A Conversation on Cybersecurity Legislation

HSPI Policy and Research Forum Series Event - A Conversation on Cybersecurity Legislation

On Wednesday, February 22nd, 2012, HSPI hosted Vice Admiral Mike McConnell, former Director of National Intelligence, the Hon. Michael Chertoff, former Secretary of Homeland Security, and senior staff of the U.S. Senate and U.S. House of Representatives for a roundtable discussion on pending cybersecurity legislation.

Administrator Pistole

HSPI Policy and Research Forum Series Event - An Address by TSA Administrator John Pistole

On Thursday, November 10, 2011, HSPI hosted a Policy and Research Forum featuring John S. Pistole, Administrator of the Transportation Security Administration (TSA). Administrator Pistole discussed risk-based, intelligence-driven counterterrorism efforts, highlighting the layered security approach empowered by advances in TSA technology over the last decade. 

HSPI-CSL Joint PRF on the Triple Threat

HSPI Policy and Research Forum Series Event - The Hybrid Threat: Crime, Terrorism and Insurgency in Mexico

On October 20, 2011, HSPI and the US Army War College’s Center for Strategic Leadership hosted a joint Policy and Research Forum event featuring leading subject matter experts who addressed the security challenges posed by drug trafficking organizations, and the strategic and doctrinal responses needed to address an evolving and multifaceted threat to the U.S. and Mexico alike.

Ridge, Chertoff, Napolitano and Allen

HSPI Policy and Research Forum Series Event - A National Conversation on the Homeland Security Environment Looking Forward: The Secretaries' Perspective

On Tuesday, October 11, 2011, HSPI hosted the Hon. Janet Napolitano, Secretary of Homeland Security, the Hon. Tom Ridge, former Secretary of Homeland Security, and the Hon. Michael Chertoff, former Secretary of Homeland Security in a conversation moderated by former Coast Guard Commandant Admiral Thad Allen.

Upcoming Event

Threats to the Grid:

How Industry and Government Can Work Together to Meet Today's Security Challenges

Thursday, April 10, 2014
3:00 PM until 5:00 PM
Cloyd Heck Marvin Center
Grand Balllroom | 3rd Floor
The George Washington University
800 21st Street, Washington, DC 20052

Please join the George Washington University Cybersecurity Initiative for a discussion on how government and industry are partnering to secure the electric grid. Following an incident at the Metcalf Substation nearly one year ago, senior executives from both the public and private sectors have accelerated their efforts to work together to protect critical infrastructure.

Click here to watch webcast.




Recent News

"2014 Sochi Olympics"

On December 30th, 2013, Frank Cilluffo, Director of the Homeland Security Policy Institute and Michael Downing, Deputy Chief, LAPD Counter-Terrorism Bureau, authored, "2014 Sochi Olympics: Russia in Terrorists' Crosshairs."

" Major international sporting events have always served as lightning rods for terrorists, of course, with the Boston Marathon bombings being the most recent and tragic example. Just think back to the 1972 Munich Olympics and the impact of Palestinian extremist group Black September's attack on Israel's athletes -- magnified because the kidnappings and murders took place with the whole world watching the gruesome spectacle unfold.

The 2014 Games in Sochi in southern Russia present a symbolic target in a region with a long history of bloody violence. Russian authorities have long battled violent forces in the nearby North Caucasus. The Russian government fought two wars against Chechen separatists in the mid-1990's and early 2000's, radicalizing a generation of Muslim youths in the process. "

Click Here to Read Full Article.





"Economic Espionage and Trade Secret Theft: An Overview of the Legal Landscape and Policy Responses"

On Thursday, September 26th, 2013, HSPI and Convington released "Economic Espionage and Trade Secret Theft: An Overview of the Legal Landscape and Policy Responses."

"Concern about cyberespionage and intellectual property (IP) theft, particularly trade secrets, has intensified—and with good reason. While these threats are not new, rapid technological advances resulting in greater connectivity and data storage and more globalized supply chains have increased the opportunity?and potentially the payoff?to breach corporate networks and acquire sensitive corporate data. In short, the same technologies responsible for accelerating global growth are also being used to steal proprietary information and harm economies."

"These threats strike directly at the core value of many businesses and a core vulnerability. Trade secrets comprise an average of two-thirds of the value of firms’ information portfolios, and that percentage rises to 70 to 80% for knowledge-intensive industries, such as manufacturing, information services, and professional, scientific, and technical services. This value, however, can be tenuous; once a trade secret is made public or obtained by a competitor, its value may be substantially or entirely lost—a loss that may not be recoverable."

Click Here to Read.