often generates evidence from webmail and social networks, with the latter often stored in the United States. Even routine criminal investigations thus take on a new, international dimension. The Georgia Tech Research Project on Cross-Border Requests for Data has been a global leader in analyzing these emerging problems and proposing solutions. If these requests are not handled effectively by law, then governments will have stronger incentives to weaken encryption, develop lawful hacking, and require localization of data in the country, with negative results for the open and secure Internet.
  • Item
    Cyber MayDay: Who Is in Command When Your Business is in the Crosshairs and How Do You Respond?
    (Georgia Institute of Technology, 2017-05-01) Cross, Stephen ; Graves, John Thomas ; Lens, John ; Mueller, Milton L. ; Pair, Stephen ; Sinema, Krysten ; Swire, Peter ; Worley, Candace
    Rep. Tom Graves (R-Ga. 14), in cooperation with the Georgia Institute of Technology, hosts a conversation for executives and thought leaders in Atlanta about cybersecurity policy and technical challenges that are stifling industry innovation today and leaving companies vulnerable. Of importance to discuss: Who protects critical business infrastructure from cyberattacks? What forms of retaliation should be permissible? Should companies be allowed to take active-defense measures? What will deter hackers? When governments engage in nation-state cyberattacks, how can businesses avoid becoming a proxy battleground? How can public policy be improved to help industry and governments protect one another?