Presented at Telestrategies Telco-Web 2.0 Conference, September 18, 2007 (Atlanta) Describes the path for service creating, user-generated applications and garage-generated applications.
Discussions by Vint Cerf, Jon Peha, Olaf Kolkman, Bruce Schneier, Mitchell Baker, Danny Weitzner, and Eric Burger. This video is a production of the Washington DC Chapter of the Internet Society (ISOC-DC http://www.isoc-dc.org/), produced and directed by Paul Brigner and David Vyorst. It premiered at the Computers, Freedom and Privacy Conference on October 14, 2015. It… Continue reading The Internet Exposed: Encryption, Backdoors and Privacy… and the Quest to Maintain Trust
Link to an article reporting on a panel at the Advanced Cyber Security Center meeting November 12, 2013 (Boston, MA) http://searchsecurity.techtarget.com/news/2240209036/Experts-propose-better-cybersecurity-information-sharing-models
A blog post from March 4, 2015 The Center for Democracy and Technology (CDT) recently released a discussion of issues with a draft Senate Bill, called Cybersecurity Information Sharing Act of 2015 (CISA). I agree with much of CDT’s analysis. However, I disagree with some of their analysis, and some of their conclusions. First of all, I… Continue reading Thoughts on CISA 2015 / CDT Filing
Webinar for MetricStream September 11, 2013 This webinar where experts Dr. Eric Burger, Director at Georgetown Center for Secure Communications and Yo Delmar, Vice President – GRC Solutions at MetricStream provide insights on the impact of cyber-security threats to the economy, national security and the critical infrastructure, the evolution of the cyber threat landscape and… Continue reading Defense Against Cyber Threats: Strategies and New Developments
Invited talk, Federal Government and Cloud Computing Workshop, February 19, 2013 (Georgetown)
Invited talk at SIPNOC, June 26, 2012 (Dulles, Virginia) SIPconnect™ is an important step for connecting enterprises to the SIP-enabled voice-over-IP network. One advance of SIPconnect is it requires secure signaling, out of the box. However, there is no provision for secure media. Many enterprise applications for SIP require secure communications. This is more especially… Continue reading SIP Security Research at Georgetown
Panel at SRI International, May 23, 2012 (Arlington, VA) Alarming stories about the growing threat of cyberattacks have spurred the White House, Congress, and corporate leaders to call for more efforts to improve cybersecurity. But are current approaches to cybersecurity working? Can we do better? More and more Internet technology experts argue that today’s approach is broken… Continue reading Cybersecruty 2020 – Is There a Better Way to Protect the Internet
Narelle Clark and Eric Burger discuss the proposed changes to the Internet Society bylaws in Geneva, Switzerland, April 24, 2012.
Invited talk and webinar at USTelecom, February 23, 2012 (Washington, DC) Network traffic management is a collection of techniques that Internet service providers may use to attain optimum performance for a diverse set of users. These techniques include the use of performance measures to define optional service levels tailored to different user needs as well… Continue reading Network Traffic Management: A Delicate Balance