National Academies Press: OpenBook
« Previous: Appendix A: Committee Member and Staff Biographies
Suggested Citation:"Appendix B: Symposium Agenda." National Research Council and National Academy of Engineering. 2003. Critical Information Infrastructure Protection and the Law: An Overview of Key Issues. Washington, DC: The National Academies Press. doi: 10.17226/10685.
×

B SYMPOSIUM AGENDA

Opening Address

Wm A. Wulf

President, National Academy of Engineering

Setting the Stage

Eric Benhamou

Chairman, 3Com Corporation

“The Internet as a Critical Infrastructure”

Philip R. Reitinger

Deputy chief, Computer Crime and Intellectual Property Section, U.S. Department of Justice

“Critical Infrastructure Protection: The Law Enforcement Perspective”

John G. Grimes

Chair, Industry Executive Subcommittee, National Security Telecommunications Advisory Council (NSTAC) and vice president, Raytheon Company

“NSTAC: A Proven Industry-Government Partnership to Protect Critical Information Infrastructures”

Suggested Citation:"Appendix B: Symposium Agenda." National Research Council and National Academy of Engineering. 2003. Critical Information Infrastructure Protection and the Law: An Overview of Key Issues. Washington, DC: The National Academies Press. doi: 10.17226/10685.
×

Colonel Timothy Gibson (U.S. Army)

Director of technology, Joint Task Force-Computer Network Operations

“Vulnerabilities of Military Information Infrastructures and the Consequences: DDOS Case Study”

James Dempsey

Deputy director, Center for Democracy and Technology

“Protecting Information Infrastructure, Protecting Personal Information and Expression”

Information Sharing: What, When, How, and with Whom?

Lieutenant General (retired) David J. Kelley

Vice president of Information Operations, Lockheed Martin

“Overcoming Reluctance: Cooperation Between the Government and Private Sectors”

William E. Cohen

Assistant general counsel for policy studies, Federal Trade Commission

“Understanding Antitrust: A Vehicle for Maintaining Market Forces”

David Sobel

General counsel, Electronic Privacy Information Center

“Freedom of Information Act: Public Safety Confronts Public Information”

Legal Issues

Henry (Hank) Perritt, Jr.

Dean and professor of law, Illinois Institute of Technology, Chicago-Kent College of Law

“The Many Legal Faces of CIP”

Craig Silliman

Director of the network and facilities legal team, WorldCom

“The View from an ISP”

Elliot Turrini

Assistant U.S. attorney, U.S. Department of Justice

“Criminal Law and Critical Information Infrastructure Protection”

Suggested Citation:"Appendix B: Symposium Agenda." National Research Council and National Academy of Engineering. 2003. Critical Information Infrastructure Protection and the Law: An Overview of Key Issues. Washington, DC: The National Academies Press. doi: 10.17226/10685.
×

The Role of Privacy and Civil Liberties in Protecting Critical Infrastructures

Richard M. Smith

Chief technology officer, Privacy Foundation

“The View from a Privacy Advocate”

Harriet Pearson

Chief privacy officer, IBM

“The View from the Private Sector”

Organizing for Action

Ronald L. Dick

Director, National Infrastructure Protection Center, Federal Bureau of Investigation

“Public-Private Partnership: Keys to Success”

Captain J. Katharine Burton (U.S. Navy)

Assistant deputy manager, National Communications System

“The Telecommunications Infrastructure During a National Emergency: Lessons from September 11th”

Judith Miller

Partner, Williams & Connolly LLP

“Regulating Government Intervention in the Information Age”

Glenn Schlarman

Office of Management and Budget

“Defense of the Homeland: How Government Agencies Can Work Together”

Motivating the Private Sector

Frederick R. Chang

President and CEO, SBC Technology Resources, Inc.

“Economic Incentives”

William J. Semancik

Director, Laboratory for Telecommunications Sciences, National Security Agency

“Building the Case for Economically Sound Investments in Security”

Suggested Citation:"Appendix B: Symposium Agenda." National Research Council and National Academy of Engineering. 2003. Critical Information Infrastructure Protection and the Law: An Overview of Key Issues. Washington, DC: The National Academies Press. doi: 10.17226/10685.
×

Ty R. Sagalow

Executive vice president and chief operating officer, American International Group, Inc., eBusiness Risk Solutions

“Cyber Insurance: Improving Security Through Risk Management”

Milo Medin

Chief technology officer, Excite@Home

“Protection Efforts Meet Business Pressures”

Herbert H. Yan

Director, Allegheny Energy Supply Co. LLC

“Comparative Perspective from the Energy Business”

Creative Alternatives

Steven M. Bellovin

Fellow, AT&T Research

Whitfield Diffie

Distinguished engineer, Sun Microsystems

Suggested Citation:"Appendix B: Symposium Agenda." National Research Council and National Academy of Engineering. 2003. Critical Information Infrastructure Protection and the Law: An Overview of Key Issues. Washington, DC: The National Academies Press. doi: 10.17226/10685.
×
Page 83
Suggested Citation:"Appendix B: Symposium Agenda." National Research Council and National Academy of Engineering. 2003. Critical Information Infrastructure Protection and the Law: An Overview of Key Issues. Washington, DC: The National Academies Press. doi: 10.17226/10685.
×
Page 84
Suggested Citation:"Appendix B: Symposium Agenda." National Research Council and National Academy of Engineering. 2003. Critical Information Infrastructure Protection and the Law: An Overview of Key Issues. Washington, DC: The National Academies Press. doi: 10.17226/10685.
×
Page 85
Suggested Citation:"Appendix B: Symposium Agenda." National Research Council and National Academy of Engineering. 2003. Critical Information Infrastructure Protection and the Law: An Overview of Key Issues. Washington, DC: The National Academies Press. doi: 10.17226/10685.
×
Page 86
Critical Information Infrastructure Protection and the Law: An Overview of Key Issues Get This Book
×
 Critical Information Infrastructure Protection and the Law: An Overview of Key Issues
Buy Paperback | $45.00 Buy Ebook | $35.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

All critical infrastructures are increasingly dependent on the information infrastructure for information management, communications, and control functions. Protection of the critical information infrastructure (CIIP), therefore, is of prime concern. To help with this step, the National Academy of Engineering asked the NRC to assess the various legal issues associated with CIIP. These issues include incentives and disincentives for information sharing between the public and private sectors, and the role of FOIA and antitrust laws as a barrier or facilitator to progress. The report also provides a preliminary analysis of the role of criminal law, liability law, and the establishment of best practices, in encouraging various stakeholders to secure their computer systems and networks.

READ FREE ONLINE

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!