National Academies Press: OpenBook

Data Breach Aftermath and Recovery for Individuals and Institutions: Proceedings of a Workshop (2016)

Chapter: Appendix A: Workshop Agenda and Participants List

« Previous: Appendixes
Suggested Citation:"Appendix A: Workshop Agenda and Participants List." National Academies of Sciences, Engineering, and Medicine. 2016. Data Breach Aftermath and Recovery for Individuals and Institutions: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/23559.
×

A Workshop Agenda and Participants List

WORKSHOP ON DATA BREACH AFTERMATH AND RECOVERY FOR
INDIVIDUALS AND INSTITUTIONS

January 12, 2016
Keck Center of the National Academies of Sciences, Engineering, and Medicine
Washington, D.C.

AGENDA

12:30 p.m. Welcome and Overview

Fred B. Schneider, Forum Chair

12:45

Empirical, Consumer, and Data Holder Perspectives

Joel Reidenberg, Fordham University

Sasha Romanosky, RAND Corporation
Beth Givens, Privacy Rights Clearinghouse
Tom Murphy, University of Pennsylvania
Heather Adkins, Google, Inc.

2:50

Break

3:15

Legal and Policy Perspectives

Bob Belair, Arnall Golden Gregory, LLP

James Harvey, Alston & Bird
David Vladeck, Georgetown University
Aaron Burstein, Federal Trade Commission

4:55

Wrap-up Reflections and Discussion

Deirdre Mulligan, Forum Member

5:30

Reception

Suggested Citation:"Appendix A: Workshop Agenda and Participants List." National Academies of Sciences, Engineering, and Medicine. 2016. Data Breach Aftermath and Recovery for Individuals and Institutions: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/23559.
×

PARTICIPANTS LIST

Heather Adkins, Google, Inc.

Anita Allen, University of Pennsylvania

Christina Ayiotis, Georgetown Cybersecurity Law Institute

Robert Belair, Arnall Golden Gregory, LLP

Robert Blakley, CitiGroup, Inc.

Shenae Bradley, National Academies of Sciences, Engineering, and Medicine

John Breyault, National Consumers League

Aaron Burstein, Federal Trade Commission

Fred H. Cate, Indiana University

David D. Clark, Massachusetts Institute of Technology

Richard J. Danzig, Center for a New American Security

Janel Dear, National Academies of Sciences, Engineering, and Medicine

Donna F. Dodson, National Institute for Standards and Technology

Ann Drobnis, Computing Community Consortium

Jon Eisenberg, National Academies of Sciences, Engineering, and Medicine

Eric Fischer, Congressional Research Service

Robert Fortson, Department of the Treasury

Beth Givens, Privacy Rights Clearinghouse

Eric Grosse, Google, Inc.

Emily Grumbling, National Academies of Sciences, Engineering, and Medicine

James Harvey, Alston & Bird

Paul C. Kocher, Cryptography Research, Inc.

Tadayoshi Kohno, University of Washington

Butler W. Lampson, Microsoft Corporation

Steven B. Lipner, Independent Consultant

Clifford Lynch, Coalition for Networked Information

William B. Martin, National Security Agency

Keith Marzullo, Networking and Information Technology Research and Development Program

Lynette I. Millett, National Academies of Sciences, Engineering, and Medicine

Deirdre K. Mulligan, University of California, Berkeley

Tom Murphy, University of Pennsylvania

Joel R. Reidenberg, Fordham University

Sasha Romanosky, RAND Corporation

Tony W. Sager, Center for Internet Security

William H. Sanders, University of Illinois, Urbana-Champaign

Fred B. Schneider, Cornell University

Lisa Singh, Georgetown University

Peter Swire, Georgia Institute of Technology

Scott Tousley, Department of Homeland Security

Charlie Tupitza, Global Forum to Advance Cyber Resilience

David C. Vladeck, Georgetown University

Helen Wright, Computing Research Association

Mary Ellen Zurko, Cisco Systems, Inc.

Suggested Citation:"Appendix A: Workshop Agenda and Participants List." National Academies of Sciences, Engineering, and Medicine. 2016. Data Breach Aftermath and Recovery for Individuals and Institutions: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/23559.
×
Page 46
Suggested Citation:"Appendix A: Workshop Agenda and Participants List." National Academies of Sciences, Engineering, and Medicine. 2016. Data Breach Aftermath and Recovery for Individuals and Institutions: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/23559.
×
Page 47
Next: Appendix B: Planning Committee Biographies »
Data Breach Aftermath and Recovery for Individuals and Institutions: Proceedings of a Workshop Get This Book
×
Buy Ebook | $14.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

In January 2016, the National Academies of Sciences, Engineering, and Medicine hosted the Workshop on Data Breach Aftermath and Recovery for Individuals and Institutions. Participants examined existing technical and policy remediations, and they discussed possible new mechanisms for better protecting and helping consumers in the wake of a breach. Speakers were asked to focus on data breach aftermath and recovery and to discuss ways to remediate harms from breaches. This publication summarizes the presentations and discussions from the workshop.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!