Previous Agendas
2021 Agenda
Amy Gaudion, “Answering the Cyber Oversight Call”
Bryant Walker Smith & Bryce Pilz, “An Analysis of the Foreign Influence Threat to Cybersecurity: A Call for Balance to Protect Individuals, Institutions, and Innovation”
Daniel Woods & Rainer Böhme, “Incident Response as a Lawyers' Service”
David Thaw, “Disambiguating ‘Cybersecurity’”
David Wishnick & Christopher Yoo, “The Role of Transaction Cost Engineering in Standards Adoption: Evidence from Internet Security”
Derek Bambauer, “Cybersecurity for Idiots”
Elena Chachko, “National Security by Platform”
Evan Beese, “Cyber Deterrence Requires a “Difficult” Deterrence Framework”
Ido Kilovaty, “Cyber Operations Against Data: Below and Above the Use of Force Threshold”
Iryna Bogdanova & Maria Vásquez Callo-Müller, “Unilateral Cyber Sanctions: Between Questioned Legality and Normative Value”
Jantje Silomon, Mischa Hansel & Fabiola Schwarz, “Bug Bounty Programs as a Global Public Good: From New Regulations to Shifting Regional Dynamics”
Jeffrey Vagle, “A Model for Collaborative Regulation of Cybersecurity”
Mailyn Fidler, “Regional Cybersecurity Laws”
Mark Grzegorzewski, Margaret Smith & Barnett Koven, “Cyber Privateering: A New Model for Cyber Civic Engagement”
Mark Visger, “Seeing and Connecting the Dots: Countering Foreign Cyberattacks Launched from U.S. Domestic Cyberspace”
Ngoc Son Bui & Jyh-An Lee, “Comparative Cybersecurity Law in Socialist Asia”
Peter Swire & DeBrae Kennedy-Mayo, “Data Localization and Cybersecurity”
Rebecca Wexler, “Ignorance-Based Secrecy: Surveillance Software and Law Enforcement Privilege”
S. Daultrey, C. Abraham & F. Belanger, “Cyber intelligence sharing: governance networks or networked governance?”
Scott Shackelford, Anne Boustead & Christos Makridis, “Defining 'Reasonable' Cybersecurity: Lessons from the States”
Tabrez Ebrahim, “Directors & Officers Liability with Corporate Cybersecurity”
2022 Agenda
Brad N. Greenwood, Paul M. Vaaler, “Do US State Breach Notification Laws Decrease Firm Data Breaches?”
Riana Pfefferkorn, “Shooting the Messenger: Remediation of Disclosed Vulnerabilities as CFAA “Loss”
Patricia A. Vargas-Leon, “A comparative perspective over IXPs in times of dictatorship and war: their role in isolating RuNet and the goal of the Russian”
Jeffrey Vagle, “Beyond Bugs: Expanding our Intuitions About the Cybersecurity”
Meicen Sun, “Internet Control As A Winning Strategy: How the Duality of Information Consolidates Autocratic Rule in the Digital Age”
Iain Nash, “Has Consumer Protection Legislation in the European Union illuminated a path to help protect against availability attacks caused by Compromised Smart Devices? What we have learned from Toys, Car Bonnets and Billboards”
Cathy Gellis, “Right hand, meet left hand: how copyright law undermines cybersecurity sovereignty law in regulating them”
Anne E. Boustead, “Measuring Encryption: Recommendations for Law, Policy, and Research”
Bernard Horowitz & Terence Check, “The "Iceberg" Effect: How Mandatory Incident Reporting Could Chill Cyber Defense”
Hannah T. Neprash, Claire C. McGlave, Dori A. Cross, Beth A. Virnig, Michael A. Puskarich, Jared D. Huling, Alan Z. Rozenshtein, Sayeh Nikpay, “Ransomware”
Tabrez Ebrahim, “Quantum Standards Development Organizations & Their Patent Policies”
Chinmayi Sharma, “The Open-Source Problem”
Janine Hiller, Kathryn Kisska-Schulze, & Scott Shackelford, “Taxing Cyber Attacks: Leveraging Tax Codes to Enhance Cybersecurity Preparedness”
Daniel Schwarcz, Daniel Woods, Josephine Wolff, “How confidentiality concerns shape cybersecurity investigations”
Asaf Lubin, “Cyber Vigilantes”
Peter Swire, DeBrae Kennedy-Mayo & Frank Li, “The Effects of Data Localization Laws on Anti Abuse Measures”
Aniket Kesari, “Staggered Adoption of Data Breach Notification Laws and their Effects on Identity Theft. Evidence from Consumer Complaint Data 2002-2022”
Liliya Khasanova, “Conceptual Discrepancies in Western and Russian Approaches to the International Rule of Law in Cyber [Information] space.”
