National Academies Press: OpenBook
« Previous: Appendix A: Reprinted Letter Report from the Committee on Deterring Cyberattacks
Suggested Citation:"Appendix B: Workshop Agenda." National Research Council. 2010. Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. Washington, DC: The National Academies Press. doi: 10.17226/12997.
Page 375
Suggested Citation:"Appendix B: Workshop Agenda." National Research Council. 2010. Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. Washington, DC: The National Academies Press. doi: 10.17226/12997.
Page 376

Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

Appendix B Workshop Agenda THuRSDAy, JuNE 10, 2010 8:15 Chairman’s Opening Remarks John Steinbruner, University of Maryland 8:30 law and Economics of Cybersecurity—Tyler Moore, Harvard University Discussion Leader: Jack Goldsmith, Harvard Law School 9:15 Paper on the Council of Europe’s Conention on Cybercrime—Michael Vatis, Steptoe & Johnson Discussion Leader: Sue Eckert, Brown University 10:00 Break 10:30 Surey Paper on Challenges in Attribution—W. Earl Boebert Discussion Leader: Steven Bellovin, Columbia University 11:15 decision making Under Uncertainty—Rose McDermott, Brown University Discussion Leader: Jan Lodal, Lodal and Company Noon Break for Lunch 12:30 PM the Role of declaratory Policy in deterring the Use of Cyber Force—Stephen Lukasik, Georgia Institute of Technology Discussion Leader: Robert Jervis, Columbia University 1:15 Ciil liberties and Priacy implications of Policies to Preent Cyberattacks—Robert Gellman Discussion Leader: Stephen Dycus, Vermont Law School 2:00 the Role of offensie Cyber Capability in national military Strategy and tactics—Greg Rat- tray and Jason Healey Discussion Leader: Committee/Staff 

 PRoCEEdingS oF A woRkSHoP on dEtERRing CYBERAttACkS 2:45 issues of organization and Process—Paul Rosenzweig Discussion Leader: Jack Goldsmith 3:30 Break 4:00 launching “wars” in Cyberspace: the legal Regime—Michael Schmitt, Durham University Discussion Leader: Stephen Dycus 4:45 Applicability of traditional deterrence Concepts and theory to the Cyber Realm—Patrick Morgan, University of California at Irvine Discussion Leader: Robert Jervis 5:30 Adjourn to Reception and Working Dinner / Small Group Discussions Keck Center—3rd Floor Atrium | 500 Fifth Street, NW FRIDAy JuLy 11, 2010 8:15 limitations on offensie operations—Martin C. Libicki, RAND Discussion Leader: Steven Bellovin 9:00 Untangling Attribution—David Clark and Susan Landau Discussion Leader: Jan Lodal 9:45 Possible Forms of international Cooperation for Enhancing Cyber Security—Abraham Sofaer Discussion Leader: Sue Eckert 10:30 Break 11:00 deterrence theory and Cyber Conflict: Historical insights and Contemporary Challenges— Richard Weitz Discussion Leader: John Steinbruner 11:45 implementing Hackback: A Policy Analysis—Jay Kesan Discussion Leader: Jack Goldsmith 12:30 PM Break for Lunch 1:00 deterring third-party Collaboration—Geoff Cohen Discussion Leader: Jan Lodal 1:45 Strategic Policies for Cyberdeterrence: A game-theoretic Framework—M. Gupte, A.D. Jag- gard, R. McLean, S.R. Rajagopalan, R.N. Wright Discussion Leader: Committee/Staff 2:30 Use of multi-modeling to inform Cyber deterrence Policy and Strategies—Robert Elder, Alexander Levis Discussion Leader: Steven Bellovin

Next: Appendix C: Biosketches of Authors »
Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy Get This Book
Buy Paperback | $80.00
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

In a world of increasing dependence on information technology, the prevention of cyberattacks on a nation's important computer and communications systems and networks is a problem that looms large. Given the demonstrated limitations of passive cybersecurity defense measures, it is natural to consider the possibility that deterrence might play a useful role in preventing cyberattacks against the United States and its vital interests. At the request of the Office of the Director of National Intelligence, the National Research Council undertook a two-phase project aimed to foster a broad, multidisciplinary examination of strategies for deterring cyberattacks on the United States and of the possible utility of these strategies for the U.S. government.

The first phase produced a letter report providing basic information needed to understand the nature of the problem and to articulate important questions that can drive research regarding ways of more effectively preventing, discouraging, and inhibiting hostile activity against important U.S. information systems and networks.

The second phase of the project entailed selecting appropriate experts to write papers on questions raised in the letter report. A number of experts, identified by the committee, were commissioned to write these papers under contract with the National Academy of Sciences. Commissioned papers were discussed at a public workshop held June 10-11, 2010, in Washington, D.C., and authors revised their papers after the workshop.

Although the authors were selected and the papers reviewed and discussed by the committee, the individually authored papers do not reflect consensus views of the committee, and the reader should view these papers as offering points of departure that can stimulate further work on the topics discussed. The papers presented in this volume are published essentially as received from the authors, with some proofreading corrections made as limited time allowed.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook,'s online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  6. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  7. ×

    View our suggested citation for this chapter.

    « Back Next »
  8. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!