This schedule is subject to change. Speakers and panelists will be listed when they are confirmed.
Day 1 (Oct. 13)
Breakfast Keynote | Grand Ballrom
- From the Plumbers to Citizenfour: Comparing Surveillance and Civil Liberties Past and Present. Edward Snowden will join Mike German, the former FBI special agent and whistleblower, author and expert on the history of the Church Committee for a presentation titled “From the Plumbers to Citizenfour: Comparing Surveillance and Civil Liberties Past and Present.” German, currently at the Brennan Center, has done extensive research into the history of the intelligence scandals of the 1970s and the two will explore whether one can draw meaningful comparisons between activities like the infamous “Family Jewels”—the CIA’s long-running campaign of foreign subversion, political assassination, and the mass surveillance of American dissidents and agency critics—and the foreign and domestic NSA collection programs revealed by Mr. Snowden. On the one hand, the activities revealed by the Church Committee were the outgrowth of dramatic social changes in American society—from the “Red Scares” of the early Cold War to the Rights Revolution in the 1950s and 1960s to the Vietnam War in the 1960s and 1970s—while the NSA surveillance has its origins in one traumatic historical event: the attacks of September 11, 2001. On the other hand, both scandals sprang out of excessive secrecy and a fundamental lack of checks and balances in the national security establishment. Also, and of particular relevance to CFP, these activities were aided by rapid advances in surveillance and other intelligence technologies. Can we draw useful parallels between the two eras? Was one scandal “worse” than another (and is that even an interesting question)? What do they portend for the future? Snowden and German will discuss these and other pressing questions at CFP 2015.
- Edward Snowden, NSA Whistleblower
- Mike German, Fellow, Brennan Center for Justice
- Predictive Policing: Prejudicial 'Pre Crime' or Helpful Sociological Analysis | Grand Ballroom Police departments are beginning to experiment with the use of big data to try to proactively anticipate and prevent crime. Chicago, for example, used a type of social-network analysis to create a "Heat List" of people judged most likely to be involved in violent crime. The same techniques can be used to deploy social services. This panel will explore application of big data to crime—the legal and technological issues it raises, and whether it’s likely to turn into a prejudicial form of "pre-crime," or a legitimate and potentially helpful form of sociological analysis.
- Rachel Levinson-Waldman, Senior Counsel, Brennan Center for Justice (moderator)
- Jay Stanley, Senior Policy Analyst, ACLU
- Andrew Papachristos, Associate Professor, Yale University
- Andrew Ferguson, Professor of Law, University of the District of Columbia
- David Robinson, Principal, Upturn
- Laboratories of Democracy or Mad Scientists? The Interplay Between State Legislation and National Policy | Chestnut State legislatures are eagerly proposing bills with significant impact on privacy and free speech, from warrant requirements for law enforcement use of Stingrays to limitations on private uses of drones, to efforts to criminalize online harassment or penetrate safe harbors for user-generated content. Is the effect of these laws really limited to the state where they are enacted? Or is there a need for nationwide engagement with state legislation to push for consistent strong protections for individual rights – and if so, which bills merit that level of engagement? And can state legislation even be useful to pressure the federal government to act?
- G.S. Hans, Policy Counsel & Director, CDT-SF, Center for Democracy & Technology (moderator)
- Chris Conley, Technology and Civil Liberties Policy Attorney, ACLU of Northern California
- Jim Halpert, Partner, DLA Piper
- Is Government Hacking Ever OK? And Should Companies Ever Help? | Walnut Revelations about top-secret NSA hacking units, debates about the judicial process for FBI hacking during criminal investigations, and the increased use of strong encryption raise the question: Is there ever a time and a place for government hacking, and should companies help?
- Tim Starks, Journalist, Politico (moderator)
- Robert Knake, Senior Fellow for Cyber Policy at Council on Foreign Relations and lecturer at Georgetown University, and former Director for Cybersecurity Policy at the National Security Council
- Ross Schulman, Senior Policy Counsel, New America's Open Technology Institute
- Chris Soghoian, Senior Technologist, ACLU
- The Third Party Doctrine: Plotting the End for Smith & Miller | Walnut The “third-party doctrine” is a major obstacle to privacy rights in the digital age. This panel will explore the opportunities to limit its effect, including ECPA reform and current legal challenges.
