Securing the Supply Chain
Digital progress brings many benefits, but the nation's dependence on complex computer systems brings a number of security challenges. The sources of these vulnerabilities include products of the global supply chain that are embedded with stealth malicious code. In collaboration with Cybersecurity Seminars, the Institute for Law, Science, and Global Security was pleased to host the panelists below for a discussion on how to secure the acquisition of computer material in order to secure American networks. The event took place on Friday November 19 from 3:30pm to 6:30pm in Copley Formal Lounge.
Melissa Hathaway, President, Hathaway Global Strategies and Senior Advisor, Harvard Kennedy School’s Belfer Center for Science and International Affairs (Former Acting Senior Director for Cyberspace at the National Security Council and Leader of President Obama’s 60-Day Government Cybersecurity Review)
Lawrence C. Hale, Director, Office of Infrastructure Optimization, Integrated Technology Services, Federal Acquisition Service, General Services Administration
Don Davidson, Trusted Mission Systems and Networks Directorate, U.S. Department of Defense
Rich Marshall, Director of Global Cyber Security Management, National Cyber Security Division, Department of Homeland Security
Marianne Swanson, Senior Advisor Information Systems Management, Computer Security Division, NIST (author, “Piloting Supply Chain Risk Management for Federal Information Systems”)
Exploring International Law Blog
- Complete Text: Alberto Mora discussing torture and cruel and inhuman treatment of detainees in Georgetown’s William V. O’Brien Lecture in International Law and Morality
- May 15- Book Launch: Strategic Thinking in 3D: A Guide for National Security, Foreign Policy, and Business Professionals, by Ross Harrison
- Breaking News: Supreme Court rules there is a presumption against the extraterritorial applicability of the Alien Tort Statute
- There are no upcoming events scheduled at this time.