<<

FACULTY CHAIR

Tad Oelstrom is Adjunct Lecturer in Public Policy Lieutenant General. Key senior command positions and Director of the National Security Program at included three different fighter wings in England, . His areas of focus are Southwest Asia and , the U.S. Third Air national and international security issues; U.S. Force in England, and the U.S. Air Force Academy. military; and advanced development education for national security professionals. He served for more For a list of the 2015 faculty and speakers, SM please visit exed.hks.harvard.edu/ee/cyber than 35 years in the U.S. Air Force, retiring as a YOU’RE HERE TO MAKE A DIFFERENCE. CYBERSECURITY The Intersection of Policy and Technology

FACULTY & GUEST SPEAKERS Throughout the program, Tad Oelstrom is joined by a variety of Harvard faculty members and cybersecurity leaders. Past speakers have included:

»»General Keith B. Alexander, U.S. Army (Ret.),  »»Melissa Hathaway, Cyber Security Initiative Senior »»Latanya Sweeney, Professor of Government  former Commander, U.S. Cyber Command and Advisor, Belfer Center for Science and International and Technology in Residence, EXED.HKS.HARVARD.EDU/EE/CYBER Director, National Security Agency/Chief,  Affairs at Harvard Kennedy School »»Michael Sulmeyer, Senior Policy Advisor,  Central Security Service »»Gary King, Director, Institute for Quantitative Office of the Deputy Assistant Secretary of  79 JFK Street »»Scott Bradner, Secretary to the Board of Trustees Social Science and the Albert J. Weatherhead III Defense for Cyber Policy Cambridge, MA 02138 USA of the Society and Senior Technology University Professor, Harvard University »»Parisa Tabriz, Security Princess, Phone: +1-617-496-9000 Consultant, Harvard University » » Joseph S. Nye Jr., University Distinguished  »»Jim Waldo, Chief Technology Officer,  Email: [email protected] » » Jonathan Zittrain, Professor of Law, Harvard Law Service Professor and former Dean of Harvard Harvard University EXED.HKS.HARVARD.EDU/EE/CYBER School and Harvard Kennedy School, and Director Kennedy School exed.hks.harvard.edu YOU’RE HERE TO MAKE A DIFFERENCE.SM of the Berkman Center for Internet & Society »»Dr. Herbert Lin, Chief Scientist, Computer Science »»Dan Geer, Chief Information Security Officer, In-Q-Tel and Telecommunications Board, National Research Council of the National Academies

