July 10, 2019
Telecom technology is changing again, and it's more than the move to 5G.  How and when it changes will have a  major effect on key issues like Huawei's efforts to dominate the telecom market, supply chain diversity, and how your phone, car or factory connects to the internet.  New technologies will reshape the security debate and markets.  Please join us for an interactive discussion of  the policy and business implication of the future of 5G.  Agenda 8:45 am - Registration  9:00 am - IntroductionsJames A. Lewis Senior Vice President & Director, CSIS Technology Policy Program   9:05 am - Moderated DiscussionChris Boyer Assistant Vice President of Global Public Policy, AT&TTravis Russell Director of Cybersecurity, OracleStein Lundby Head of Corporate Technology Strategy, QualcommThierry Maupilé Executive VP, Chief Strategy & Product ManagementModerated by James A. Lewis 10:00 am - Audience Q&A 10:30 am - End This event is made possible through general support to CSIS. 
June 28, 2019
The Yes Team Martijn Rasser Senior Fellow, Technology and National Security Program Center for a New American SecurityDan David  Founder Wolfpack Research LLC   vs.  The No Team  Paul Triolo Practice Head, Geo-Technology Eurasia GroupErin Ennis Senior Vice President US-China Business Council  In May 2019 the Trump administration took several steps aimed at limiting the business activities of Huawei because of national security concerns. The president issued an executive order banning the sale of Huawei products in the United States, expanding restrictions that were first applied to federal government agencies. Furthermore, the Commerce Department placed Huawei on its “Entities List,” banning American firms from supplying products and services to Huawei. Four days later, the Commerce Department issued a “Temporary General License” (TGL) allowing firms to provide support for previously concluded business. The TGL is set to expire on August 19. These steps represent not only a major adjustment in American treatment of Huawei and potentially American policy toward China, but also how the world should manage the increasingly fraught technology-national security nexus.    This event features a formal debate on the question, “Should the United States severely restrict Huawei’s business?” Arguing “yes” is the team of Martijn Rasser of the Center for a New American Security and Dan David of Wolfpack Research LLC. Arguing “no” is the team of Paul Triolo of the Eurasia Group and Erin Ennis from the US-China Business Council. CSIS’s Scott Kennedy will moderate the debate as well as the subsequent follow-up discussion with the participants and audience about the pros and cons of specific actions toward Huawei and the implications for US-China relations, American foreign policy, and the shape of the global economy. This event is made possible through general support to CSIS. 
June 25, 2019
Hacktivism – hacking for social change – has a rich history that started with a little-known group called the Cult of the Dead Cow. Jim Lewis talks with Joseph Menn, a renown cybersecurity reporter, to discuss his new book, Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World. They examine the legacy of some of the original cyber vigilantes, and new trends in the hacktivist community, from infiltrating spyware vendors to intelligence agencies.
June 4, 2019
Keynote Remarks Norman R. Augustine Former Chairman and Chief Executive Officer of Lockheed Martin; former Undersecretary of the Army; current member of advisory boards to the Department of Homeland Security and Department of EnergyIntroduced by Matthew P. Goodman  Senior Vice President and Simon Chair in Political Economy, CSIS  Followed by an expert panel discussion including: Mikko Huotari Deputy Director, Mercator Institute for China StudiesDr. Richard Lester Associate Provost for International Activities, Massachusetts Institute of TechnologyHarvey Rishikof Director of Policy and Cyber Security Research and Visiting Research Professor at the University of Maryland Moderated by Stephanie Segal Deputy Director and Senior Fellow, Simon Chair in Political Economy, CSIS Over the past year, the United States has introduced several new policy initiatives to limit foreign access to critical technologies, including tightening inbound investment screening procedures and expanding export controls on emerging and foundational technologies. At a Senate Intelligence Hearing on Worldwide Threats in February 2018, FBI Director Christopher Wray warned of other countries “exploiting the very open research and development environment” in the United States and counterintelligence risks from “nontraditional collectors, especially in the academic setting, whether it’s professors, scientists, students.” The United States is reevaluating its posture on foreign research collaboration. Various U.S. government agencies have increased scrutiny of researchers from sensitive countries while recent legislative proposals would restrict foreign students’ access to certain research projects.   Policymakers have to evaluate the tensions between national security and an open and welcoming investment and innovation environment, as well as the degree to which such efforts should be coordinated with allies and partners. Notably, officials will have to decide whether to expand limits on research collaboration, while ensuring the United States remains the premier destination for top global talent.   Please join the CSIS Simon Chair in Political Economy at 2:00pm on Tuesday, June 4, for keynote remarks by Norman R. Augustine, former Chairman and Chief Executive Officer of Lockheed Martin, former Undersecretary of the Army, and current member of advisory boards to the Department of Homeland Security and Department of Energy, followed by an expert panel discussion on balancing national security concerns with research competitiveness.This event is made possible through the generous support of member governments of the CSIS Allied Economic Forum.
