Cybersecurity: Employee Privacy, Social Media, & Personal Devices
May 30, 2018
June 26, 2018
The Cove at UCI Applied Innovation
5:00 – 8:00 p.m.
Join UCI Cybersecurity Policy and Research Institute and Newmeyer & Dillion on Tuesday, June 26th for a complimentary panel discussing the intersection of cybersecurity, employee privacy rights, and the legal and practical challenges arising from the use of social media and personal devices.
(more…)
CNN: “Trump Ramps Up Personal Cell Phone Use”
April 23, 2018
Donald Trump is increasingly relying on his personal cell phone to contact outside advisers, multiple sources inside and outside the White House told CNN, as Trump returns to the free-wheeling mode of operation that characterized the earliest days of his administration.
Read the full story at CNN.com
Video: Cybersecurity: Is There Such a Thing?
April 20, 2018
Watch this Center for Digital Transformation panel on “Cybersecurity: Is There Such a Thing?”
(more…)
C-SPAN: “Election Hacking and the Future of Politics”
April 18, 2018
James Carville, campaign strategist for former President Bill Clinton, was the keynote speaker at a conference on U.S. election hacking. He discussed foreign interference in U.S. elections and the impact on the future of politics. Cybersecurity expert Bryan Cunningham, a former senior CIA officer and White House lawyer, moderated the conversation and questions from students.
Watch the video at c-span.org.
Critical Mass: Interview with Bryan Cunningham
April 5, 2018
LA Times: “2016 election controversy will be ‘studied forever,’ says James Carville, Bill Clinton’s ex-campaign manager, in UCI talk”
March 14, 2018
James Carville, a Democratic political strategist who was Bill Clinton’s presidential campaign manager in 1992, gave a wide-ranging keynote address Tuesday at UC Irvine on topics including suspected Russian government meddling in the 2016 U.S. presidential election.
Read the full story at The Los Angeles Times.
“Cyber Risk Insurance: How to Live With It Because You Can No Longer Live Without It” March 20, 2018
March 7, 2018
Tuesday, March 20, 2018
The Cove at UCI Applied Innovation
In 2017, costs linked to just ransomware attacks worldwide were estimated to exceed $5 Billion, up from $325 Million in 2015. Cyber attacks are a dangerous growth industry and none are immune from risk. Defending against an attack is necessary, but is imprecise, uncertain, and rarely sufficient to stave off liabilities. Insuring against loss from an attack is now a necessary safeguard. We are all targets.
You’re invited to a complimentary program presented by UCI and Newmeyer & Dillion. The evening will commence with a social hour including appetizers, beer, wine & soft drinks. Immediately following join panel members in a salon style discussion moderated by Mr. Bryan Cunningham, Esq. Executive Director of the UCI Cybersecurity Policy & Research Institute (CPRI).
“Can Adversaries Hack Our Elections? Can We Stop Them?” March 13, 2018 at UCI Student Center’s Crystal Cove Auditorium
January 18, 2018
Half-Day Academic Conference Featuring
Keynote Address by Political Guru, Bill Clinton Campaign Manager & “Ragin’ Cajun” JAMES CARVILLE
Panels on the Technology, Law, & Policy of Election Hacking &
A Realistic Assessment of the Threat by Senior US Intelligence & National Security Officials
Conference: 1:30-4:30 p.m. (registration opens at 12:30 p.m.)
Cocktails, Appetizers, and VIP Reception with James Carville: 5-6 p.m.
James Carville Keynote: 6:30-7:30 p.m.
Innovation & Tech Today: “Cyberspace’s ‘Whodunnit’ Problem”
December 6, 2017
The academic and research communities need to create and evaluate more multidisciplinary and data science-driven approaches to provably identifying cyberattacks. For instance, UC Irvine’s Cybersecurity Policy & Research Institute is beginning to address both of those challenges.
Read the full story at Innovation & Tech Today.
Orange County Business Journal: “Blockchain Building Blocks”
November 29, 2017
The University of California-Irvine held a recent conference devoted to blockchain, a digital ledger technology that shows potential for reliably tracking titles to property; provenance of precious goods; ownership of art and intellectual property; and securing of supply chains for software and other critical areas.