21332-15_14-HKS-136_CS_M3_V2.indd 1 2/5/15 10:29 PM CYBERSECURITY CURRICULUM »» The evolution of hacking, from recreational to professional,  THE INTERSECTION OF POLICY AND TECHNOLOGY Cybersecurity: The Intersection of Policy and Technology is an intensive week- and the impact on international security long program that brings together technologists, operators, and policy makers »» Notions of privacy, data, and metadata, and what they mean  In a world with almost limitless connectivity, where cyber attacks can to address the critical threats of a cyber world. It is led by renowned Harvard for international security propagate instantaneously, and where the identity or location of an faculty, senior policy makers, and cybersecurity experts, many of whom advise adversary may not be known, individuals and institutions are facing »» Ongoing evaluation of cybersecurity strategy and policy governments, agencies, and industry around the world on security and technology. unprecedented vulnerabilities. With few ways to defend against the responses to technology and security threats Lectures, case studies, and exercises will focus on a conceptual framework for open and simple electronic pathways to create harm, powerful nations the design of both cybersecurity policy and technology, while group sessions will are forced to adapt to a shrinking margin of safety. In short, no nation, WHO SHOULD ATTEND enable you to engage directly with your peers, solve problems, and discuss how agency, industry, or firm is isolated from the dangers of cyberwar, cybersecurity insights can be applied in your own country and organization. cyberespionage, cyberterrorism, and cybercrime. A computer science background is not required to attend this During the program, you will: program. It is designed for a broad range of policy leaders For those who are trying to protect critical infrastructure, this new age and technology experts from around the world who play strategic »» Develop a deeper understanding of the technical realities of cyberspace has brought tremendous challenges. The intersection of technology, decision-making roles in both public and private organizations, law, and policy requires those who work in cybersecurity to understand »» Explore the nature of emergent and future cyber threats including: “This executive program brings together exactly the more than their own specialized field. »» Evaluate strategies and policy responses to these threats TO APPLY OR LEARN ABOUT PROGRAM DATES, »» Technologists developing new applications and frameworks who right people: professionals and practitioners who CURRICULUM, TUITION, AND MORE, PLEASE VISIT Cybersecurity: The Intersection of Policy and Technology is an extension »» Build professional skills in group work and scenario assessment will need to detect, withstand, and counteract intrusions have tremendous expertise and experience, of the Cyber Project, a multidisciplinary research program based at the While the curriculum focuses on the technical and policy aspects of security, »» Senior officials in government agencies and the military involved EXED.HKS.HARVARD.EDU/EE/CYBER and come from many sectors of Belfer Center for Science and International Affairs at Harvard University. surveillance, and conflict, you will also gain skills applicable to other situations in the oversight of technology, operations, and policy creation the U.S. government and abroad.” This breakthrough Harvard Kennedy School executive program is the in which policy and technology interact. Using case studies based on recent events, »» first of its kind to focus on the intersection of policy and technology in Business executives who need to balance an open environment Admission is competitive and based on professional – MS. DEBORAH AVIGAIL HOUSEN-COURIEL you will develop techniques of risk analysis and threat modeling applicable to a achievement and organizational responsibility. There are an effort to combat network-based intrusions that disrupt productivity, for innovation while protecting their SENIOR RESEARCHER, YUVAL NE’EMAN WORKSHOP FOR broad set of problems. Topics will include: no formal educational requirements; however, fluency in SCIENCE, TECHNOLOGY AND SECURITY jeopardize privacy, and threaten national security. Here, you and your »» Private and public sector legal experts tasked with codifying  written and spoken English is a necessity for participation. peers will gain the tools necessary to conceptualize the cyber issue, »» Innovative approaches to leadership in the fields of cybersecurity strategy, policy,  the law and understanding its limits develop policies appropriate for its resolution, and frame strategy and management and action to address emerging threats. »» Strategy development in response to emerging threats around issues of identity, traceability, and protection

