show episodes
 
Artwork

1
National Security Law Today

National Security Law Today

Unsubscribe
Unsubscribe
Weekly
 
National Security Law Today brings legal experts discussing the hot topics and current issues in the world of national security law right to your phone. Get information and advice for lawyers, law students or interested parties who want to dig deeper into the law that protects the country.
  continue reading
 
CNA’s experts understand today’s complex and dynamic national security environments. On CNA Talks, you’ll find analysis of globe-shaping conflicts, foreign policy and shifting alliances, regional breakdowns, pandemics and other health crises, environmental disasters, homeland security concerns, and the future of strategic competition. Follow CNA Talks to go behind the headlines and learn from data-driven, objective, discussions on the factors shaping today’s national security landscape.
  continue reading
 
Modern adversaries are relentless. Today’s threat actors target organizations around the world with sophisticated cyberattacks. Who are they? What are they after? And most importantly, how can you defend against them? Welcome to the Adversary Universe podcast, where CrowdStrike answers all of these questions — and more. Join our hosts, a pioneer in adversary intelligence and a specialist in cybersecurity technology, as they unmask the threat actors targeting your organization.
  continue reading
 
Artwork

1
Law to Fact

Professor Leslie Garfield Tenzer

Unsubscribe
Unsubscribe
Monthly
 
Law to Fact is the renown podcast for law students where substantive legal issues are discussed with distinguished law professors from across the nation. Today, it is the go to place for all things law including course material, application tips, study strategies, and career advice—all packed into one podcast. Law to Fact is hosted by Professor Leslie Garfield Tenzer of the Elisabeth Haub School of Law at Pace University.
  continue reading
 
Artwork

1
Vital Interests Podcast

JAY-VEE Productions

Unsubscribe
Unsubscribe
Monthly
 
Hosted by Karen Greenberg. Brought to you by the Center on National Security, Vital Interests Podcast was designed to help you think about security in its many dimensions, from pandemic to climate change, from terrorism to population migration, from war to peace - all with an eye towards the rule of law, the protection of human rights and the respect for civil liberties. Twitter: @VI_PodcastCNS, @KarenGreenberg3.
  continue reading
 
Artwork

1
Young China Watchers

Young China Watchers

Unsubscribe
Unsubscribe
Monthly
 
The YCW Podcast is a monthly podcast by Young China Watchers. We're a global community of young professionals, providing a platform to discuss the most pressing issues emerging from China today. We organize events with China experts in our 10 chapters across Asia, Europe and the U.S., fostering the next generation of China thought-leaders. · Find our upcoming events and further content on our website: www.youngchinawatchers.com · Follow us on Twitter: @YCW_Global · Email us at info@youngchin ...
  continue reading
 
The Solomon Success podcast is dedicated to the timeless wisdom of King Solomon and the Book of Proverbs in order to maximize one’s business and life. To our advantage, we can find King Solomon’s financial strategies in addition to many life philosophies documented in biblical scriptures. Focusing on these enduring fundamentals of success allows us to bypass the “get-rich-quick” schemes that cause many to stumble on their journey toward success. Our concern is not only spiritual in nature, b ...
  continue reading
 
Loading …
show series
 
This week in Washington, leadership from NATO's 32 member nations convene for the annual NATO summit, marking the alliance's 75th anniversary. On the docket are contemporary challenges and controversies, all of which will influence the future direction of NATO. In honor of the summit we're re-airing two previous conversations, featuring NATO expert…
  continue reading
 
The United States Navy is the most powerful naval force on earth, able to project power in every corner of the globe, but this mighty forces has humble beginings. Just in time for Independence Day, Steve Wills, joins the show to discuss the Continetial Navy’s role in the American Revolution and how its legacy is reflected in the modern day US Navy.…
  continue reading
 
This week, Elisa tackles hot-button issues in national security law: threats to the SWIFT system, Taiwan's semiconductor industry, and the uncertain future of NATO as we inch our way towards the U.S. presidential election this fall. References: NSLT Ep. 217, "Crackdown on Russia's Dirty Money with Brian Egan" NSLT Ep. 325, "Security Lessons from Sc…
  continue reading
 
Like a vast haystack of digital information, bulk data conceals critical needles—sensitive details that, if found and exploited, can pose severe risks to national security. This week, Elisa is joined by Eric Johnson, the Principal Deputy Chief of the Foreign Investment Review Section at the DOJ's National Security Division. Together they discuss th…
  continue reading
 
In this special Pride Month episode of CNA Talks, three members of CNA’s LGBTQ+ Affinity Group, Pride @ CNA, join the show! They discuss their experiences as members of the LGBTQ+ community at CNA and research that CNA is exploring on interactions between community members and law enforcement. Biographies Dr. L. Cait Kanewske (they/them) is a Resea…
  continue reading
 
Could the personal data of millions of Americans be our country's greatest national security treasure? This week, host Elisa is joined by Brandon Pugh, Policy Director and Resident Senior Fellow for the Cybersecurity and Emerging Threats team at the R Street Institute. Together, they discuss the silent behemoth that is online personal data collecti…
  continue reading
 
