Cybersecurity
-

Drell Lecture Recording: https://youtu.be/K8qLqJwi4Qc

 

Drell Lecture Transcript: NA

 

Speaker's Biography: Admiral Inman graduated from the University of Texas at Austin in 1950, and from the National War College in 1972.  He became an adjunct professor at the University of Texas at Austin in 1987.  He was appointed as a tenured professor holding the Lyndon B. Johnson Centennial Chair in National Policy in August 2001.  He served as Interim Dean of the LBJ School of Public Affairs from 1 January to 31 December 2005 and again from January 2009 to March 2010.

Admiral Inman served in the U.S. Navy from November 1951 to July 1982, when he retired with the permanent rank of Admiral.  While on active duty he served as Director of the National Security Agency and Deputy Director of Central Intelligence.  After retirement from the Navy, he was Chairman and Chief Executive Officer of the Microelectronics and Computer Technology Corporation (MCC) in Austin, Texas for four years and Chairman, President and Chief Executive Officer of Westmark Systems, Inc., a privately owned electronics industry holding company for three years.  Admiral Inman also served as Chairman of the Federal Reserve Bank of Dallas from 1987 through 1990.

Admiral Inman’s primary business activity since 1990 has been investing in start-up technology companies, where he is a Managing Director of Gefinor Ventures and of Limestone Capital Advisors.  He serves as a Trustee of the American Assembly and the California Institute of Technology.  He is an elected Fellow of the National Academy of Public Administration.

Admiral Bob R. Inman National Security Agency
Lectures
Paragraphs

Modern distributed systems and networks, like those found in cyber-physical system domains such as critical infrastructures, contain many complex interactions among their constituent software and/or hardware components. Despite extensive testing of individual components, security vulnerabilities resulting from unintended and unforeseen component interactions (so-called implicit interactions) often remain undetected. This paper presents a method for identifying the existence of implicit interactions in designs of distributed cyber-physical systems using the algebraic modeling framework known as Communicating Concurrent Kleene Algebra (C²KA). Experimental results verifying the applicability of C²KA for identifying dependencies in system designs that would otherwise be very hard to find are also presented. More broadly, this research aims to advance the specification, design, and implementation of distributed cyber-physical systems with improved cybersecurity assurance by providing a new way of thinking about the problem of implicit interactions through the application of formal methods.

All Publications button
1
Publication Type
Working Papers
Publication Date
Journal Publisher
Proceedings of the 50th Hawaii International Conference on System Sciences, HICSS-50, pages 5988–5997
Authors
John Villasenor
-
Abstract: From programing firmware for IoT devices to misoperations in the field and control room, humans have the potential to offer creative, collaborative, and highly efficient solutions to some of society’s greatest challenges. However, human errors can lead to software vulnerabilities, blackouts, and loss of public trust. As we strive to make infrastructures more robust and lives safer, paradoxically, we often put humans at increased risk of distraction and error. Growing system and market speeds, interconnectivities between critical infrastructures, fear of compliance violations, and public scrutiny create challenges for operators, increase risks and costs, and prevent the system from deriving the greatest benefit from its people. Organizations are complex sociotechnical systems with complex political hierarchies; techniques such as root cause analysis demonstrate how intertwined our people and organizations are with technical system outcomes. Michael Legatt will highlight his work as a human factors engineer, from an emergency operations center during the 2003 blackout, to ten years at ERCOT (the grid operator for most of Texas), to founder of a company focused on improving human-computer and human-organizational interfaces for critical infrastructure management.
 
About the Speaker: Michael Legatt is the CEO and Founder of ResilientGrid. He has been a programmer for over 20 years in the energy, financial, medical, neuroscience research, and educational sectors. He has a Ph.D. in Clinical Health Psychology/Neuropsychology, a Ph.D. in Energy Systems Engineering, and is a Certified Performance Technologist.
 
As an amateur radio operator, he received a commendation for helping to provide emergency communications during the 2003 blackout in the northeastern United States, which sparked his interest in the psychology of critical infrastructure management.
 
Prior to founding ResilientGrid, Michael spent a decade as Electric Reliability Council of Texas’ Principal Human Factors Engineer. There, his development of the Macomber Map® was featured in several news outlets, and was credited as being instrumental in helping ERCOT operators maintain grid reliability through severe weather and record-setting wind generation. He also works on the behavioral aspects of consumer electric use, electric vehicle to grid integration, behavioral aspects of conservation and consumer awareness in grid management, and the cybersecurity, behavioral, and reliability issues that arise with integrating new technologies across layers of the grid.