May 24, 2019
Quantum computing has been an ethereal concept for years, but what is it really? China is investing heavily in its development, but is the United States really falling behind? Jim Lewis sits down with Michael Brett, CEO of QxBranch, to dispel some of the common myths about quantum computing. They discuss how the U.S. can harness quantum’s potential, and how to face current challenges to American innovation.
May 10, 2019
Host Jim Lewis interviews Keith Alexander, a retired four-star general who served as commander of the United States Cyber Command and director of the National Security Agency in the Bush and Obama administrations. Listen in to hear how General Alexander helped establish and structure U.S. Cyber Command. General Alexander talks about NSA modernization, the different responsibilities that the Department of Defense, Federal Bureau of Investigation, and the Department of Homeland Security have to address cybersecurity threats; the current threats in cyberspace; and the merits of persistent engagement.
April 26, 2019
Host Jim Lewis interviews Admiral Michael McConnell, former Director of the National Security Agency, and the second Director of National Intelligence. As head of the NSA during the early days of the internet, he helped set the path for how the U.S. intelligence community responded to the opportunities and risks of emerging digital technologies. They discuss how the nature of surveillance transformed with the emergence of the internet, how U.S. vulnerability to cyber threats has changed over time, and what needs to be done to confront the growing cyber threat posed by our nation’s adversaries.
April 26, 2019
Host Jim Lewis interviews Admiral Michael McConnell, former Director of the National Security Agency, and the second Director of National Intelligence. As head of the NSA during the early days of the internet, he helped set the path for how the U.S. intelligence community responded to the opportunities and risks of emerging digital technologies. They discuss how the nature of surveillance transformed with the emergence of the internet, how U.S. vulnerability to cyber threats has changed over time, and what needs to be done to confront the growing cyber threat posed by our nation’s adversaries.
April 24, 2019
Please join us for a public event on initiatives for securing the software supply chain on Wednesday, April 24, 2019 from 1:00-3:00 pm at the CSIS headquarters. Within the U.S. government, there is increasing awareness of and movement on the need for a coordinated strategy to prevent, identify, and respond to threats stemming from the software supply chain throughout the acquisition process. At this event, we will discuss some of the various initiatives, including the Department of Defense’s Deliver Uncompromised, along with work at the Carnegie Mellon, BSA | The Software Alliance, and the Department of Commerce, designed to minimize the risk of compromised software infiltrating critical systems.  Opening Speech  1:00 pm - Registration 12:45 pm -  William Stephens,Director, Counterintelligence, Defense Security Service, Department of DefenseModerated Discussion 1:15 pm - Allan Friedman, Director of Cybersecurity Initiatives, National Telecommunications Information Administration Bob Metzger, Co-Author MITRE "Deliver Uncompromised"; Head of DC Office, Rogers Joseph O’Donnell, P.C.Tommy Ross, Senior Director, Privacy, BSA | The Software AllianceRoberta Stempfley, Director, CERT Division, Carnegie Mellon University Software Engineering InstituteDerek Weeks, Vice President, Sonatype Inc.  Moderated by James A. Lewis, SVP and Director, CSIS Technology Policy Program 2:45 pm - Audience Q&A 3:00 pm - End This event is made possible through general support to CSIS. 