How do adversaries react when they know they’re being tracked? How do they respond to organizations that are on to them — and how do they know what the defenders know? In this episode, Adam and Cristian explore how adversary behavior shifts as their activity is discovered and tracked. Today’s adversaries carefully research their victims. They read …
  continue reading
 
On May 29th, the Standing Committee on Law and National Security hosted a luncheon featuring Jonathan Meyer, General Counsel for the DHS. Moderated by committee member Harvey Rishikof, Jonathan shared some of the department's key insights from the 2024 Homeland Threat Assessment, highlighting threats like foreign and domestic terrorism, immigration…
  continue reading
 
The Russian Federation is an example of a large authoritarian state whose military is subordinate to its civil government. But since the onset of the War in Ukraine, tensions have been growing between civilian and military leaders. In this episode, Julian Waller joins John to discuss the current state of civil-military relations in Russia’s governm…
  continue reading
 
(Part 2 of 2) Continuing our series on the intersection of sci-fi and national security, host Elisa is joined by Sunita Patel, Senior Assistant General Counsel for Product Security at Micron. Together they unpack the 1990's film, Total Recall, exploring themes of memory, identity, and reality. What can sci-fi tales like Total Recall teach us about …
  continue reading
 
What happens when two cyber superpowers — and the most populous countries in the world — target one another? Tensions between China and India have been rising in recent years, and it’s time we take a deep dive into the many factors at play. In this episode, Adam and Cristian examine the dynamics between the two nations, the drivers of their evolvin…
  continue reading
 
Continuing our series on the intersection of sci-fi and national security, host Elisa is joined by Sunita Patel, Senior Assistant General Counsel for Product Security at Micron. Together they unpack the 1990's film, Total Recall, exploring themes of memory, identity, and reality. What can sci-fi tales like Total Recall teach us about real "brain-co…
  continue reading
 
Social engineering is not a new threat — adversaries have long used psychological manipulation to gain access, money, information and more. But as we learn in this episode from Shelly Giesbrecht, Director of Professional Services at CrowdStrike, it remains a top cybersecurity challenge for all organizations. Today’s social engineers are more convin…
  continue reading
 
Law Enforcement officers regularly confront traumatic circumstances that can adversely affect their mental and emotional health. In some cases, this can increase their risk of death by suicide. In late 2023, the CNA partnered with First H.E.L.P. to undertake the first comprehensive analysis of its extensive dataset on law enforcement officer deaths…
  continue reading
 
This week, Elisa dives straight in with a quick national security news update, spotlighting the recent death of Iranian President Ebrahim Raisi, as well as the ICC announcement of war crime charges against both Israel and Hamas leaders in relation to the Oct. 7th attacks and aftermath. Following the news update, Elisa revisits a previously aired di…
  continue reading
 
Looking for the latest national security news? This week, Elisa breaks down recent national security related headlines, including Russia's advancement in Ukraine, major U.S. leaps in quantum computing, and a preview of next week's episode covering how your personal data, including DNA data, are quietly being bought and sold. References: "Russia int…
  continue reading
 
The rise of hacktivism — the use of hacking techniques to make a statement supporting a political or social cause — is often associated with the Occupy Wall Street movement and the Anonymous hacktivist collective. But the practice of hacking as a form of civil disobedience goes back to the 1990s. It has taken many forms in the years since, driven b…
  continue reading
 
Welcome to the Solomon Success show, where we uncover timeless insights from King Solomon and the Bible for business and investing. Amidst a sea of false promises, let's refocus on enduring principles for a life of peace and prosperity. I'm Scott Florida, guest hosting for Jason Hartman. Drawing from my 30 years of pastoral and entrepreneurial expe…
  continue reading
 
Over the past 20 years, the People’s Republic of China has invested billions of dollars in African nations. But what impact have these investments had on the continent, and how have things changed in the wake of the dual global shocks of the COVID-19 pandemic and Russia’s invasion of Ukraine? Tim Ditter joins the show to answer these questions and …
  continue reading
 
This week, Elisa is back with Tracy Reynolds and Harvey Rishikof to discuss the second book in Octavia Butler's popular Parable series, Parable of the Talents. Together they discuss its real-world connections, ironic cultural and religious references, and its cautionary connections to today's national security law issues. Elisa opens the episode by…
  continue reading
 
This week, we continue our series on the intersection of sci-fi and national security, diving into the popular novel and now Netflix series, The Three Body Problem. Host Elisa is joined again by Tracy Reynolds as well as Harvey Rishikof to discuss the book's themes, lessons and cautionary connections to today's national security issues. In addition…
  continue reading
 
Organizations fear adversaries will attack. Threat hunters assume adversaries are already in the system — and their investigations seek unusual behavior that may indicate malicious activity is afoot. Andrew Munchbach, CrowdStrike’s Global VP, Field Engineering, joins Adam and Cristian in this week’s episode to explore what threat hunting is, how it…
  continue reading
 
Climate change increases the frequency, severity, and cost of extreme weather events. However, these events are not felt by everyone equally. Existing inequalities in our society exasperate the risks for vulnerable populations. In this episode, Leola Abrahams and Mark Roberts discuss how extreme weather events impact older adults and Native America…
  continue reading
 
