Recent Old Events

Records 72 / 99

Cybersecurity and the Future of U.S. - China Relations

May 20, 2015

 Registration is required.

From "Olympic Games" to the Sony Hack: The Future of Offensive Cyber in Statecraft

May 5, 2015

Abstract: When President Obama approved the "Olympic Games'' cyber attacks on Iran, he told aides that he was worried about what would happen when nations around the world began to use destructive...

Privacy and Security: Can We Achieve Both with Cryptography?

May 4, 2015

Abstract: In many real-world settings, the need for security is often at odds with the desire to protect user privacy.

Who Controls A Computer? A Predictive Theory of Comparative Strength in Computer Security Conflicts

April 27, 2015

Abstract: Any given computer or network runs code from an enormous number of sources, including the producer of the operating system, the hardware, built-in and user-installed applications,...

Rewiring the Pentagon: Charting a New Path on Innovation and Cybersecurity

April 23, 2015

The Freeman Spogli Institute for International Studies, the Center for International Security & Cooperation, and the Hoover Institution are honored to co-sponsor the 2015 Drell Lecture with The...

Bulk Collection of Signal Intelligence: Technical Alternatives

April 20, 2015

Abstract: The first Snowden disclosure was that Verizon was providing daily updates of telephony metadata to the NSA.

Modern Surveillance

March 19, 2015

Abstract: NSA stands for National Security Agency, but the agency is at odds with itself in its security mission.

Thinking about Nuclear and Cyber Conflict: Same Questions, Different Answers

February 9, 2015

Abstract: Senior policy makers often talk as though cyber conflict poses the same kind of existential threat as does nuclear conflict.

Stuxnet and the Age of Digital Warfare

February 2, 2015

Abstract: In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate.

Cybersecurity at the United Nations

January 22, 2015

Abstract: With the development of cyber capabilities by an increasing number of states, policymakers as well as scholars have been calling for the negotiation of a new international treaty to...

Cybersecurity and Military Strategy: The Effectiveness of Attribution as a Deterrence

January 5, 2015

Abstract: The increasing frequency of cyber attacks and technological change have amplified the potential adverse effects of successful, large-scale cyber attacks.

How the Internet Became Untrustworthy

March 17, 2014

About the Topic: The Internet in 2014 is a marvelous communication utility. It provides cheap and fast transfer of information to and from most places on or near the surface of Earth.

Safety and Security in a Transnational Environment

January 23, 2014

Drell Lecture Recording: NA     Drell Lecture Transcript: NA   Speaker's Biography: Vinton G. Cerf has served as vice president and chief Internet evangelist for Google since October 2005.

Measuring NSA Surveillance

December 9, 2013

About the Topic: What do the National Security Agency’s bulk surveillance programs reveal about Americans?  This talk presents ongoing studies of Internet and telephone metadata.  Preliminary...

Cyber Operations: A Look into the 5th Domain

November 11, 2013

About the Topic: Air, sea, land, and space are the traditional domains of military operations. Now, as the Information Age unfolds, cyberspace has become the fifth domain.

Disrupting the Security Landscape

November 5, 2013

About the Topic: The cyber security landscape has seen dramatic changes in recent years with the advent and evolution of new, growing, and ever-present adversaries.

The Prospects for Cybersecurity Cooperation After Snowden

October 24, 2013

ABOUT THE TOPIC: In his talk, Jack Goldsmith will explain why he is skeptical about significant cybersecurity cooperation among military rivals, especially at the treaty level.

Radio Interview: The Insider Threat

July 23, 2013

Thomas Fingar spoke with Federal News Radio about his thoughts on insider threats in the U.S. government.

Reticent Regulation: Designing International Agreements To Do A Lot But Say Very Little

May 23, 2013

International agreements are often criticized for expressing lofty values or regulatory goals without doing very much to achieve those values or goals.

Defending the Cyber Domain: Why Is This So Hard?

May 14, 2013

About the topic: The worldwide web has its origins in American science and ingenuity.  The greatest concentration of cyber power on the planet today is at Fort Meade in eastern Maryland.  So why...

Nudging Security and Privacy

May 13, 2013

Why do users make such poor decisions about computer security and privacy? What can we do about it?

How Should We Evaluate the Threat of Cyber War?

April 16, 2013

Jon Lindsay is a Research Fellow at the University of California Institute on Global Conflict and Cooperation (IGCC) in La Jolla, where he is a member of the Project on the Study of Innovation and...

Some Future Directions in System and Network Trustworthiness

March 19, 2013

Peter will discuss work at SRI and the University of Cambridge under two projects currently funded by DARPA, relating to clean-slate architectures for hardware, software, networking, and clouds,...


susan athey Susan Athey Professor of Economics (by courtesy), Senior Fellow, Stanford Institute for Economic Policy Research
michael bernstein Michael Bernstein Assistant Professor
Keith Winstein Keith Winstein Assistant Professor of Computer Science and Assistant Professor of Law (by courtesy)
Mohsen Bayati Mohsen Bayati Associate Professor of Operations, Information and Technology
mark cullen Mark R. Cullen Director, Center for Population Health Sciences, Senior Associate Dean for Research, Professor of Medicine, Professor of Biomedical Data Science, Senior Fellow at SIEPR
Byron Reeves Byron Reeves Paul C. Edwards Professor of Communication
Ben Calvert Ben Calvert Chief Information Security Officer at SLAC National Accelerator Laboratory
George Triantis George Triantis Charles J. Meyers Professor of Law and Business
Kostas Bimpikis Kostas Bimpikis Associate Professor, Operations, Information & Technology
dan correa Daniel Correa Cyber Initiative Fellow
paul oyer Paul Oyer The Fred H. Merrill Professor of Economics
ramesh johari Ramesh Johari Associate Professor of Management Science and Engineering and Computer Science (by courtesy) and Electrical Engineering (by courtesy)