Encina Hall, 2nd floor

Michael Legatt CEO and Founder ResilientGrid
Seminars
-

Abstract: Critical infrastructure systems including manufacturing facilities, ports, transportation systems, communications networks, and energy and water distribution systems often consist of many interacting components linked in complex ways. This can lead to unforeseen interactions among components that may not be expected or intended by the designers and operators of the system. These interactions constitute linkages within a system of which designers are generally unaware, and that therefore constitute a security vulnerability. In this talk, I will present and discuss a formal approach for identifying and analyzing the existence and severity of security vulnerabilities resulting from these previously unknown linkages (so-called implicit interactions) in critical infrastructure systems. The presence of these implicit interactions in a system can indicate unforeseen flaws that, if not mitigated, could be exploited by an attacker. This can have severe consequences in terms of the safety, security, and reliability of the system. Therefore, this notion of implicit interactions must be carefully managed in order to have systems that operate as intended, and that are resistant to cyber-attacks and failures. 

 
About the Speaker: Jason Jaskolka is a U.S. Department of Homeland Security Cybersecurity Postdoctoral Scholar at Stanford University within the Center for International Security and Cooperation (CISAC). He received his Ph.D. in Software Engineering in 2015 from McMaster University in Hamilton, Ontario, Canada. His research aims to address increasingly critical issues in designing and implementing safe, secure, and reliable systems. His current work involves the design and development of critical infrastructure cybersecurity assessment methodologies and associated modeling and simulation environments. His research interests include cybersecurity assurance, covert channel analysis, distributed multi-agent systems, and algebraic approaches to software engineering.

Encina Hall, 2nd floor

U.S. Department of Homeland Security Cybersecurity Postdoctoral Scholar CISAC
Seminars
-

Abstract: This presentation is adapted from two book chapters.  The first one published in 2007 is “Transforming U.S. Intelligence: The Digital Dimension” and the second chapter published in 2009 is “Vaults, Mirrors and Masks: Rediscovering US Counterintelligence - Counterintelligence Too Narrowly Practiced.”  Additionally, material from recent DSB and NSB studies is included:  “Resilient Military Systems and the Advanced Cyber Threat” and “A Review of U.S. Navy Cyber Defense Capabilities”.  Communications technologies have transformed the way information is created, stored, processed, viewed, and transmitted. But the same technologies have provided our adversaries with the tools for attacking and exploiting our infrastructure and military systems. The U.S. has long operated under the assumption that our critical systems would be secure if we applied current Information Assurance (IA) practices. The reality is that a sophisticated offense easily outmatches the capability of a defensive organization to protect its critical Information Technology (IT) systems.  This briefing attempts to convey the rationale behind this assertion. The presentation represents my views and is specifically not intended to represent the views of any organization with which I’m affiliated.

About the Speaker: Mr. Gosler is a Senior Fellow at the Johns Hopkins University Applied Physics Laboratory.  He is engaged in various DOD and Intelligence Community advisory boards such as the Defense Science Board.

His previous experience includes a 33 year career (1979-2013) at Sandia National Laboratories. His early contributions included red-teaming both cryptographic and nuclear weapon systems.  In 1989, he served as Sandia’s first Visiting Scientist to NSA.  In 1993, he established and directed the Vulnerability Assessments Program. From 1996-2001, he was on a Special Leave of Absence from Sandia.  After returning to Sandia, he became Sandia’s sixth lab Fellow.

In 1996, he entered the Senior Intelligence Service at CIA as the Director of the Clandestine Information Technology Office.  This office integrated targeting, analysis, technology development, and technical/human operations.

Additionally, he served as a Naval Reserve Officer from 1975-2003. 

His awards include: Lockheed Martin’s NOVA award, National Intelligence Medal of Achievement, DONOVAN award, Intelligence Medal of Merit, Director of Central Intelligence Director’s award, and the Legion of Merit.

Mr. Gosler earned a BS degree in Physics/Mathematics and a MS degree in Mathematics.

Encina Hall, 2nd floor

Jim Gosler Senior Fellow Johns Hopkins University Applied Physics Laboratory
Seminars
-

Abstract: What will be the state of digital security in five and 10 years? Will it be a "Wild West" where every person and organization must fight to protect their own personal data? Will the Internet of Things advance so much into our homes and cities that everyone – at all times – is under surveillance? Are sensors going to be smart enough to determine and predict human feelings – opening the door to cybercriminals hacking human emotion? These are scenarios from The University of California - Berkeley's Center for Long-Term Cybersecurity, which has modeled what the Internet and cybersecurity could look like in 2020 and beyond. Steve Weber, Faculty Director, and Betsy Cooper, Executive Director, will use examples from the scenarios to help think through what we should be doing today to prepare for the future of cybersecurity.