- Greg Nojeim, Senior Counsel and Director of the Freedom, Security, and Technology Project, Center for Democracy & Technology
- Mariko Hirose, Senior Staff Attorney, NYCLU
- Michael Price, Counsel, Liberty and National Security Program, Brennan Center for Justice
- Internet Content Blocking by the U.S. International Trade Commission | Grand Ballroom In April 2014, a little-known agency called the U.S. International Trade Commission handed itself power to block data on the Internet. Internet companies fear for the future of cloud computing, civil society is worried about the openness of the Internet, and the MPAA wants to use the agency to implement SOPA-style website blocking. In this session, we’ll discuss how we got here, what might come of the decision, and what is being done about it.
- Russell Brandom, The Verge (moderator)
- Mike Godwin, General Counsel, R Street Institute
- Charles Duan, Director, Patent Reform Project, Public Knowledge
- Bill Watson, Trade Policy Analyst, Cato Institute
- Jonathan Engler,Partner, Adduci, Mastriani & Schaumberg
Lunch Speaker Series | Grand Ballroom
- Malkia Cyril, Executive Director, the Center for Media Justice. In a digital age and an era of big data, communities across the country and around the globe are seeking strategies to fight against the discriminatory use of technology in policing, profiling, and prison profiteering. As a leader in the movements for Black lives and media justice, Cyril will discuss the impacts, implications, and bold innovations in the fight against high-tech discrimination.
- Will Potter, investigative journalist and TED Senior Fellow. Potter will discuss the surveillance — by both government agencies and private companies — of animal rights and environmental activists, and what other social movements can learn from it.
- Craig Aaron president of the Free Press Action Fund, believes 2016 should be the year of the internet voter. Millions of Americans clearly care about computers, freedom and privacy, though you might not know that from watching the campaign trail. So how do we translate all the populist energy around issues like SOPA, Snowden and Net Neutrality into real political power and lasting policy changes? Aaron will share a few ideas and describe his group’s new internet 2016 campaign.
- The Future of Free Speech in the EU (or, "Has the EU Gone Insane?") | Chestnut A series of EU court decisions seem to have the American media convinced that the EU has abandoned all interest in freedom of speech. In the 2014 Google v. Spain case, the Court of Justice ruled that Google is responsible for the personal information it processes under the "right to be forgotten." The judgment requires Google to consider requests from individuals to remove links to web pages from the results of searches conducted on their names. The Hungarian Civil Liberties Union reports an increasingly hostile climate for civil society. In the UK, GCHQ was caught spying on two international human rights groups. And in Delfi AS v. Estonia, the Grand Chamber of the European Court held the Delfi news portal responsible for failing to prevent unlawful comments from being published in its news section, widely interpreted as moving the bar from notice-and-takedown to prior restraint. Has the EU gone insane? Has it really abandoned its commitment to freedom of speech as a fundamental human right? This panel will feature both American and European perspectives on these questions.
- Wendy M. Grossman, Freelance Writer (moderator)
- Nicola Lugaresi, Associate Professor, University of Trento
- Paul Alan Levy, Attorney, Public Citizen Litigation Group
- Fanny Hidvegi, International Privacy Fellow, Electronic Privacy Information Center
- Intermediary Liability: How to Kill Content on the Internet | Grand Ballroom Thanks to statutes like Section 230 of the Communications Decency Act and even the Digital Millennium Copyright Act, intermediaries in the United States are at least theoretically shielded from liability for how actions by users on their systems. As a result, the internet has become a diverse and vibrant platform for speech of all sorts. Some, however, seek routes around these limitations on liability. One vector of attack is through the DMCA, but new tactics are also being tried, including the pursuit of domain‐wide injunctions, site blocking, and threats to payment providers, as well as attempts to limit Section 230. Many of these attacks on intermediaries are launched by entities focused on controlling intellectual property rights . In this talk we’ll consider those, and also how these tactics are being used by those with objections to other types of speech, such as adult content, including “revenge porn” and online advertisements, or content governed by the “Right to Be Forgotten.” And we’ll look at what can be done to better protect all online speech from censorship by strengthening intermediaries’ legal and political positions.