As reality begins to echo the cautionary tales of science fiction, one question looms: are we listening to their warnings? Kicking off our series on the intersection of sci-fi and national security, host Elisa is joined by Tracy Reynolds, U.S. Navy Commander and Co-Chair of the Space Law Interest Group with the American Society of International Law…
  continue reading
 
As today's national security threats evolve, they must be met with agile and effective intelligence capabilities. On April 9th, FBI Director Christopher Wray spoke before the ABA Standing Committee on Law and National Security on the bureau’s priorities, including foreign threats to American elections, cyber-attacks on the US infrastructure and thr…
  continue reading
 
Today’s conversation explores a common question around adversary activity: Why does attribution matter? When a cyberattack hits, why go to the trouble of learning who is behind it? Each attempt at an intrusion can reveal a lot about an adversary — who they are, what they’re doing and what their motivations may be. This information can not only info…
  continue reading
 
The Russia‑Ukraine war marks the first large‑scale deployment and use of conventional ballistic and cruise missile technology. Because of this, the theater has become a test bed for missile technology and strategy and has revealed the strengths and weaknesses of contemporary missile forces and doctrines. In this episode, Fabien Hoffman and Gabriela…
  continue reading
 
As law students across the country prepare to graduate this spring, what might a career in national security law have in store for them? This week, we're recasting an episode from last September, featuring arms control expert and Professor of Law at Georgetown University, David Koplow. Together with Elisa, David guides us through the history of WMD…
  continue reading
 
This week, host Elisa dives into the latest national security headlines, from happiness surveys and foreign influence on social media, to AI guidance across the U.S. financial services sector. References: Israel Has Killed a Top Hamas Commander in Gaza. It Took Five Months. WSJ. March 20, 2024 Managing Artificial Intelligence-Specific Cybersecurity…
  continue reading
 
The National Security Agency’s Cybersecurity Collaboration Center (CCC) was created based on a growing need for the public and private sectors to work together and share insights to understand adversaries’ intentions, as well as the scope and scale of their activity. In this special episode of the Adversary Universe podcast, Adam and Cristian are j…
  continue reading
 
In honor of Civic Learning Week 2024, this week host Elisa is joined by Dr. Michael Feuer, Dean of the Graduate School of Education and Human Development at George Washington University. Together, they dive into the importance of reinforcing early civic education, how technology has changed the way we listen to others, as well as other overarching …
  continue reading
 
Military operations in the physical domains all depend on the cyber domain. To ensure the success of traditional naval capabilities, the Navy and Marine Corps must project power in and through cyberspace while defending their systems and assets from adversary cyber capabilities. The side that most effectively sequences and synchronizes cyber effect…
  continue reading
 
On February 28th, President Biden signed Executive Order 14117 on "Preventing Access to Americans’ Bulk Sensitive Personal Data and United States Government-Related Data by Countries of Concern." This week, host Elisa is joined by friend-of-the-cast Alex Joel to breakdown the key actions within this EO, what types of data the DOJ may restrict, what…
  continue reading
 
CrowdStrike Chief Security Officer Shawn Henry joined CrowdStrike as employee number 19 after a 24-year career at the FBI, where he retired as the Bureau’s Executive Assistant Director. Today, he joins Adam and Cristian for a wide-ranging conversation exploring his early days at CrowdStrike and transition to the private sector, his perspective on t…
  continue reading
 
In an age when the risks of cyberattacks are increasingly clear, the Zero Trust security model, built on the principle of “never trust, always verify,” is the new standard for cyber security. Like many organizations, CNA is working to implement the model throughout our organization. Rizwan Jan, CNA’s Chief Information Officer, and cybersecurity exp…
  continue reading
 
What do the foundations of the Warsaw Pact teach us about the modern Russian attitude towards the west? This week, host Elisa is joined by Simon Miles, diplomatic historian and Assistant Professor for Slavic and Eurasian studies at the Sandford School of Public Policy at Duke University. Together they discuss the history of the Warsaw Pact, its arc…
  continue reading
 
On February 26th, the U.S. supreme court heard oral arguments for two cases - Moody v. NetChoice, LLC, and NetChoice, LLC v. Paxton. These cases, specific to Florida and Texas, would similarly restrict social media companies' ability to moderate content on their platforms. This week, host Elisa is joined by Stephen Vladeck, the Charles Alan Wright …
  continue reading
 
The DOD Civilian Harm Mitigation and Response Action Plan (CHMR-AP) represents a significant step forward for global efforts to reduce civilian harm. The plan recognizes that reducing civilian harm is not just a moral imperative but a strategic priority. It lays out concrete steps that the Department of Defense can take to mitigate civilian harm ca…
  continue reading
 
This week, Elisa is joined again by Judge James Baker to continue their conversation beyond the conflict zone; together, they dive into AI ethics, recommended protocols for applying AI in within the practice of law, the risks AI technology could pose on election cycles across the globe, as well as other national security related news. Hon. James E.…
  continue reading
 
Loading …

Quick Reference Guide