YOU’RE HERE TO MAKE A DIFFERENCE.SM

21332-15_14-HKS-136_CS_M3_V2.indd 2 2/5/15 10:29 PM CYBERSECURITY CURRICULUM »» The evolution of hacking, from recreational to professional,  THE INTERSECTION OF POLICY AND TECHNOLOGY Cybersecurity: The Intersection of Policy and Technology is an intensive week- and the impact on international security long program that brings together technologists, operators, and policy makers »» Notions of privacy, data, and metadata, and what they mean  In a world with almost limitless connectivity, where cyber attacks can to address the critical threats of a cyber world. It is led by renowned Harvard for international security propagate instantaneously, and where the identity or location of an faculty, senior policy makers, and cybersecurity experts, many of whom advise adversary may not be known, individuals and institutions are facing »» Ongoing evaluation of cybersecurity strategy and policy governments, agencies, and industry around the world on security and technology. unprecedented vulnerabilities. With few ways to defend against the responses to technology and security threats Lectures, case studies, and exercises will focus on a conceptual framework for open and simple electronic pathways to create harm, powerful nations the design of both cybersecurity policy and technology, while group sessions will are forced to adapt to a shrinking margin of safety. In short, no nation, WHO SHOULD ATTEND enable you to engage directly with your peers, solve problems, and discuss how agency, industry, or firm is isolated from the dangers of cyberwar, cybersecurity insights can be applied in your own country and organization. cyberespionage, cyberterrorism, and cybercrime. A computer science background is not required to attend this During the program, you will: program. It is designed for a broad range of policy leaders For those who are trying to protect critical infrastructure, this new age and technology experts from around the world who play strategic »» Develop a deeper understanding of the technical realities of cyberspace has brought tremendous challenges. The intersection of technology, decision-making roles in both public and private organizations, law, and policy requires those who work in cybersecurity to understand »» Explore the nature of emergent and future cyber threats including: “This executive program brings together exactly the more than their own specialized field. »» Evaluate strategies and policy responses to these threats TO APPLY OR LEARN ABOUT PROGRAM DATES, »» Technologists developing new applications and frameworks who right people: professionals and practitioners who CURRICULUM, TUITION, AND MORE, PLEASE VISIT Cybersecurity: The Intersection of Policy and Technology is an extension »» Build professional skills in group work and scenario assessment will need to detect, withstand, and counteract intrusions have tremendous expertise and experience, of the Cyber Project, a multidisciplinary research program based at the While the curriculum focuses on the technical and policy aspects of security, »» Senior officials in government agencies and the military involved EXED.HKS.HARVARD.EDU/EE/CYBER and come from many sectors of Belfer Center for Science and International Affairs at Harvard University. surveillance, and conflict, you will also gain skills applicable to other situations in the oversight of technology, operations, and policy creation the U.S. government and abroad.” This breakthrough Harvard Kennedy School executive program is the in which policy and technology interact. Using case studies based on recent events, »» first of its kind to focus on the intersection of policy and technology in Business executives who need to balance an open environment Admission is competitive and based on professional – MS. DEBORAH AVIGAIL HOUSEN-COURIEL you will develop techniques of risk analysis and threat modeling applicable to a achievement and organizational responsibility. There are an effort to combat network-based intrusions that disrupt productivity, for innovation while protecting their intellectual property SENIOR RESEARCHER, YUVAL NE’EMAN WORKSHOP FOR broad set of problems. Topics will include: no formal educational requirements; however, fluency in SCIENCE, TECHNOLOGY AND SECURITY jeopardize privacy, and threaten national security. Here, you and your »» Private and public sector legal experts tasked with codifying  written and spoken English is a necessity for participation. peers will gain the tools necessary to conceptualize the cyber issue, »» Innovative approaches to leadership in the fields of cybersecurity strategy, policy,  the law and understanding its limits develop policies appropriate for its resolution, and frame strategy and management and action to address emerging threats. »» Strategy development in response to emerging threats around issues of identity, traceability, and protection