- Cathy Gellis, Attorney (moderator)
- Rebecca Tushnet, Professor of Law, Georgetown University Law Center
- Emma Llanso, Director, Free Expression Project, Center for Democracy & Technology
- Not Just the NSA: How Local Police and Law Enforcement Use Stingrays to Track Our Phones | Walnut Cell-site simulators come by a few different names — Stingrays, IMSI Catchers, Dirtboxes — and are one of law enforcement’s most closely-guarded secrets. These technologies sweep up the personal information of everyone in the area where they are deployed and operate in muddy legal waters. Federal agencies are attempting to put stricter policies in place to prevent the abuse of Stingrays, but it is still unknown how these revisions will affect their use. What are these technologies, and what can be done at a policy level to ensure that Stingrays are used within a strict legal framework? Can we ensure that communities as a whole do not have their rights violated and that the legal system protects against unlawful spying?
- Mike Rispoli, Press Freedom Campaign Director, Free Press (moderator)
- Neema Singh Guliani, Legislative Counsel, ACLU
- Chris Soghoian, Principal Technologist and Senior Policy Analyst, ACLU Speech, Privacy, and Technology Project
- Devlin Barrett, Wall Street Journal
- Lara Flint, Chief Counsel for National Security, Senate Judiciary Committee, Ranking Member Patrick Leahy
- Corporate Perspectives on Extraterritoriality | Chestnut Traditionally, governments have relied on laws to govern domestic activity. The internet, however, does not respect traditional geographic borders, which creates new challenges for governance. Companies that operate online can reach customers all over the world from any location. They can operate out of one country while storing data in another, or in many others. In this complicated legal landscape, how do you determine what law applies? When do you respond to government requests for user data? How do you protect user privacy? How do laws in individual countries - including laws requiring data localization or that imply extraterritorial impact - factor into this calculus? Are some countries really "better" than others? This panel will address how several different types of companies approach these questions and others.
- Wendy Grossman, Freelance Writer (moderator)
- Mike Nelson, Public Policy, CloudFlare
- Christian Dawson, Chairman, i2Coalition
- Bijan Madhani, Policy Counsel, Computer and Communications Industry Association
- Christopher Hopfensperger, Policy Director, BSA: The Software Alliance
- De-Identifying Video From Body Worn Cameras: Balancing Privacy and Public Accountability | Grand Ballroom As police departments deploy Body Worn Cameras (BWCs), there is a growing conflict between the desire to make the video available for public accountability and the need restrict access to protect privacy. Video de-identification offers the promise of balancing public access and privacy. But while many are familiar with “face blurring” through Google StreetView and TV, in reality video de-identification is error prone and misses many kinds of privacy sensitive information. This panel will discuss the technology and policy requirements for video de-identification, with representatives from law enforcement, computer vision, and public access communities.
- Simson Garfinkel, Senior Advisor, Information Access Division, National Institute of Standards and Technology
- Melissa Clemens, Detective, Newport News Police Department
- Andy Wrenn, Senior Regional Manager, Video and Evidence, TASER International
- Hannah Bloch-Wehba, Stanton Foundation National Security Fellow, Reporters Committee for Freedom of the Press
- Dr. Jason Corso, Associate Professor of Electrical Engineering and Computer Science, University of Michigan
- Aliya Rahman, Community Organizer, Software Developer, and Program Fellow, New America's Open Technology Institute.
- What Really Happened After the Battle Against SOPA and PIPA? | Walnut '(Note: This is a two hour panel from 3pm to 5pm)' For the last two and half years, the research team represented on this panel has sought to develop an empirically grounded explanation of what happened in the political battle over the Stop Online Privacy Act (“SOPA”). What led to the spectacular death of a bill many considered on the fast track to become law? Observations led the research team to believe the dominant SOPA stories were incomplete in many respects and inaccurate in others. Members of the research team will share some of their findings and engage in a discussion with other experts. This special 2-hour program will start with an interactive exercise to allow participants to document their perspective on the SOPA story, and hear what we’ve learned from others.
- Jonathan Band, Attorney
- Mike Masnick, Founder and CEO, Floor64 and Editor, Techdirt blog.
- Elaine Sedenberg, PhD Student, University of California, Berkeley School of Information
- Sebastian Bentall, PhD Student, University of California, Berkeley School of Information
- Leslie Harris, Founder and Principal, Harris Strategy Group
- Deirdre Mulligan, Associate Professor in the School of Information at UC Berkeley and co-Director of the Berkeley Center for Law & Technology
Tutorial: Practical Privacy in 60 Minutes | Grand Ballroom With evermore talk about privacy controls, opt-outs, and plug-ins, what can we actually do as individuals to protect our privacy? A panel of privacy advocates will cut through all the options and discuss the easiest steps folks can take to actively protect their privacy without lots of hassle or too much time.