About the Speakers: Betsy Cooper is the Executive Director of the Berkeley Center for Long-Term Cybersecurity. Betsy, a former CISAC Postdoctoral Fellow, came to UC Berkeley from the Department of Homeland Security, where she served as an attorney advisor to the Deputy General Counsel and as a policy counselor in the Office of Policy. Prior to her arrival at Berkeley, Betsy worked for over a decade in homeland security consulting, managing projects for Atlantic Philanthropies (Dublin, Ireland), the Prime Minister's Strategy Unit in London, the World Bank, and a number of other think tanks. Betsy is also the author of over twenty manuscripts and articles on US and European immigration and refugee policy, and her book manuscript Europe's Security Solution: Can Immigrant Integration Really Prevent Terrorism? is currently under review. In addition to a law degree from Yale University, Betsy holds a DPhil in Politics from Oxford University, an M.Sc. in Forced Migration from Oxford University, and a B.A. in Industrial and Labor Relations from Cornell University. Betsy previously clerked for Judge William Fletcher on the Ninth Circuit Court of Appeals.
 
Steven Weber is the faculty director for the Berkeley Center for Long Term Cybersecurity (CLTC). He works at the intersection of technology markets, intellectual property regimes, and international politics. His research, teaching, and advisory work focus on the political economy of knowledge intensive industries, with special attention to health care, information technology, software, and global political economy issues relating to competitiveness. Steve went to medical school at Stanford then did his Ph.D. in the political science department also at Stanford. He served as special consultant to the president of the European Bank for Reconstruction and Development and has held academic fellowships with the Council on Foreign Relations and the Center for Advanced Study in the Behavioral Sciences, and was Director of the Institute of International Studies at UC Berkeley from 2003 to 2009. His books include The Success of Open Source and most recently The End of Arrogance: America in the Global Competition of Ideas (with Bruce Jentleson) and Deviant Globalization: Black Market Economy in the 21st Century (with Jesse Goldhammer and Nils Gilman).

Encina Hall, 2nd floor

Executive Director of the Berkeley Center for Long-Term Cybersecurity University of California | Berkeley
Steven Weber Faculty Director for the Berkeley Center for Long Term Cybersecurity University of California | Berkeley
Panel Discussions
-

Abstract: We all know that we face cyberrisks everyday, from destructive attacks on our critical infrastructure to the theft of intellectual property. Yet countries and companies are woefully behind in making the investments necessary to secure themselves and withstand potential attacks. How should we move forward? Given the range of cyberthreats facing the United States and its allies and partners we should focus on (1) securing our most important missions and operations and (2) on planning for the certainty of some technological disruption. The talk begins by presenting a series of assumptions about the limits and opportunities for security planners in mitigating risks (cyber and otherwise), and then outlines strategic recommendations for governments and companies to improve their cybersecuity posture. It explores elements of effective cyber strategy; the role of leaders in managing cybersecurity across large organizations; the future of public-private partnerships for collective defense and contingency response; and the dark but necessary nature of resiliency planning. 

About the Speaker: Jonathan Reiber is currently Senior Fellow at the University of California at Berkeley's Center for Long-Term Cybersecurity. A writer, speaker, and security researcher, Mr. Reiber held a number of senior advisory positions in the Obama Administration within the U.S. Department of Defense. He was also the principal author of the U.S. Department of Defense Cyber Strategy (2015).

From January 2013 to September 2015, he served as Chief Strategy Officer for Cyber Policy in the Office of the Secretary of Defense. As Chief Strategy Officer, he advised the Pentagon leadership and led strategic initiatives across the cyber policy portfolio, to include strategic planning; key international, interagency, and industry partnerships; and strategic communications. In addition to serving as Chief Strategy Officer, he was also the Executive Secretary of the Defense Science Board Task Force on Cyber Deterrence.

Earlier in the Obama Administration, Mr. Reiber served as Special Assistant and Speechwriter to the United States' Deputy Secretary of Defense, Dr. Ashton B. Carter, and previously as Special Assistant to the United States' Principal Deputy Under Secretary of Defense for Policy, Dr. James N. Miller. In both positions he focused on strategy, Middle East security, Asia-Pacific security, cyber policy, and public communications.

From 2007 to 2009, Mr. Reiber was Research Manager at Ergo, a consulting and intelligence firm focusing on emerging markets. At Ergo he coordinated scenario planning exercises and deep-dive geopolitical analysis, advising Fortune 500 companies and other organizations on the political and social affairs of South Asia, Africa, and the Middle East. Earlier in his career he served with the United Nations Peacekeeping Mission in Sudan, as a policy advisor to the Episcopal Church of the United States, and as a Thomas J. Watson Fellow in South Africa, Italy, India, Turkey and Cyprus, where he studied the role of religion in political and social change.

Mr. Reiber is a graduate of Middlebury College, where he studied Religion, and The Fletcher School of Law and Diplomacy, where he focused his studies on international security and U.S. diplomatic history and served as Editor-in-Chief of The Fletcher Forum of World Affairs.