YOU’RE HERE TO MAKE A DIFFERENCE.SM

21332-15_14-HKS-136_CS_M3_V2.indd 2 2/5/15 10:29 PM CYBERSECURITY CURRICULUM »» The evolution of hacking, from recreational to professional,  THE INTERSECTION OF POLICY AND TECHNOLOGY Cybersecurity: The Intersection of Policy and Technology is an intensive week- and the impact on international security long program that brings together technologists, operators, and policy makers »» Notions of privacy, data, and metadata, and what they mean  In a world with almost limitless connectivity, where cyber attacks can to address the critical threats of a cyber world. It is led by renowned Harvard for international security propagate instantaneously, and where the identity or location of an faculty, senior policy makers, and cybersecurity experts, many of whom advise adversary may not be known, individuals and institutions are facing »» Ongoing evaluation of cybersecurity strategy and policy governments, agencies, and industry around the world on security and technology. unprecedented vulnerabilities. With few ways to defend against the responses to technology and security threats Lectures, case studies, and exercises will focus on a conceptual framework for open and simple electronic pathways to create harm, powerful nations the design of both cybersecurity policy and technology, while group sessions will are forced to adapt to a shrinking margin of safety. In short, no nation, WHO SHOULD ATTEND enable you to engage directly with your peers, solve problems, and discuss how agency, industry, or firm is isolated from the dangers of cyberwar, cybersecurity insights can be applied in your own country and organization. cyberespionage, cyberterrorism, and cybercrime. A computer science background is not required to attend this During the program, you will: program. It is designed for a broad range of policy leaders For those who are trying to protect critical infrastructure, this new age and technology experts from around the world who play strategic »» Develop a deeper understanding of the technical realities of cyberspace has brought tremendous challenges. The intersection of technology, decision-making roles in both public and private organizations, law, and policy requires those who work in cybersecurity to understand »» Explore the nature of emergent and future cyber threats including: “This executive program brings together exactly the more than their own specialized field. »» Evaluate strategies and policy responses to these threats TO APPLY OR LEARN ABOUT PROGRAM DATES, »» Technologists developing new applications and frameworks who right people: professionals and practitioners who CURRICULUM, TUITION, AND MORE, PLEASE VISIT Cybersecurity: The Intersection of Policy and Technology is an extension »» Build professional skills in group work and scenario assessment will need to detect, withstand, and counteract intrusions have tremendous expertise and experience, of the Cyber Project, a multidisciplinary research program based at the While the curriculum focuses on the technical and policy aspects of security, »» Senior officials in government agencies and the military involved EXED.HKS.HARVARD.EDU/EE/CYBER and come from many sectors of Belfer Center for Science and International Affairs at Harvard University. surveillance, and conflict, you will also gain skills applicable to other situations in the oversight of technology, operations, and policy creation the U.S. government and abroad.” This breakthrough Harvard Kennedy School executive program is the in which policy and technology interact. Using case studies based on recent events, »» first of its kind to focus on the intersection of policy and technology in Business executives who need to balance an open environment Admission is competitive and based on professional – MS. DEBORAH AVIGAIL HOUSEN-COURIEL you will develop techniques of risk analysis and threat modeling applicable to a achievement and organizational responsibility. There are an effort to combat network-based intrusions that disrupt productivity, for innovation while protecting their intellectual property SENIOR RESEARCHER, YUVAL NE’EMAN WORKSHOP FOR broad set of problems. Topics will include: no formal educational requirements; however, fluency in SCIENCE, TECHNOLOGY AND SECURITY jeopardize privacy, and threaten national security. Here, you and your »» Private and public sector legal experts tasked with codifying  written and spoken English is a necessity for participation. peers will gain the tools necessary to conceptualize the cyber issue, »» Innovative approaches to leadership in the fields of cybersecurity strategy, policy,  the law and understanding its limits develop policies appropriate for its resolution, and frame strategy and management and action to address emerging threats. »» Strategy development in response to emerging threats around issues of identity, traceability, and protection

YOU’RE HERE TO MAKE A DIFFERENCE.SM

21332-15_14-HKS-136_CS_M3_V2.indd 2 2/5/15 10:29 PM FACULTY CHAIR

Tad Oelstrom is Adjunct Lecturer in Public Policy Lieutenant General. Key senior command positions and Director of the National Security Program at included three different fighter wings in England, Harvard Kennedy School. His areas of focus are Southwest Asia and Germany, the U.S. Third Air national and international security issues; U.S. Force in England, and the U.S. Air Force Academy. military; and advanced development education for national security professionals. He served for more For a list of the 2015 faculty and speakers, SM please visit exed.hks.harvard.edu/ee/cyber than 35 years in the U.S. Air Force, retiring as a YOU’RE HERE TO MAKE A DIFFERENCE. CYBERSECURITY The Intersection of Policy and Technology

FACULTY & GUEST SPEAKERS Throughout the program, Tad Oelstrom is joined by a variety of Harvard faculty members and cybersecurity leaders. Past speakers have included:

»»General Keith B. Alexander, U.S. Army (Ret.),  »»Melissa Hathaway, Cyber Security Initiative Senior »»Latanya Sweeney, Professor of Government  former Commander, U.S. Cyber Command and Advisor, Belfer Center for Science and International and Technology in Residence, Harvard University EXED.HKS.HARVARD.EDU/EE/CYBER Director, National Security Agency/Chief,  Affairs at Harvard Kennedy School »»Michael Sulmeyer, Senior Policy Advisor,  Central Security Service »»Gary King, Director, Institute for Quantitative Office of the Deputy Assistant Secretary of  79 JFK Street »»Scott Bradner, Secretary to the Board of Trustees Social Science and the Albert J. Weatherhead III Defense for Cyber Policy Cambridge, MA 02138 USA of the and Senior Technology University Professor, Harvard University »»Parisa Tabriz, Security Princess, Google Phone: +1-617-496-9000 Consultant, Harvard University » » Joseph S. Nye Jr., University Distinguished  »»Jim Waldo, Chief Technology Officer,  Email: [email protected] » » Jonathan Zittrain, Professor of Law, Harvard Law Service Professor and former Dean of Harvard Harvard University EXED.HKS.HARVARD.EDU/EE/CYBER School and Harvard Kennedy School, and Director Kennedy School exed.hks.harvard.edu YOU’RE HERE TO MAKE A DIFFERENCE.SM of the Berkman Center for Internet & Society »»Dr. Herbert Lin, Chief Scientist, Computer Science »»Dan Geer, Chief Information Security Officer, In-Q-Tel and Telecommunications Board, National Research Council of the National Academies

21332-15_14-HKS-136_CS_M3_V2.indd 1 2/5/15 10:29 PM FACULTY CHAIR

Tad Oelstrom is Adjunct Lecturer in Public Policy Lieutenant General. Key senior command positions and Director of the National Security Program at included three different fighter wings in England, Harvard Kennedy School. His areas of focus are Southwest Asia and Germany, the U.S. Third Air national and international security issues; U.S. Force in England, and the U.S. Air Force Academy. military; and advanced development education for national security professionals. He served for more For a list of the 2015 faculty and speakers, SM please visit exed.hks.harvard.edu/ee/cyber than 35 years in the U.S. Air Force, retiring as a YOU’RE HERE TO MAKE A DIFFERENCE. CYBERSECURITY The Intersection of Policy and Technology

FACULTY & GUEST SPEAKERS Throughout the program, Tad Oelstrom is joined by a variety of Harvard faculty members and cybersecurity leaders. Past speakers have included:

»»General Keith B. Alexander, U.S. Army (Ret.),  »»Melissa Hathaway, Cyber Security Initiative Senior »»Latanya Sweeney, Professor of Government  former Commander, U.S. Cyber Command and Advisor, Belfer Center for Science and International and Technology in Residence, Harvard University EXED.HKS.HARVARD.EDU/EE/CYBER Director, National Security Agency/Chief,  Affairs at Harvard Kennedy School »»Michael Sulmeyer, Senior Policy Advisor,  Central Security Service »»Gary King, Director, Institute for Quantitative Office of the Deputy Assistant Secretary of  79 JFK Street »»Scott Bradner, Secretary to the Board of Trustees Social Science and the Albert J. Weatherhead III Defense for Cyber Policy Cambridge, MA 02138 USA of the Internet Society and Senior Technology University Professor, Harvard University »»Parisa Tabriz, Security Princess, Google Phone: +1-617-496-9000 Consultant, Harvard University » » Joseph S. Nye Jr., University Distinguished  »»Jim Waldo, Chief Technology Officer,  Email: [email protected] » » Jonathan Zittrain, Professor of Law, Harvard Law Service Professor and former Dean of Harvard Harvard University EXED.HKS.HARVARD.EDU/EE/CYBER School and Harvard Kennedy School, and Director Kennedy School exed.hks.harvard.edu YOU’RE HERE TO MAKE A DIFFERENCE.SM of the Berkman Center for Internet & Society »»Dr. Herbert Lin, Chief Scientist, Computer Science »»Dan Geer, Chief Information Security Officer, In-Q-Tel and Telecommunications Board, National Research Council of the National Academies

21332-15_14-HKS-136_CS_M3_V2.indd 1 2/5/15 10:29 PM