- Joseph Jerome, Policy Counsel, Future of Privacy Forum
- Meghan Land, Staff Attorney, Privacy Rights Clearinghouse
- Rainey Reitman, Activism Director, EFF
- Jay Stanley, Senior Policy Analyst, ACLU
Cocktail Reception | Magnolia
Day 2 (Oct. 14)
Breakfast Keynote: Trickle Down Techonomics | Magnolia
- Jon Gosier, investor, data-scientist, and serial tech entrepreneur. Inventor, data-scientist, and serial tech entrepreneur, Jon Gosier, will deliver a talk expanding on his recent work around “trickle-down techonomics.” Gosier has explored in-depth the unintended consequences of technology in the face of a digital divide, as well as how increased attention to “outcome design” can help address this issue and spread global wealth.
- Information Sharing: Problem, Placebo, or Panacea? | Walnut Well before the Snowden revelations, the director of the NSA and the White House began campaigning for so-called “information sharing” legislation, whereby companies would give the government private-sector information to solve our cyber woes. Years later, companies like Anthem and Sony, and government agencies like the Office of Personnel Management, the Department of State, and the Defense Department, have suffered massive data breaches. Partly as a result, Congress and the White House have made passing information sharing bills a top priority. This panel will discuss the privacy and cybersecurity implications of these bills, and how to effectively address the “cyber threat.”
- Kaveh Waddell, Correspondent, National Journal (moderator)
- Robyn Greene, Policy Counsel, New America's Open Technology Institute
- Jeffrey Ratner, Director for Legislative Affairs and Cybersecurity Policy, White House National Security Council
- Daniel Kahn Gillmor, Technologist, ACLU
- Bijan Madhani, Policy Counsel, Computer and Communications Industry Association
- Josh Alexander, Professional Staff Member, Senate Select Committee on Intelligence
- Speaker Series: International Perspectives | Magnolia
- Giovanni Battista Gallus: Italian attorney Giovanni Battista Gallus will speak about the use of Trojan horses for investigative purposes and how they can be considered compatible with fundamental rights and freedoms.
- Fanny Hidvegi: EPIC fellow Fanny Hidvegi will share her experiences as civil liberties advocate in Hungary, a country struggling with historic challenges to its basic freedoms.
- Andrew Pincus, Partner, Mayer Brown. Andy will discuss the fight for a framework for lawful access to private information – a groundbreaking legal challenge and potential legislative solutions – all in the fight to protect our fundamental rights in this digital age.
- Transaction Declined: Can Activists, Industry, and Authorities Prevent Repressive Regimes from Buying Surveillance Technologies? | Magnolia There are real human rights implications for an unregulated surveillance trade. Journalists are spied on, activists are detained, and rights are violated. Yet recent attempts to address the issue kicked up a firestorm in the U.S. tech policy world, where fears of government overreach stalled the development of export controls. Is there a path forward to ensure human rights are not threatened by this cross-border trade, while also making sure broad regulations don't prevent security research?
- Collin Anderson, Independent Researcher and author of "Considerations on Wassenaar Arrangement Proposals for Surveillance Technologies" (moderator)
- Mailyn Fidler, Marshall Scholar, Oxford University
- Suzanne Nossel, Executive Director, PEN American Center
- Randy Wheeler, Director, Information Technology Controls Division, BIS
- Antoinette Paytas, Partner, Thomsen and Burke LLP
- How Will the FCC and FTC Tackle Privacy and Data Security in the Coming Years? | Chestnut Privacy regulation is at a tipping point. The FTC has brought a series of groundbreaking privacy and data security enforcement actions — while continuing to push for “comprehensive baseline legislation.” The administration has finally proposed its own bill, giving the FTC broad rulemaking powers but also attempting to avoid the “brittleness” of specific rules by relying on multistakeholder processes. Meanwhile, the FCC has asserted jurisdiction over the privacy and data security practices of broadband providers by reclassifying them under Title II. How will these two agencies address privacy and data security issues in the coming years? Will the courts constrain the FTC’s discretion — or will the commission continue to build a “common law of consent decrees”? Will legislation give the agency new powers — or impose new limits? How will the FCC’s approach evolve? And how will it compare with the FTC’s approach? Will the FCC rely on rulemakings, enforcement actions, or both? Will its regulation stop with broadband providers or will it sweep in “edge” services, too? How might dual regulation work? And how will changes in U.S. privacy regulation affect, and be affected by, regulation abroad, especially in Europe?