April 12, 2019
In this episode Jim Lewis interviews William J. “Bill” Lynn, CEO of Leonardo DRS, a leading defense contractor, about his time as the Comptroller and Deputy Secretary of Defense. At the Department of Defense (DoD) he created a new kind of partnership between companies in the defense industrial base (DIB) through the DIB program and helped reorient DoD to treat cyber as a fifth domain.
April 12, 2019
In this episode Jim Lewis interviews William J. “Bill” Lynn, CEO of Leonardo DRS, a leading defense contractor, about his time as the Comptroller and Deputy Secretary of Defense. At the Department of Defense (DoD) he created a new kind of partnership between companies in the defense industrial base (DIB) through the DIB program and helped reorient DoD to treat cyber as a fifth domain.
March 29, 2019
Host Jim Lewis interviews Dick Clarke, who served as a senior advisor in the Clinton, Bush and Obama administrations, helping to create the first national cybersecurity strategy. He began looking at cybersecurity as a national security issue in the ‘90s and has been central to thinking about cybersecurity for decades. They discuss the awakening of government and industry to cybersecurity threats, the real implications of cyber attacks, and the difficulties of coordinating government efforts.
March 15, 2019
In this first episode, host Jim Lewis interviews John Hamre, President and CEO of CSIS and Former Deputy Secretary of Defense. He was one of the first to recognize the strategic implications of cybersecurity and cyber conflict, and who helped lead the DoD in its early approaches to emerging cyber issues. He discusses the hacking incidents that first alerted policymakers to the cyber threats faced by the U.S.; the obstacles and successes in working with other agencies, Congress, and the private sector to address cyber threats; and how to chart a path towards developing structures and doctrines to manage cyber risks.
March 4, 2019
A fragmented model of digital governance is emerging. Data regulation, technical and ethical standards, and market leadership are all in flux, raising questions about whose rules, if any, will become the global standard. This CSIS Simon Chair event will look at the evolution of technology and digital governance in the world’s major economies – the United States, Europe, China, and Japan – and how competing visions and differing priorities are shaping national and regional approaches to digital governance.  Featuring a keynote address from Representative Suzan DelBene (D-WA) Closing remarks from former Deputy US Trade Representative Ambassador Robert Holleyman Expert panel featuring: Peter Fatelnig, Minister Counsellor for Digital Economy Policy, Delegation of the European Union to the United States Naoki Ota, Founder, New Stories Ltd. Former Special Adviser to the Minister, Ministry of Internal Affairs and Communications, Japan  Diane Rinaldo, Deputy Assistant Secretary, National Telecommunications and Information Administration (NTIA), Department of Commerce Paul Triolo, Practice Head, Geotechnology, Eurasia Group Shaundra Watson, Director, Policy, BSA | The Software Alliance  Stephanie Segal (Moderator), Simon Chair Senior Fellow and Deputy Director, CSIS This event was made possible by support from the Japanese Embassy.
