A Workshop Agenda and Participants List
WORKSHOP ON DATA BREACH AFTERMATH AND RECOVERY FOR
INDIVIDUALS AND INSTITUTIONS
January 12, 2016
Keck Center of the National Academies of Sciences, Engineering, and Medicine
Washington, D.C.
AGENDA
12:30 p.m. | Welcome and Overview |
Fred B. Schneider, Forum Chair |
|
12:45 |
Empirical, Consumer, and Data Holder Perspectives |
Joel Reidenberg, Fordham University |
|
Sasha Romanosky, RAND Corporation | |
Beth Givens, Privacy Rights Clearinghouse | |
Tom Murphy, University of Pennsylvania | |
Heather Adkins, Google, Inc. | |
2:50 |
Break |
3:15 |
Legal and Policy Perspectives |
Bob Belair, Arnall Golden Gregory, LLP |
|
James Harvey, Alston & Bird | |
David Vladeck, Georgetown University | |
Aaron Burstein, Federal Trade Commission | |
4:55 |
Wrap-up Reflections and Discussion |
Deirdre Mulligan, Forum Member |
|
5:30 |
Reception |
PARTICIPANTS LIST
Heather Adkins, Google, Inc.
Anita Allen, University of Pennsylvania
Christina Ayiotis, Georgetown Cybersecurity Law Institute
Robert Belair, Arnall Golden Gregory, LLP
Robert Blakley, CitiGroup, Inc.
Shenae Bradley, National Academies of Sciences, Engineering, and Medicine
John Breyault, National Consumers League
Aaron Burstein, Federal Trade Commission
Fred H. Cate, Indiana University
David D. Clark, Massachusetts Institute of Technology
Richard J. Danzig, Center for a New American Security
Janel Dear, National Academies of Sciences, Engineering, and Medicine
Donna F. Dodson, National Institute for Standards and Technology
Ann Drobnis, Computing Community Consortium
Jon Eisenberg, National Academies of Sciences, Engineering, and Medicine
Eric Fischer, Congressional Research Service
Robert Fortson, Department of the Treasury
Beth Givens, Privacy Rights Clearinghouse
Eric Grosse, Google, Inc.
Emily Grumbling, National Academies of Sciences, Engineering, and Medicine
James Harvey, Alston & Bird
Paul C. Kocher, Cryptography Research, Inc.
Tadayoshi Kohno, University of Washington
Butler W. Lampson, Microsoft Corporation
Steven B. Lipner, Independent Consultant
Clifford Lynch, Coalition for Networked Information
William B. Martin, National Security Agency
Keith Marzullo, Networking and Information Technology Research and Development Program
Lynette I. Millett, National Academies of Sciences, Engineering, and Medicine
Deirdre K. Mulligan, University of California, Berkeley
Tom Murphy, University of Pennsylvania
Joel R. Reidenberg, Fordham University
Sasha Romanosky, RAND Corporation
Tony W. Sager, Center for Internet Security
William H. Sanders, University of Illinois, Urbana-Champaign
Fred B. Schneider, Cornell University
Lisa Singh, Georgetown University
Peter Swire, Georgia Institute of Technology
Scott Tousley, Department of Homeland Security
Charlie Tupitza, Global Forum to Advance Cyber Resilience
David C. Vladeck, Georgetown University
Helen Wright, Computing Research Association
Mary Ellen Zurko, Cisco Systems, Inc.