Webinar

Getting the Cyber Future We Want, Not the One We Deserve


Thursday, November 15, 2012

1:00 pm EST/10:00 am PST • FREE

60 minutes, including Q&A


Getting the Cyber Future We Want, Not the One We Deserve
Polymorphis and Metaphoric Threats and Your Cyber Future

In honor of our Black Hat Abu Dhabi event, this web cast will take a step back from the deep technical forays Black Hat is know for, and instead give a broader look at the future of cyber conflict in the world. Are we inevitably headed toward a dark and chaotic world, as some of the FUD out there suggests? Will we live in an Orwellian society of watchers and imposed order? What are some realistic views of the next 15 years and beyond?

Pencils down for this one, and give your full attention to our very special guest, Director of the Cyber Statecraft Initiative of the Atlantic Council, Jason Healy, as he guides us through an array of possible out comes. Some are more preferable than others...

Brought to you by:

RSA

Guest Presenter:

Jason Healey

Director of the Cyber Statecraft Initiative of the Atlantic Council

Jason Healey is the Director of the Cyber Statecraft Initiative of the Atlantic Council, focusing on international cooperation, competition and conflict in cyberspace. Previously he has worked cyber issues since the 1990s as a policy director at the White House, vice president at Goldman Sachs and a US Air Force intelligence officer. As a widely published on cyber conflict and statecraft, he is a board member of Cyber Conflict Studies Association, lecturer in cyber policy at Georgetown University and editor for the first book on cyber conflict history (due 2013).


Sponsor Presenter:

Will Gragido

Sr. Manager Threat Research Intelligence

RSA NetWitness

Mr. Gragido possesses over 18 years of information security experience. A former United States Marine, Mr. Gragido began his career in the data communications information security and intelligence communities. Mr. Gragido worked within several information security consultancy roles performing and leading red teaming, penetration testing, incident response, security assessments, ethical hacking, malware analysis and risk management program development

Sustaining Partners