February 6, 2019
Please join us for a public event on mitigating security risks for emerging 5G wireless networks on Wednesday, February 6th, 2019 from 1:00 pm - 2:30 pm at the CSIS headquarters.  At this event, our keynote speaker FCC Commissioner Jessica Rosenworcel and the following expert panel will discuss the challenges and opportunities presented by emerging 5G networks, and how standards and security procedures can create a resilient and secure framework for 5G network implementation. They will also discuss the findings and recommendations in the Communications Security, Reliability, and Interoperability Council (CSRIC) VI's report on 5G security released in September 2018.  Agenda 12:45 pm - Registration   1:00 pm - Keynote Speech The Honorable Jessica Rosenworcel, Commissioner, Federal Communications Commission   1:20 pm - Moderated Discussion Chris Boyer, Assistant Vice President, Global Public Policy, AT&T John Costello, Director of Strategy, Policy, and Plans, Cybersecurity and Infrastructure Security Agency, U.S. Department of Homeland Security Travis Russell, Director, Cybersecurity, Oracle Communications; Chairman, Working Group 3, FCC Communications Security, Reliability, and Interoperability Council Ambassador Robert Strayer, Deputy Assistant Secretary for Cyber and International Communications and Information Policy, U.S. State Department Moderated by Clete Johnson, Partner, Wilkinson, Barker, Knauer LLP; Senior Fellow, CSIS   2:15 pm - Audience Q&A   2:30 pm - End   This event is made possible through general support to CSIS. 
February 5, 2019
Launched in 2013, China's Belt and Road Initiative (BRI) strives to improve infrastructure, trade, financial integration, and people-to-people bonds across more than 80 countries. Its digital dimensions are far-reaching, including fiber optic cables, 5G networks, satellites, and devices that connect to these systems. Please join the CSIS Reconnecting Asia Project for a discussion of these developments and their implications for U.S. economic and strategic interests.  Featuring an expert panel discussion withDr. Robert Atkinson President, Information Technology and Innovation Foundation Lt. Gen. William Mayville (Ret.) Former Deputy Commander, U.S. Cyber Command Emily Rauhala Staff Writer, The Washington Post  Moderated byKate O'Keeffe Reporter, The Wall Street Journal  Welcoming remarks byMatthew P. Goodman Senior Vice President; William E. Simon Chair in Political Economy and Senior Adviser for Asian Economics  With special presentations by Hirobumi Kayama Special Advisor, Japan Ministry of Economy, Trade, and Industry Jonathan E. Hillman Senior Fellow, Simon Chair in Political Economy, and Director, Reconnecting Asia Project  This event is made possible by generous support from JETRO NY.
January 29, 2019
The speakers will discuss business models through which the U.S. government and industry can work together in developing software for national security capabilities. The discussion will explore how the government and industry can create the right incentives to develop and iteratively modernize software for government applications with the goal of delivering innovation and advanced capabilities at the speed of relevance in a highly competitive international security environment.  At the same time, the government’s business model for software development must present a return on investment that makes this an attractive business proposition for industry. Increasingly, software is the driver for advances in critical warfighting systems like the Aegis Combat System, the Global Positioning System, the Battlefield Communications Node, and many other systems. As a result, the business model for software acquisition is a key enabler for the National Defense Strategy.This event is made possible through general support from Northrop Grumman.
January 15, 2019
Please join us for an armchair discussion on responses to national security threats in cyberspace from the Department of Justice, featuring John P. Carlin, Former Assistant Attorney General, National Security Division; and John C. Demers, Assistant Attorney General, National Security Division, on Tuesday, January 15th from 5:30 pm - 7:00 pm at the CSIS headquarters.  In his new book, Dawn of the Code War, Mr. Carlin discusses the rise of cyber threats from U.S. adversaries, and the strategies that have been developed to combat them. At this event, Mr. Carlin and Mr. Demers will discuss the nature of these threats and, more importantly, the U.S. response, including indictments of Russian, Chinese, Iranian, and North Korean nationals. The discussion will focus on the actions the Department of Justice is already taking to combat cyber threats and mitigate risks, and how this could change the cyber threat environment.    John P. Carlin Partner, Morrison & Foerster LLP; Former Assistant Attorney General, National Security Division, Department of Justice John C. Demers Assistant Attorney General, National Security Division, Department of JusticeModerated by James A. Lewis Senior Vice President and Director, CSIS Technology Policy Program This event is made possible through general support to CSIS.