- Berin Szoka, President, TechFreedom
- Alan Raul, founder and leader, Sidley Austin
- Janis Kestenbaum, Partner at Perkins Cole and former FTC adviser
- Right & Left Coalition Building After the USA Freedom Act | Walnut Moment-to-moment surveillance fights are almost as common as the din of news stories that fuel them -- but what is the overall goal, and are we moving toward it? Is the goal on the Hill the same as the demands of the people? Are civil libertarians' demands in line with progressives'? This discussion will focus on identifying what we are all fighting for and what roles the myriad conflicts over surveillance powers are and should be playing.
- Sean Vitka, Legislative Counsel, CREDO Action and Senior Fellow, Demand Progress (moderator)
- Daniel Schuman,Policy Director, Demand Progress
- Pat Eddington, Policy Analyst, Homeland Security and Civil Liberties, Cato Institute
- Yolanda Rondon, Staff Attorney, American-Arab Anti-Discrimination Committee
- Marcy Wheeler, Independent Journalist, emptywheel
- Josh Withrow, Legislative Affairs Manager, FreedomWorks
- Neema Singh Guliani, Legislative Counsel, ACLU
Lunch Film Screening: Telling the World About Encryption | Magnolia Leading experts and thought leaders on Internet security – including Vint Cerf, Bruce Schneier, Danny Weitzner, Jon Peha, Eric Burger and Mitchell Baker – will be featured in a new 25 minute documentary film "Encryption, Back Doors and Privacy." Many of those same experts will appear in-person for a Q&A session to discuss the film and answer your questions about these important topics. For example, these experts will: 1) talk about the need for encryption and whether or not there is a role for law enforcement back doors; 2) discuss what should be done to address surveillance tools such as Stingrays; and 3) examine what types of techniques are being developed to help keep stores of big data private.
- Paul Brigner, Regional Bureau Director, North America, Internet Society (moderator)
- Eric Burger, Director, Security and Software Engineering Research Center at Georgetown
- Jon Peha, Professor, Carnegie Mellon University College of Engineering
- David Vyorst, Founder & President, Relay Station Digital Strategies
- Amie Stepanovich, U.S. Policy Manager, Access
- Harley Geiger, Advocacy Director and Senior Counsel, Center for Democracy & Technology
- Hands Off My Drones! Will Government Regulations Allow Freedom and Innovation in the UAS Revolution? | Walnut With estimates of over 2 million drones already sold in the United States, the revolution over unmanned aircraft systems is here. The drone market, if allowed to flourish, could amount to thousands of jobs and an economic impact of over $80 billion through 2025. But just as these drones are set to take to the skies, governments are passing regulations that limit their use. Will growing fear of drones mean that politicians (and their constituents) will be less likely to support legislation that spurs the development and use of UAS? Are these fears justified? How can policymakers balance privacy and safety concerns with innovation in the UAS revolution?
- Matt McFarland, Editor, Washington Post
- Ryan Hagemann, Civil Liberties Policy Analyst, Niskanen Center
- John Verdi, Director of Privacy Initiatives, NTIA
- Alan McQuinn, Research Assistant, Information Technology & Innovation Foundation
- Alan Butler, Senior Counsel, EPIC
- Technology, the Internet, and Race: Tools for Liberation or Oppression | Magnolia Government surveillance of communities of color is nothing new. From Martin Luther King, Jr., to the Black Panthers to Black Lives Matter, the government has a long history of using surveillance to disrupt and destroy racial justice movements. While communities are using the Internet and technology to fight against institutional racism, technology is also being used by the government and corporations to profile, target and discriminate against people of color. Panelists will discuss this long history and what could be done to fight against targeted surveillance of communities of color.
