Cover Image


View/Hide Left Panel
Click for next page ( 376

The National Academies of Sciences, Engineering, and Medicine
500 Fifth St. N.W. | Washington, D.C. 20001

Copyright © National Academy of Sciences. All rights reserved.
Terms of Use and Privacy Statement

Below are the first 10 and last 10 pages of uncorrected machine-read text (when available) of this chapter, followed by the top 30 algorithmically extracted key phrases from the chapter as a whole.
Intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text on the opening pages of each chapter. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

Do not use for reproduction, copying, pasting, or reading; exclusively for search engines.

OCR for page 375
Appendix B Workshop Agenda THuRSDAy, JuNE 10, 2010 8:15 Chairman’s Opening Remarks John Steinbruner, University of Maryland 8:30 law and Economics of Cybersecurity—Tyler Moore, Harvard University Discussion Leader: Jack Goldsmith, Harvard Law School 9:15 Paper on the Council of Europe’s Conention on Cybercrime—Michael Vatis, Steptoe & Johnson Discussion Leader: Sue Eckert, Brown University 10:00 Break 10:30 Surey Paper on Challenges in Attribution—W. Earl Boebert Discussion Leader: Steven Bellovin, Columbia University 11:15 decision making Under Uncertainty—Rose McDermott, Brown University Discussion Leader: Jan Lodal, Lodal and Company Noon Break for Lunch 12:30 PM the Role of declaratory Policy in deterring the Use of Cyber Force—Stephen Lukasik, Georgia Institute of Technology Discussion Leader: Robert Jervis, Columbia University 1:15 Ciil liberties and Priacy implications of Policies to Preent Cyberattacks—Robert Gellman Discussion Leader: Stephen Dycus, Vermont Law School 2:00 the Role of offensie Cyber Capability in national military Strategy and tactics—Greg Rat- tray and Jason Healey Discussion Leader: Committee/Staff 

OCR for page 375
 PRoCEEdingS oF A woRkSHoP on dEtERRing CYBERAttACkS 2:45 issues of organization and Process—Paul Rosenzweig Discussion Leader: Jack Goldsmith 3:30 Break 4:00 launching “wars” in Cyberspace: the legal Regime—Michael Schmitt, Durham University Discussion Leader: Stephen Dycus 4:45 Applicability of traditional deterrence Concepts and theory to the Cyber Realm—Patrick Morgan, University of California at Irvine Discussion Leader: Robert Jervis 5:30 Adjourn to Reception and Working Dinner / Small Group Discussions Keck Center—3rd Floor Atrium | 500 Fifth Street, NW FRIDAy JuLy 11, 2010 8:15 limitations on offensie operations—Martin C. Libicki, RAND Discussion Leader: Steven Bellovin 9:00 Untangling Attribution—David Clark and Susan Landau Discussion Leader: Jan Lodal 9:45 Possible Forms of international Cooperation for Enhancing Cyber Security—Abraham Sofaer Discussion Leader: Sue Eckert 10:30 Break 11:00 deterrence theory and Cyber Conflict: Historical insights and Contemporary Challenges— Richard Weitz Discussion Leader: John Steinbruner 11:45 implementing Hackback: A Policy Analysis—Jay Kesan Discussion Leader: Jack Goldsmith 12:30 PM Break for Lunch 1:00 deterring third-party Collaboration—Geoff Cohen Discussion Leader: Jan Lodal 1:45 Strategic Policies for Cyberdeterrence: A game-theoretic Framework—M. Gupte, A.D. Jag- gard, R. McLean, S.R. Rajagopalan, R.N. Wright Discussion Leader: Committee/Staff 2:30 Use of multi-modeling to inform Cyber deterrence Policy and Strategies—Robert Elder, Alexander Levis Discussion Leader: Steven Bellovin