Public-Private Partnerships in Cybersecurity and Technology


Fetch error

Hmmm there seems to be a problem fetching this series right now. Last successful fetch was on October 24, 2017 08:56 ()

What now? This series will be checked again in the next day. If you believe it should be working, please verify the publisher's feed link below is valid and includes actual episode links. You can contact support to request the feed be immediately fetched.

Manage episode 173662109 series 60414
By Discovered by Player FM and our community — copyright is owned by the publisher, not Player FM, and audio streamed directly from their servers.

International & National Security Law Practice Group Podcast

The second Teleforum in ourSecurity Partnership Serieswill examine the complex mechanics and ethics of cyber partnerships and many important questions. Should government agencies be enlisting private security firms to help prevent hacking into their own systems? On the other hand, should insurance companies require private company customers to do the same? Should private corporations, particularly financial institutions, be required to report hacking incidents to the federal government, and, if so, to what agency, for what purpose? Consumer protection? Economic security? What are the lawful responses to being hacked for government or industry? Is the best defense a good offense? How effective are todays consumer-level encryption algorithms? Does public/private cooperation on the cybersecurity front impact private companies willingness and ability to cooperate with intelligence investigations under the supervision of the Foreign Intelligence Surveillance Court?

As behavior in the cyber domain has perhaps become the most ubiquitous asymmetric threat to modern life, governments, companies, and individuals each have unprecedented exposure to theft and sabotage. Home networks are compromised through connected thermostats; commercial airliners flight controls have been hacked through in-flight entertainment systems; passwords and credit card data are stored on servers that are the targets of daily hacking attempts, with that data often appearing for sale online.


  • Prof. Catherine B. Lotrionte,Director of the Institute for Law, Science and Global Security and Visiting Assistant Professor of Government and Foreign Service, Georgetown University
  • Adam Segal,Ira A. Lipman Chair, Emerging Technologies & National Security and Director of the Digital & Cyberspace Policy Program, Council on Foreign Relations (CFR)
  • Moderator: Adam Pearlman,Special Advisor to the International and National Security Law Practice Group

411 episodes available. A new episode about every 2 days averaging 32 mins duration .