December 13, 2018
Please join us for a panel discussion on Thursday, December 13th at the Center for Strategic and International Studies on extending federal cybersecurity to endpoint devices. While cybersecurity awareness in the federal government has improved, along with efforts to provide more secure architectures and managed security services for federal networks, these efforts are focused on systemic risks and vulnerabilities in core infrastructures. Few extend to the millions of endpoint devices connected to these systems. The panel will discuss how federal agencies can move toward a more flexible, user-centered architecture for federal networks to manage evolving security threats. We will also consider how the federal government should think about managing vulnerabilities in the rapidly growing number of consumer devices connected to federal networks. 1:00 pm - Keynote RemarksSuzette Kent, Federal Chief Information Officer, Office of Management and Budget, Executive Office of the President 1:20 pm - Panel DiscussionRyan Gillis, Vice President, Cybersecurity Strategy and Global Policy, Palo Alto NetworksDaniel Chenok, Executive Director, IBM Center for Business of Government Todd Gustafson, President & Head of US Public Sector, HP Federal LLCThis event was made possible through support from HP, Inc. 
November 21, 2018
Linda Jojo, Executive Vice President for Technology and Chief Digital Officer, United Airlines, joins Beverly Kirk on the Smart Women, Smart Power Podcast for a conversation on how technology is transforming the airline industry and how airlines are thinking about security in the digital age. 
November 15, 2018
This discussion, following the midterm elections, will assess what we saw--and didn't see--in those elections.  It will also examine foreign influence operations that go beyond elections to undermine other democratic institutions, such as our justice system, and democracy itself.   Finally, we will discuss ways to counter this national security threat. This event is made possible with the help of the American Bar Association Committee on Law and National Security and the financial support of the William and Flora Hewlett Foundation and the Democracy Fund.
November 5, 2018
Please join the Center for Strategic and International Studies for a Smart Women, Smart Power conversation with Julie Sweet, Chief Executive Officer of Accenture North America. She will discuss artificial intelligence, innovation, and re-skilling the workforce for the future. Ms. Sweet leads Accenture's business in the United States, its largest market, as well as Canada. She is also a member of Accenture’s Global Management Committee. Prior to assuming this role, she served as Accenture’s general counsel, secretary and chief compliance officer. Before joining Accenture in 2010, she was a partner in the Corporate department of Cravath, Swaine & Moore, LLP. Julie Sweet is a leader on issues including innovation, the impact of technology on business, and inclusion and diversity. In 2018, she was named to FORTUNE’s list of “Most Powerful Women” for the third consecutive year. Ms. Sweet co-chairs the Canada-United States Council for Advancement of Women Entrepreneurs and Business Leaders. In addition, she serves on the Board of the Business Roundtable and chairs the Business Roundtable’s Technology Committee. Ms. Sweet holds a Bachelor of Arts degree from Claremont McKenna College and a Juris Doctor degree from Columbia Law School.This event is made possible through support from Citi.
November 5, 2018
Join the Defense-Industrial Initiatives Group and the International Security Program for a discussion on national security, artificial intelligence, and the nexus between AI’s national security applications and its broader commercial applications. At this launch event, we will present the research and findings of our newest report, Artificial Intelligence and National Security: The Importance of the AI Ecosystem. A public panel discussion will follow, where dialogue will focus on opportunities and challenges in AI investment, adoption, and operational management in the context of national and international security.This report is made possible by the generous support from Thales USA, Inc.
