Recent Old Events

Records 96 / 99

Why and How to Encrypt the Entire Web

March 11, 2013

In 1990, hypertext was a utopian conjecture.

Away from the Keyboard? The Challenges of Command and Control over Cyber Operations

March 7, 2013

ABOUT THE TOPIC: Nearly all scholars writing about the potential for cyber war conclude that states, assumed to be unitary rational actors, are unlikely to use offensive cyber capabilities.

Cyber Security in China

March 4, 2013

There are three major components of Cyber security from China’s perspective: Internet information management, Civilian cyber security, and Cyber warfare.

Special TEC-CISAC Seminar: Cooperating to Compete: The Role of Regional Powers in Global Nuclear Governance

February 21, 2013

Francesca completed her D.Phil at Oxford University (2009-2012) in the Department of Politics and International Relations with a thesis that explores the role of regional powers in designing and...

Why Al-Qaida Hates the Internet: Trust Problems on Jihadi Discussion Forums

January 24, 2013

The trust problem limits what rebels can do online.

Ensuring Hardware Cybersecurity

January 14, 2013

Despite the enormous amount of attention that has been directed to software security in recent years, relatively little attention has been given to hardware security.

Topic: the security of the electrical grid

December 9, 2012

More event information TBA.    Speaker bio: Rebecca Slayton is a lecturer in Stanford’s Public Policy Program and a junior faculty fellow at CISAC for 2013-2014.

Escalatory Models, Norms, Assurance, and Deterrence

November 12, 2012

The advent of ubiquitous networking and computation and deepening globalization since the 1990s has eroded traditional international security architectures by multiplying conflict surfaces and...

The US-Japan Internet Economy Dialogue: Talking about the Future not the Past

October 19, 2012

The U.S.-Japan relationship is not much in the headlines these days—and when it is the stories seem to focus on issues, such as Okinawa and beef, that have bedeviled ties seemingly for decades.

Behavioral Advertising and Privacy Law Reboot - US and International Legal Trends and Best Practices for Internet, Cloud and E-Commerce Companies

October 11, 2012

5:30 pm - 6:30 pm: Registration/Reception (Manning Faculty Lounge, second floor breezeway fo Stanford Law School) 6:30 pm - 8:30 pm: Panel (Room 290) An evening panel to discuss behavioral...

Cyber Security of Industrial Control Systems – What Does It Mean to National Security?

October 8, 2012

Industrial Control Systems (ICSs) are used throughout the industrial infrastructure and military applications.

Private Location-Based Services

May 7, 2012

Location-based services from are quickly gaining popularity.

Predictability of Human Behavior

April 30, 2012

     Vast resources are devoted to predicting human behavior in domains such as economics, popular culture, and national security, but the quality of such predictions is usually poor.

A Forensic Dissection of Stuxnet

April 23, 2012

The Stuxnet computer worm is perhaps the most complicated piece of malicious software ever built - roughly 50 times the size of the typical computer virus.

Cyber Diplomacy and Advancing the US International Strategy for Cyberspace

February 3, 2012

About the topic: Mr. Painter will discuss the cyber threats we are facing, and U.S. diplomatic efforts to achieve an open, interoperable and secure cyberspace.

Combating Cyber Insecurity Around the Globe

February 3, 2012

Christopher Painter has been on the vanguard of cyber issues for twenty years. Most recently, Mr.

Cybersecurity and Cyberwarfare

January 9, 2012

Zittrain will discuss the false starts in understanding the simultaneously underappreciated and overhyped fields of cybersecurity and cyberwarfare, and offer a view on where the deepest problems...

Cybercrime and Cyberwarfare

December 6, 2011

  Cybercrime and Cyberwarfare: What are they, where did they come from and why are they an existential threat?

Cyberwar - Overhyped or Over Here?

November 16, 2011

Stewart Baker, a former policymaker at both the National Security Agency and the Department of Homeland Security will talk about the latest concern in official Washington.  Putting cyberweapons in...

The Future of Crime

October 31, 2011

The unprecedented rapid rate of scientific progress is creating new opportunities for transnational criminal and terrorist organizations to exploit advances in technology for unintended nefarious...

Cybersecurity, Free Speech, and Sovereignty

October 6, 2011

Andrew McLaughlin is Executive Director of Civic Commons, and a Lecturer in Law at Stanford Law School, teaching a course on freedom of speech in the Internet age.

Book Talk: How American Innovation Can Overcome the Asian Challenge

March 17, 2011

Council on Foreign Relations (CFR) Senior Fellow Adam Segal will talk about his new book, "Advantage: How American Innovation Can Overcome the Asian Challenge", analyzing Asia's technological rise,...

Markets, Information, and the Spreading of Risks: The Economic Meltdown and Organizational Theory

April 1, 2010

AbstractSocial science interpretations of the meltdown emphasize system characteristics such as complexity and coupling, and/or culture as in neo-institutional theories.  Examining regulatory...

Topic: Cybersecurity

October 21, 2009

NOTE: This event has been cancelled.    Speaker bio: Caleb Sima founded Bluebox, a startup specializing in mobile security, and SPI Dynamics, the leading provider of Web application security...


Byron Reeves Byron Reeves Paul C. Edwards Professor of Communication
Daphne Keller Daphne Keller Director of Program on Platform Regulation, Cyber Policy Center
Lee Ross Lee Ross Stanford Federal Credit Union Professor of Psychology
Russell Poldrack Russell Poldrack Albert Ray Lang Professor, Department of Psychology
dan correa Daniel Correa Cyber Initiative Fellow
thumbnail headshot Marc Goodman Affiliate
chuck eesley Charles Eesley Associate Professor, Stanford Technology Ventures Program (STVP), W.M. Keck Foundation Faculty Scholar, Morgenthaler Faculty Fellow, Schulze Family Foundation Distinguished Professor
ramesh johari Ramesh Johari Associate Professor of Management Science and Engineering and Computer Science (by courtesy) and Electrical Engineering (by courtesy)
Lenore Herzenberg Leonore A. Herzenberg Department of Genetics Professor
Jeff Chi Jeffrey Chi Clinical Associate Professor of Medicine
nigam shah Nigam H. Shah Associate Professor of Medicine (Biomedical Informatics Research) and of Biomedical Data Science
Jennifer Pan Jennifer Pan Assistant Professor of Communication, Assistant Professor, by courtesy, of Political Science, Assistant Professor, by courtesy, of Sociology