At Berkeley Mr. Reiber focuses his writing and research on human resilience, national contingency planning, and cybersecurity in the Asia-Pacific region. He regularly advises companies and governments on cybersecurity, strategy, and geopolitical risk. 

Encina Hall, 2nd floor

Jonathan Reiber Senior Fellow University of California at Berkeley's Center for Long-Term Cybersecurity
Seminars
-

Abstract:   There is a state of high anxiety about this year's election being "hacked" or "rigged". The media began speculating about the possibility when emails were stolen from the Democratic National Committee and, later, Hillary Clinton's campaign chairman, allegedly by state-sponsored hackers. Additionally, Donald Trump has been predicting that the election will be "rigged", worrying many of his supporters. New voter ID requirements have been imposed in many states in response to allegations of "voter fraud", but voting rights advocates worry that these requirements will disenfranchise many voters. In this talk, I will attempt a rational evaluation of election security risks and propose what we should do to address them.

About the Speaker: David L. Dill is the Donald E. Knuth Professor in the School of Engineering and Professor of Computer Science at Stanford University, where he has been on the faculty for 29 years. He is a member of the National Academy of Engineering and the American Academy of Arts and Sciences. He has been working on policy issues in voting technology since 2003. He is the founder of VerifiedVoting.org, whose mission is to safeguard elections in the digital age, and continues to serve as a board director in that organization.  He was a principle investigator in the National Science Foundation's "ACCURATE" voting tresearch center center from 2006 to 2011. In 2004, he received the Electronic Frontier Foundation's "Pioneer Award" for spearheading and nurturing the popular movement for integrity and transparency in modern elections."

Encina Hall, 2nd floor

David Dill Professor in the School of Engineering and Professor of Computer Science Stanford University
Seminars

CISAC
Stanford University
Encina Hall, E205
Stanford, CA 94305-6165

(650) 725-8035
0
Senior Research Scholar
rsd19_072_0081a.jpg

Harold Trinkunas is the Deputy Director and a Senior Research Scholar at the Center for International Security and Cooperation at the Freeman Spogli Institute for International Studies at Stanford University. Prior to arriving at Stanford, Dr. Trinkunas served as the Charles W. Robinson Chair and senior fellow and director of the Latin America Initiative in the Foreign Policy program at the Brookings Institution. His research focuses on issues related to foreign policy, governance, and security, particularly in Latin America. Trinkunas has written on emerging powers and the international order, ungoverned spaces, terrorism financing, borders, and information operations. 

Trinkunas has co-authored Militants, Criminals and Warlords: The Challenge of Local Governance in an Age of Disorder (Brookings Institution Press, 2017), Aspirational Power: Brazil’s Long Road to Global Influence (Brookings Institution Press, 2016) and authored Crafting Civilian Control of the Military in Venezuela (University of North Carolina Press, 2005). He co-edited and contributed to Oxford Handbook of Peaceful Change in International Relations (Oxford University Press, 2021), Three Tweets to Midnight: The Effect of the Global Information Ecosystem on the Risk of Nuclear Conflict  (Hoover Institution Press, 2020), American Crossings: Border Politics in the Western Hemisphere (Johns Hopkins University Press, 2015), Ungoverned Spaces: Alternatives to State Authority in an Era of Softened Sovereignty (Stanford University Press, 2010), Global Politics of Defense Reform (Palgrave MacMillan, 2008), and Terrorism Financing and State Responses (Stanford University Press, 2007).

Dr. Trinkunas also previously served as an associate professor and chair of the Department of National Security Affairs at the Naval Postgraduate School in Monterey, California. He received his doctorate in political science from Stanford University in 1999. He was born in Maracaibo, Venezuela. 

 

Deputy Director
CV
Date Label

While the Cyber Security Summit 2016 is not open to walk-ins, live-streaming will be available, starting on Monday, September 19 at 2:30PM

http://livestream.com/stanford_webcast

 

The debate on cybersecurity has never been more important. Senior experts on all aspects of cybersecurity will convene at Stanford University for the Munich Security Conference's 4th Cyber Security Summit, hosted by the Center for International Security and Cooperation (CISAC) at the Freeman Spogli Institute for International Studies
(FSI).

Are our societies prepared for large-scale cyberattacks on critical infrastructures? How can countries establish joint norms and rules for cyber space? Which steps are necessary in order to stop the digital advance of the 'Islamic State' and other terrorist groups? In how far should data privacy be compromised for effective intelligence work?

Around 140 senior representatives from science, politics, business and the military will debate these and other questions in the course of several panels held over two days in Encina Hall, home to CISAC and FSI. Among the participants are representatives from US and EU authorities, the cyber security coordinators of several European states, numerous business leaders, as well as security experts from various Silicon Valley companies.

Image
cgm16 stanford twitter header

 

Conferences
Subscribe to Cybersecurity