October 10, 2018
Please join us on Wednesday, October 10, for a discussion on a new CSIS report Modernizing the Social Security Number (SSN), with opening keynote remarks by Congressman Sam Johnson (R-TX). Congressman Johnson is a member of the House Committee on Ways and Means where he serves as the Chairman of the Social Security Subcommittee. The opening remarks will be followed by remarks by Candace Worley, Vice President and Chief Technical Strategist at McAfee, and a panel discussion. The main identity credential in the U.S. is a paper Social Security Card largely unchanged since the 1930s. The SSN serves as a starting point for confirming identity in the U.S. and is central to the U.S. economy, but it is easily stolen and not designed to work in a digital environment. Modernizing the SSN with a secure process for verifying its use would make it harder to steal and create a foundation for innovation in authentication technology.  The panel will discuss the challenges in improving identity authentication systems and what initial steps can be taken to improve privacy and security. We will also discuss the issues that have arisen from using the SSN as an authenticator and explore potential models for a modernized identity system. 8:45 am—Light Refreshments 9:00 am—Opening Keynote RemarksCongressman Sam Johnson (R - TX), Chairman, Social Security Subcommittee 9:05 am—Keynote RemarksCandace Worley, Vice President and Chief Technical Strategist, McAfee, LLC 9:20 am—Panel DiscussionPaul Rosenzweig, Senior fellow, R Street InstituteNaomi Lefkovitz, Senior Privacy Policy Advisor, National Institute of Standards and TechnologyCandace Worley, Vice President and Chief Technical Strategist, McAfee, LLC Moderated byJames A. Lewis, Senior Vice President, Center for Strategic and International Studies This event is made possible by general support to CSIS.
September 12, 2018
Blockchain is increasingly recognized as a potentially transformative technology for business transaction infrastructure with its decentralized and transparent networks which form nodes or “blocks” linked by cryptography. Although its decentralized networks make blockchain less vulnerable to cyberattacks, it poses challenges for governments seeking to understand the technology’s many applications and develop appropriate regulatory “rules of the road.” How are governments thinking about the increased use of blockchain technology and its regulatory environment? How are businesses viewing the future of blockchain? What are the future trends in this space? Please join us on September 12th as our distinguished panel of experts will discuss the future of blockchain technology. This event is made possible by the generous support of the Embassy of Lichtenstein.
July 26, 2018
Rebecca Hersman, Director of the Project of Nuclear Issues at CSIS; Katherine Charlet, Director Technology and International Affairs Program at Carnegie Endowment for International Peace; Dr. Lindsay Cohn, Associate Professor at the U.S. Naval War College; and Dr. Rupal Mehta, Assistant Professor at the University of Nebraska-Lincoln discuss the opportunities and challenges of current and future warfare tools and technology.
July 9, 2018
William A. Carter of the Technology Policy Program interviews the UVA Cyber Defense Team, 2018 winners of the National Collegiate Cyber Defense Competition (NCCDC). NCCDC is a national red/blue team cyber defense competition in which undergraduates defend the networks of fictional companies against teams of real world professional hackers and contractors. The UVA team, formed just 3 months before the competition, describe how they came together to defeat 230 experienced teams from across the country, and the lessons they learned from the competition that can be applied to the challenges faced by real-world companies and policymakers.
June 14, 2018
Join Andrew Colvin, Commissioner of the Australian Federal Police (AFP), as he discusses the implications of destabilization in fragile and failed states for combatting transnational terrorism and organized crime in the West. After Commissioner Colvin’s remarks, Seth G. Jones, Harold Brown Chair and Director of the CSIS Transnational Threats Project, will host a moderated armchair discussion. This event is made possible through general support to CSIS.
April 26, 2018
How do entire economies become more innovative?  Jackson Streeter, an expert on technology transfer, maps the ecosystem of innovation. Strong intellectual property rights, investments in research and development, a risk-taking mentality, and seed funding are all necessary parts. Can they be nurtured and developed in Latin America? Sarah’s Big Little News is the rise of marriage fraud in Costa Rica.  
