The Internet Exposed: Encryption, Backdoors and Privacy… and the Quest to Maintain Trust

Discussions by Vint Cerf, Jon Peha, Olaf Kolkman, Bruce Schneier, Mitchell Baker, Danny Weitzner, and Eric Burger. This video is a production of the Washington DC Chapter of the Internet Society (ISOC-DC http://www.isoc-dc.org/), produced and directed by Paul Brigner and David Vyorst. It premiered at the Computers, Freedom and Privacy Conference on October 14, 2015. It […]

Defense Against Cyber Threats: Strategies and New Developments

Webinar for MetricStream September 11, 2013 This webinar where experts Dr. Eric Burger, Director at Georgetown Center for Secure Communications and Yo Delmar, Vice President – GRC Solutions at MetricStream provide insights on the impact of cyber-security threats to the economy, national security and the critical infrastructure, the evolution of the cyber threat landscape and […]

SIP Security Research at Georgetown

Invited talk at SIPNOC, June 26, 2012 (Dulles, Virginia) SIPconnect™ is an important step for connecting enterprises to the SIP-enabled voice-over-IP network. One advance of SIPconnect is it requires secure signaling, out of the box. However, there is no provision for secure media. Many enterprise applications for SIP require secure communications. This is more especially […]

Cybersecruty 2020 – Is There a Better Way to Protect the Internet

Panel at SRI International, May 23, 2012 (Arlington, VA) Alarming stories about the growing threat of cyberattacks have spurred the White House, Congress, and corporate leaders to call for more efforts to improve cybersecurity.  But are current approaches to cybersecurity working?  Can we do better?  More and more Internet technology experts argue that today’s approach is broken […]

Network Traffic Management: A Delicate Balance

Invited talk and webinar at USTelecom, February 23, 2012 (Washington, DC) Network traffic management is a collection of techniques that Internet service providers may use to attain optimum performance for a diverse set of users. These techniques include the use of performance measures to define optional service levels tailored to different user needs as well […]