In Focus: Cybersecurity from China's Perspective

In Focus: Cybersecurity from China's Perspective

In Focus: Cybersecurity from China’s Perspective THU Join us for a panel discussion with China and cybersecurity experts, moderated by The Christian FEB Science Monitor. 4 Discussion and Q & A 7:00 p.m. to 8:30 p.m. Left to right: Adam Segal, Sharon Hom*, Michael Sulmeyer, Lobsang Gyatso Sither, and Mike Farrell. ® Mapparium Participants include Adam Segal, the Maurice R. Greenberg Senior Fellow for open 6:00 p.m. China Studies and Director of the Digital and Cyberspace Policy Program at the to 7:00 p.m. Council on Foreign Relations; Sharon Hom, Executive Director of Human Rights in China, a Chinese NGO; Michael Sulmeyer, Director of the Belfer Center’s Cyber Security Project at the Harvard Kennedy School; Lobsang Gyatso Sither, Digital Security Programs Manager, Tibet Action Institute; and Mike Farrell, mbelibrary.org • The Christian Science Monitor; Editor of Passcode, covering the intersection 200 of technology, security, and privacy. Massachusetts Panelists will address these key questions and other topics: Avenue Boston, MA • What’s China’s playbook for approaching the Internet? 02115 • How did Beijing transform into a major cyber power? • • Who are the key players controlling China’s Internet strategy? 617-450-7000 • Can China curtail digital espionage? • Will China and the West forge rules of engagement in the Digital Age? Doors open at 6:00 p.m. Come early and see the Mapparium as it’s never been seen before, with new lighting and a short presentation related to the event. * Sharon Hom speaking at the 2014 Bernstein China Symposium, April 3, 2014, NYU Law © NYU Photo Bureau: Hollenshead.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    1 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us