Recent Events

Records 48 / 94

Private Foreign Policy

March 29, 2017

Abstract: Microsoft President Brad Smith recently analogized Microsoft to a “Digital Switzerland.” This moniker captures the role that U.S.

Reputation in the Anti-Abuse Regime

March 27, 2017

Abstract: Recently, Twitter, Netflix, Spotify, Airbnb, Reddit, Etsy, SoundCloud, and The New York Times were knocked out by a botnet driven by the Mirai malware.

The Challenges of Providing Data Security

January 18, 2017

Drell Lecture Recording: Drell Lecture Transcript: NA Speaker's Biography: Admiral Inman graduated from the University of Texas at Austin in 1950, and from the National...

Building resilient infrastructure? The most critical component is the people

December 13, 2016

Abstract: From programing firmware for IoT devices to misoperations in the field and control room, humans have the potential to offer creative, collaborative, and highly efficient solutions to some...

On the Identification and Analysis of Previously Unknown Linkages in Critical Infrastructure Systems

November 22, 2016

Abstract: Critical infrastructure systems including manufacturing facilities, ports, transportation systems, communications networks, and energy and water distribution systems often consist of many...

The Digital Dimension

November 21, 2016

Abstract: This presentation is adapted from two book chapters.  The first one published in 2007 is “Transforming U.S.

Cybersecurity Futures 2020

November 17, 2016

Abstract: What will be the state of digital security in five and 10 years? Will it be a "Wild West" where every person and organization must fight to protect their own personal data?

How to withstand a cyberattack: The future of resilience in the cyber and physical worlds

November 15, 2016

Abstract: We all know that we face cyberrisks everyday, from destructive attacks on our critical infrastructure to the theft of intellectual property.

Reality-based election security

November 2, 2016

Abstract:   There is a state of high anxiety about this year's election being "hacked" or "rigged".

Cyber Security Summit

September 16, 2016

While the Cyber Security Summit 2016 is not open to walk-ins, live-streaming will be available, starting on Monday, September 19 at 2:30PM The debate on...

Implications of the Chinese military's uses of cyber for inter-state crisis management

August 1, 2016

Lunch will be served. Please RSVP to allow for an accurate headcount.Abstract: Dr.

Cybersecurity Regulations and Power Grid Resilience

May 24, 2016

Abstract: The NERC-CIP standards are the only federally mandated cybersecurity standards for critical infrastructure in the United States.  Targeting the electric system, the standards have been...

CISAC Honors Students Prize-Winning Presentations

May 18, 2016

- To ensure an accurate headcount for lunch, RSVPs are required -  

Cybersecurity Governance: Contested Norms, Organizational Challenges and Pressing Policy Issues in Software Vulnerability Disclosure

March 30, 2016

Abstract: The disclosure of software vulnerabilities has stirred controversy for decades among security researchers and software vendors, and more recently governments.

Deterrence and Arms Control in Cyberspace

March 22, 2016

Abstract: For four years running now, the Director of National Intelligence’s Worldwide Threat Assessment to Congress has led with cyber threats to national and international security.  Under...

Winning an Innovation War: Managing Risks from Emerging Technologies

March 14, 2016

Abstract: Faster evolving technologies, new peer adversaries, and the increased role of non-government entities changes how we think about decisions to develop and adopt new technology....

New Alliances in Cybersecurity, Human Rights and Internet Governance

February 17, 2016

On Wednesday, February 24, CDDRL, in partnership with the Center for International Governance Innovation (CIGI), hosted...Posted by Stanford Center on Democracy, Development, and the Rule of Law ...

Ideology and Cybersecurity: Explaining the Origin and Structure of Civilian Cyber Defense

January 7, 2016

Abstract: Cybersecurity depends heavily on civilian cyber defense, which is decentralized, private, and voluntary.

Intelligence in the Cyber Age: (r)Evolution?

December 3, 2015

- This event is offered as a joint sponsorship with the Hoover Institution -  Abstract: Writing on matters relating to the cyber era dominate government and academia alike.  Much of the focus tends...

Cybersecurity and the Future of U.S. - China Relations

May 20, 2015

 Registration is required.

From "Olympic Games" to the Sony Hack: The Future of Offensive Cyber in Statecraft

May 5, 2015

Abstract: When President Obama approved the "Olympic Games'' cyber attacks on Iran, he told aides that he was worried about what would happen when nations around the world began to use destructive...

Privacy and Security: Can We Achieve Both with Cryptography?

May 4, 2015

Abstract: In many real-world settings, the need for security is often at odds with the desire to protect user privacy.

Who Controls A Computer? A Predictive Theory of Comparative Strength in Computer Security Conflicts

April 27, 2015

Abstract: Any given computer or network runs code from an enormous number of sources, including the producer of the operating system, the hardware, built-in and user-installed applications,...

Rewiring the Pentagon: Charting a New Path on Innovation and Cybersecurity

April 23, 2015

The Freeman Spogli Institute for International Studies, the Center for International Security & Cooperation, and the Hoover Institution are honored to co-sponsor the 2015 Drell Lecture with The...


1 RSD13 085 0167a Thomas Berson Affiliate
John Maguire John Maguire Affiliate
Tara Behrend Tara Behrend Stanford Cyber Initiative fellow at CASBS
chuck eesley Charles Eesley Associate Professor, Stanford Technology Ventures Program (STVP), W.M. Keck Foundation Faculty Scholar, Morgenthaler Faculty Fellow, Schulze Family Foundation Distinguished Professor
ramesh johari Ramesh Johari Associate Professor of Management Science and Engineering and Computer Science (by courtesy) and Electrical Engineering (by courtesy)
Lenore Herzenberg Leonore A. Herzenberg Department of Genetics Professor
Jeff Chi Jeffrey Chi Clinical Associate Professor of Medicine
nigam shah Nigam H. Shah Associate Professor of Medicine (Biomedical Informatics Research) and of Biomedical Data Science
Jennifer Pan Jennifer Pan Assistant Professor of Communication, Assistant Professor, by courtesy, of Political Science, Assistant Professor, by courtesy, of Sociology
David Mazieres David Mazières Professor, Computer Science
Jure Leskovec Jure Leskovec Associate Professor of Computer Science
Michael Klausner Michael Klausner Nancy and Charles Munger Professor of Business, Professor of Law