- Dr. Jared Ball, Associate Professor of Communication Studies, Morgan State University (moderator)
- Alvaro Bedoya, Executive Director, Center on Privacy & Technology at Georgetown Law
- Hamid Khan, Coordinator, Stop LAPD Spying Coalition
- Anika Collier Navaroli, Data & Civil Rights Project Coordinator, Data and Society
- Latanya Sweeney, professor of Government and Technology, Harvard University
- Dominque Stevenson, Director of Maryland Justice with Peace Program, American Friends Service Committee
Speaker Series | Chestnut
- Stephanie Devaney, Senior Policy Advisor and Project Manager, Precision Medicine Initiative Office of the Chief of Staff, the White House will discuss predictive medicine.
- Thomas Keenan: Thomas Keenan, a professor and researcher at the University of Calgary will present a talk on "The Body as Information: When Passwords Die, What Comes Next?"
- Waste Not: Innovating Food Efficiency | Walnut Technology has become embedded in our relationship with food, igniting a revolution in the way we share recipes, purchase groceries, rate and review restaurants, and make reservations. For the food industry, new streams of data about consumer consumption have created new opportunities for anticipating food preferences, needs, choices, and habits. Government agencies have also recognized the value in applying new technology to food, in particular using smart data to inform supplemental nutrition programs or aid in product recalls. One of the most promising applications of this technology is to mitigate food waste. There is unrealized efficiency at every layer of the system--from farm to table. How can nonprofits, government agencies, and companies productively share data and encourage best results for individuals and the public good?
- Alethea Lange, Policy Analyst, Center for Democracy & Technology (moderator)
- Grant Nelson, Co-Founder, MEANS Database
- Chris Bernstein, Acting Director, Food Safety Education, USDA Food Safety and Inspection Service
- Josh New, Policy Analyst, ITIF's Center for Data Innovation
- Fishbowl Education: Privacy Issues in Higher and K-12 Institutions | Magnolia Surveillance technologies and "big data" analysis tools have the potential to change the character of education, especially the quality of the interactions between students and those who teach and advise them. Monitorings of students' activities and analyses of educational outcomes have played increasing roles in both higher education and K-12 institutions. Faculty members and teachers are themselves often the subject of profiling and monitoring. The session will review major aspects of privacy law and societal discourse on these matters. The panel will then provide scenarios for discussion, including ones dealing with the video monitoring of students in online courses and the surveillance of faculty members and teachers. The panel will address to what extent educational institution transparency can be compatible with faculty, staff, and student privacy.
- Jo Ann Oravec, Professor, Information Technology and Supply Chain Management University of Wisconsin at Whitewater
- Kobie Pruitt, Education Policy Manager, Future of Privacy Forum
- Khaliah Barnes, Associate Director, Electronic Privacy Information Center (EPIC) and Director, EPIC Student Privacy Project
- Chip Slaven, Counsel to the President and Senior Advocacy Advisor, Alliance for Excellent Education, Center for Digital Learning
- Teddy Hartman, Coordinator of Data Privacy, Howard County Public Schools.
- Spying in Public: Policy and Practice | Magnolia Nearly every day brings a report of a new technology for tracking people in public places, or a new way of deploying a known technology. Surveillance cameras, license plate readers, cell phone trackers, GPS devices, drones, body cameras – the list keeps growing. Join our panel for a discussion of the constitutional, policy, and practical questions raised by these technologies, including: When should a warrant be necessary for location tracking – and are there some methods of tracking that should never be used? How does long-term location tracking affect First Amendment rights, and how should that play into the analysis? Do biometric recognition technologies change the whole game?
- Lauren Williams, Tech Reporter, Think Progress (moderator)
- Rachel Levinson-Waldman, Senior Counsel, Brennan Center for Justice
- Nick Selby, CEO and Co-Founder, StreetCred and Investigator, Midlothian Police Department
- Juval Scott, Attorney Advisor, Training Division, Administrative Office of the U.S. Courts
- Is There a Meaningful Solution for Security Disclosure in a Democratic Society? | Walnut This panel session will discuss the current state of security vulnerability disclosure practices (e.g., bug bounty programs, public-private partnerships, and disclosure practices, including 0-days) and how existing and proposed initiatives/legislation (e.g., DMCA, CFAA,SOPA, CISA, fusion centers) can influence this process and Internet security. It will offer an objective and operational understanding of this critical and complex issue and provide an interactive forum to identify potentially acceptable solutions for all involved stakeholders.
- Dr. Richard Forno, Assistant Director, UMBC Center for Cybersecurity (moderator)
- Dr. Andrea Matwyshyn, Professor of Law, Northeastern University
- Patrick McDonald, Technical Program Manager, Google