Ravi Nayyar (with Ganna Pogrebna and Cary Di Lernia), “Banking on C SCRM”
Josh Goldfoot, “Cybersecurity and the Fourth Amendment”
2023 Agenda
Cathy Gellis, “Defective by design: the attempts to impose liability on software coders for cybersecurity vulnerabilities”
Alexandra Yao, “Territorializing Spyware Governance: Domestic Courts Legislating Cross-Border Spyware Attacks”
Josephine Wolff & Daniel Woods, “A History of Cyber Risk Transfer”
Ido Sivan-Sevilla & Charlie Harry, “Assessing the Cyber-attack Surface of Local Infrastructures”
Sasha Romanosky & Peter Schirmer, “Mapping the Cyberstalking Landscape: An Empirical Analysis of Federal U.S. Crimes”
Jason Healey, “Policy Foundations of Cyber Regulations”
Scott J. Shackelford & Eytan Tepper, “Regulating the Space-Cyber Nexus”
Sarah Scheffler, Milica Maričić & Jonathan Mayer, “The Role of Encryption in Child Exploitation: Evidence from Federal Prosecutions”
Iain Nash, “A proposed optimal regulatory strategy for Smart Device cybersecurity”
Matt Malone, “Establishing Reasonable Standards of Cybersecurity through Trade Secret Jurisprudence”
Mailyn Fidler, “Cybersecurity Mission Creep”
Michael Razeeq, “The Case for Considering Civilian Cyber Defense”
Liliya Khasanova & Katharine Tai, “An Authoritarian Approach to Digital Sovereignty? Russian and Chinese Data Localisation Models”
Avital Baral, Daniel Weitzner & Taylor Reynolds, “Continuous Measured Improvement: a risk-modeling approach to cybersecurity management and governance”
Joshua A. Kroll, “A Validity Baseline for Cybersecurity Risk Management”
Peter Swire, DeBrae Kennedy-Mayo, Drew Bagley, Sven Krasser, Avani Modak, and Christoph Brauswein, “Risks to Cybersecurity from Data Localization, Organized by Techniques, Tactics, and Procedures”
Aileen Nielsen, Karel Kubicek & Elias Dater, “Compliance Effort: The Timing and Content of Open Source Software Responses to GDPR and CCPA”
Elie Alhajjar & Jasmine Coe, “Chinese Cyber Espionage in the US”
Ravi Nayyar, Cary Di Lernia & Ganna Pogrebna, “Corporate Governance as National Security: The Australian Way”
2025 Agenda
Eyup Kun & Bilgesu Sümer, “Navigating the Crossroads of Cybersecurity and Data Protection of EU Institutions: Evaluating the EUI Cybersecurity Law’s Alignment with the EU Institutions Data Protection Regulation (Regulation (EU) 2018/1725)”
David Opderbeck, “Untwisting the Security of Undersea Internet Cables and Landing Stations”
Tabrez Ebrahim, “Against Corporate Monitoring”
Orkhan Abdulkarimli, “Clarifying Commerciality: Open-Source Software and the European Cyber Resilience Act in a Global Context”
Josephine Wolff & Daniel Drezner, “Cryptocurrency Sanctions: Compliance, Enforcement & Impacts”
Joshua Kroll, “The Anatomy of Noncompliance and Its Policy Implications”
Benjamin Sundholm, “What’s New Is Old”
Temima Hrle et al., “Defining Cybersecurity: Gaps Between User Perceptions and Insurance Coverage”
Diba Aalami Harandi, “Cybersecurity Governance in a Digital World: A Legal Comparison of Middle Eastern and Western Policies”
Szymon Skalski, “Cyberattack Attribution and the Challenges of Assigning Tort Liability: Proposing a Path to Justice”
Uchenna Jerome Orji, “Between Promise and Reality: An Inquiry into Implementation of the African Union Convention on Cybersecurity”
Vivek Krishnamurthy, “Transit, Physical and Digital”
Bryan Choi, “Tainted Source Code”
Scott Shackelford et al., “Moving Slow and Fixing Things”
Sasha Romanosky et al., “Insuring Catastrophic Cyber Risk”
Ahmad Sabirin, “The Cybersecurity Paradox: Balancing Protection and Privacy in a Digital Age”
Sandra Leiterman & Becky Passmore, “Lurking in Plain Sight: Examining the Intersection of Cyberstalking, Victimization and Inadequate Laws, and Enforcement”
Rick Wash & Alan Rubel et al., “Positive Cybersecurity”
Michael Razeeq, “Can MSPs and MSSPs Augment Volunteer Cybersecurity Efforts?”
Ido Sivan-Sevilla et al., “Measuring Patch Management in the Wild: How Responsive US County Governments Are to Cyber Risk?”