April 25, 2018
Governments around the world face daunting challenges in securing cyberspace, protecting online privacy, and managing the flows of data.  As these governments consider laws and policies to confront these challenges, there is growing divergence of approaches across the European Union, Asia, and the United States, potentially fragmenting global markets.  With regional views from Europe and Estonia, China, India, and the United States, our discussion will focus on the need for harmonization and cooperation on global approaches to cybersecurity and regulating emerging technologies. Discussion will be moderated by Samm Sacks, senior fellow, Technology Policy Program, and speakers will include Chris Painter, the former coordinator for cyber issues at the U.S. Department of State; Helen Popp, the second secretary of digital policy and economic affairs at the Estonian Embassy; Tommy Ross, the senior director for Policy at BSA | The Software Alliance; and Jay Gullish, the head for digital economy, media and entertainment at the U.S.-India Business Council. Light refreshments will be served from 9:00 - 9:30 AM. This event is made possible through the support of BSA | The Software Alliance.
April 4, 2018
Join us for a series of discussions with experts from industry, law enforcement, and government on how the recent passage of the CLOUD Act will reshape how U.S. and other law enforcement agencies can access cross-border data to conduct investigations.  9:00 AM        Coffee & light refreshments 9:30 AM        Panel I: US Warrants for Data, Conflict of Laws and Comity Analysis in the aftermath of the CLOUD Act Sandra Moser, David Bitkower, Alexander Berengaut, Kelly Hagedorn  10:30 am      Panel II: Future of Cross-border Law Enforcement Cooperation Kevin Adams, Hasan Ali, Richard Downing, Jennifer Daskal   Additional speakers to be announced. This event is made possible through general support to CSIS.
March 23, 2018
Building effective cyber defenses is a major challenge for defense planners, just as missile defense has been since the original Strategic Defense Initiative. In both realms the offense has the advantage, making effective defense difficult. Missile defense, however, now has several decades of experience producing and fielding new technologies. Are there lessons to be learned — or avoided? The Project on Military and Diplomatic History will host a panel discussion of CSIS experts on the history of missile defense, its experience in developing new technologies, and what these tell us about the challenges for building effective cyber defenses. The session will include a briefing by U.S. Army Captain James Torrence on his award-winning essay “Cyber Defense and the Strategic Defense Initiative”. This event was made possible by donations in support of the Project on Military and Diplomatic History.
March 16, 2018
Russian efforts to sow discord in democratic societies have leveraged traditional covert and clandestine tools, military confrontation, and new technologies such as social media platforms, to shape political events beyond their borders. This approach is low cost, seemingly low risk, and has been more successful than Russian leaders could have imagined.  Responding to these tactics requires some kind of response if we are to change Russian behavior. Join us for a public discussion of what are the options are for responding to Russian activities. Speakers will discuss what tools the U.S. government has at its disposal to impose consequences and combat Russian encroachment. This event is made possible through general support to CSIS.
March 5, 2018
In this podcast, we talk with Kaiser Kuo, longtime China technology watcher and practitioner, and co-host of the Sinica podcast. In an environment where Xi Jinping is president for life, understanding China’s approach to emerging technology, innovation, and the Chinese Communist Party’s censorship of new media is fundamental for tracking geopolitics in East Asia. As the former director for international communications for Baidu, a Chinese search engine giant, Kaiser is uniquely positioned to assess trends in China’s innovation ecosystem, Chinese discussions about the ethics of emerging technologies, and the differences between the tech space in the United States and China.     Hosted by Will Colson. Audio edited by Ribka Gemalingsari. Written and Produced by Jeffrey Bean.     Learn more about China on the Sinica podcast via SupChina here.  
March 1, 2018
The Technology Policy Program invites you to the launch of our upcoming report, A National Machine Intelligence Strategy for the United States. The United States is at the precipice of a defining moment in history. Over the past five years, progress in machine intelligence (MI) has greatly accelerated. From the defeat of Go champion Lee Sedol by DeepMind’s AlphaGo program to the first deployments of fully-autonomous vehicles on public roads,  recent events are challenging us to re-evaluate what may soon be possible for computerized systems. MI systems have already begun to quietly pervade a growing share of businesses, governments, and individual lives around the world, and we are only just beginning to grasp the impacts that this technological revolution will have on our economy, our society, and our national security. In our paper, we outline they key elements of a comprehensive national strategy for the United States to promote the safe and responsible development of MI, and to maintain U.S. leadership in MI technology. MI will transform both economic and strategic power around the world, and leadership in MI technology will be essential to securing our future.This project is made possible with support from Booz Allen Hamilton.
