Cyber Policy Center Online Seminars 2020-2021

Encina Hall and its front lawn

Events at the Cyber Policy Center

The Cyber Policy Center brings experts together from around the world to discuss emerging research in the areas of technology, governance and public policy.
Text on blue background showing speaker headshots for bridging the gap event

MAY 24 | Bridging the Cybersecurity Data Gap with Privacy Protected Data Sharing

Taylor Reynolds of MIT’s Internet Policy Research Initiative, Megan Stifel of the Institute for Security and Technology, and Klara Jordan, Chief Public Policy Officer of the Cyber Peace Institute.

APRIL 5 – JUNE 7 | Stanford Cyber Policy Center Spring Webinar Series

Join us for a weekly webinar series organized by the Program on Democracy and the Internet (PDI) at Stanford’s Cyber Policy Center (CPC) and the William and Flora Hewlett Foundation’s Cyber Initiative. The webinars will take place every Tuesday, starting April 5th from 12 PM - 1 PM PST over Zoom.

EVENT RECORDINGS

For a full catalogue of our event recordings from Cyber Policy Center, visit our YouTube Channel

MAY 17 | Exposure to Untrustworthy Websites in the 2020 US Election

Featuring Jeff Hancock, Ross Dahlke & Ryan Moore of the Social Media Lab.

Exposure to Untrustworthy Websites in the 2020 US Election

Exposure to Untrustworthy Websites in the 2020 US Election

MAY 10 | Big Speech

Featuring Kate Klonick of St. John’s University Law School, in conversation with Nate Persily of the Cyber Policy Center. 

Big Speech

Big Speech

MAY 3 | Semiconductors, Supply Chains and Industrial Policy

A webinar on Semiconductors, Supply Chains and Industrial Policy featuring Annet Aris of ASML, Sarah V. Stewart of Silverado Policy Accelerator, Eva Maydell of the European Parliament, and Kim Jørgensen of the European Commission,  with Marietje Schaake of the Cyber Policy Center as moderator.

Semiconductors, Supply Chains and Industrial Policy

Semiconductors, Supply Chains and Industrial Policy

APRIL 26 | Bug Bounties & Bridge-Building: Lessons from Cybersecurity Vulnerability Disclosure for Addressing Socio-Technical Harms

A conversation on the nascent adoption of ‘bug bounties,’ a popular bug-for-reward-style audit mechanism in the cybersecurity domain, (and related approaches, such as VDPs and pentesting) to the discovery of various social-technical harms, including those inflicted through algorithmic (or “AI”) systems. 

Bug Bounties & Bridge-Building: Lessons from Cybersecurity Vulnerability Disclosure for Addressing Socio-Technical Harms

Bug Bounties & Bridge-Building: Lessons from Cybersecurity Vulnerability Disclosure for Addressing Socio-Technical Harms

APRIL 19 | The Loop: How Technology is Creating a World Without Choices and How to Fight Back

AI is about to do to our ability to make decisions for ourselves what Google maps did to our ability to navigate. Drawing on interviews with over 100 scientists and 10-years of front-line reporting from the cutting edge of behavior-shaping technology, Jacob Ward's new book, The Loop: How Technology is Creating a World Without Choices is a warning about our growing reliance on AI, and an encouragement to protect the best parts of being human.

image of a crowd of people walking

The Loop: How Technology is Creating a World without Choices and How to Fight Back

APRIL 12 | Internet Freedom Under Threat - The Divergent Paths of Taiwan and Hong Kong

Jason Hsu and Charles Mok in conversation with Larry Diamond, on how Taiwan and Hong Kong face increasing threats of online misinformation and cybersecurity risks, but the freedoms of the Internet for their citizens appear to be heading in opposite directions.

Internet Freedom Under Threat - The Divergent Paths of Taiwan and Hong Kong

Internet Freedom Under Threat - The Divergent Paths of Taiwan and Hong Kong

APRIL 7 | Cybersecurity Law: A View from the Front Lines

Jim Dempsey of the Program on Geopolitics, Technology and Governance at the CPC, along with Alicia Lowery Rosenbaum, Vice President and Associate General Counsel for Cybersecurity Technology and Trust at Salesforce and Travis LeBlanc, the vice chair of the cyber/data/privacy practice at Cooley and a Senate-confirmed member of the U.S. Privacy and Civil Liberties Oversight Board. 

Cybersecurity Law: A View from the Front Lines

Cybersecurity Law: A View from the Front Lines

MARCH 15 | Global Perspectives on Crypto-Asset Regulation

Aman Nair of India’s Centre for Internet and Society and Valerie Shen of Third Way, in conversation with Kelly Born of the Hewlett Foundation, discuss the use cases and limitations of crypto-assets, compare relevant regulatory regimes from around the world, discuss the debate over the proper legal and regulatory framework for crypto-enabled crime, and explore how to govern crypto-assets while supporting widespread financial stability.

Global Perspectives on Crypto-Asset Regulation

Global Perspectives on Crypto-Asset Regulation