Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.
Appendix B Workshop Agenda THuRSDAy, JuNE 10, 2010 8:15 Chairmanâs Opening Remarks John Steinbruner, University of Maryland 8:30 law and Economics of CybersecurityâTyler Moore, Harvard University Discussion Leader: Jack Goldsmith, Harvard Law School 9:15 Paper on the Council of Europeâs Conention on CybercrimeâMichael Vatis, Steptoe & Johnson Discussion Leader: Sue Eckert, Brown University 10:00 Break 10:30 Surey Paper on Challenges in AttributionâW. Earl Boebert Discussion Leader: Steven Bellovin, Columbia University 11:15 decision making Under UncertaintyâRose McDermott, Brown University Discussion Leader: Jan Lodal, Lodal and Company Noon Break for Lunch 12:30 PM the Role of declaratory Policy in deterring the Use of Cyber ForceâStephen Lukasik, Georgia Institute of Technology Discussion Leader: Robert Jervis, Columbia University 1:15 Ciil liberties and Priacy implications of Policies to Preent CyberattacksâRobert Gellman Discussion Leader: Stephen Dycus, Vermont Law School 2:00 the Role of offensie Cyber Capability in national military Strategy and tacticsâGreg Rat- tray and Jason Healey Discussion Leader: Committee/Staff
PRoCEEdingS oF A woRkSHoP on dEtERRing CYBERAttACkS 2:45 issues of organization and ProcessâPaul Rosenzweig Discussion Leader: Jack Goldsmith 3:30 Break 4:00 launching âwarsâ in Cyberspace: the legal RegimeâMichael Schmitt, Durham University Discussion Leader: Stephen Dycus 4:45 Applicability of traditional deterrence Concepts and theory to the Cyber RealmâPatrick Morgan, University of California at Irvine Discussion Leader: Robert Jervis 5:30 Adjourn to Reception and Working Dinner / Small Group Discussions Keck Centerâ3rd Floor Atrium | 500 Fifth Street, NW FRIDAy JuLy 11, 2010 8:15 limitations on offensie operationsâMartin C. Libicki, RAND Discussion Leader: Steven Bellovin 9:00 Untangling AttributionâDavid Clark and Susan Landau Discussion Leader: Jan Lodal 9:45 Possible Forms of international Cooperation for Enhancing Cyber SecurityâAbraham Sofaer Discussion Leader: Sue Eckert 10:30 Break 11:00 deterrence theory and Cyber Conflict: Historical insights and Contemporary Challengesâ Richard Weitz Discussion Leader: John Steinbruner 11:45 implementing Hackback: A Policy AnalysisâJay Kesan Discussion Leader: Jack Goldsmith 12:30 PM Break for Lunch 1:00 deterring third-party CollaborationâGeoff Cohen Discussion Leader: Jan Lodal 1:45 Strategic Policies for Cyberdeterrence: A game-theoretic FrameworkâM. Gupte, A.D. Jag- gard, R. McLean, S.R. Rajagopalan, R.N. Wright Discussion Leader: Committee/Staff 2:30 Use of multi-modeling to inform Cyber deterrence Policy and StrategiesâRobert Elder, Alexander Levis Discussion Leader: Steven Bellovin