February 13, 2018
Please join the Simon Chair in Political Economy for an event on February 13, 2018, at 9:00am on the importance of cooperation on international standards in emerging technologies. As developments in artificial intelligence (AI), fifth generation (5G) mobile networks, big data, and autonomous vehicles become key drivers in the global economy, shaping the international dialogue on standards around new technologies has become essential to commercial and strategic interests. As technological leaders, the U.S. and Japan are well positioned to lead this effort and to ensure that fair, transparent, and efficient standards are put in place that will encourage continued innovation and efficiency, consumer welfare, and security.  Featuring an expert panel, this event seeks to explore some of the key technologies where this debate is already underway, the actors involved in this space, and the competition to shape the emerging technological landscape. This event is made possible with the generous support of the Embassy of Japan. 
January 31, 2018
Samm Sacks, a senior fellow in the CSIS Technology Policy Program, tells host Beverly Kirk about advances and challenges in China’s digital economy and its cyber governance law and analyzes the likelihood of a trade war between the U.S. and China.
January 29, 2018
This podcast features Ambassador Casper Klynge, Denmark’s first Technology Ambassador. In this interview, Ambassador Klynge discusses his new role and the growing importance of technology and Silicon Valley in the development agenda. Ambassadors are typically found in Washington D.C., but Ambassador Klynge has been tasked with strengthening Denmark's relationship with technology giants like Facebook and Google. To hear more from Ambassador Klynge, listen to the entire podcast.
January 29, 2018
Please join the Freeman Chair for an exciting presentation by Georgia State University's Maria Repnikova, who will share with us the ways in which the Chinese party-state has adapted to the latest media technology environment and has changed not only the content of its message but the means by which it reaches its audiences. Professor Repnikova will put these developments in larger context and share illustrative examples from the Chinese media. Kaiser Kuo, a veteran of China’s media and pop culture, will then offer his insights and offer some ideas for further discussion. Freeman Chair Christopher K. Johnson will moderate the event. The China Reality Check Series presents perspectives from academia, industry, and government in order to promote a sustained dialogue on critical and insufficiently understood issues related to China's reemergence as a global power.
January 29, 2018
Roger McDermott examines how and why Russia’s military has turned its attention to more fully exploiting the electromagnetic spectrum by employing electronic warfare (EW) assets. He will discuss many of the key findings of extensive research in this area, including assessing current Russian EW capabilities and the future role of disruptive technologies in this domain. Mike Kofman, Research Scientist in the Russia Studies Program at CNA, will serve as discussant. Olga Oliker will moderate. This event is made possible by the generous support of Carnegie Corporation of New York.
January 5, 2018
Listen as the Freeman Chair effectively addressing Taiwan’s cybersecurity situation in a broader context and discuss recent developments, challenges requires Taiwan taking steps both internally as well as through cooperation with others.
January 5, 2018
Information and communications technologies (ICT), including the Internet, have long been central to Taiwan’s economic prosperity. At the same time, the island faces complex cybersecurity challenges internally as well as vis-a-vis mainland China and the rest of the world. Effectively addressing these challenges requires Taiwan taking steps both internally as well as through cooperation with others. Join the Freeman Chair on Friday, January 5 for a presentation by Dr. Joseph Hwang on these issues. Dr. Hwang will place Taiwan’s cybersecurity situation in a broader context and discuss recent developments, followed by comments from CSIS Technology Program Senior Fellow, Samm Sacks. CSIS's Freeman Chair in China Studies and Senior Adviser, Christopher K. Johnson, will serve as moderator and will invite members of the audience to ask questions to the speakers. 
November 20, 2017
In this podcast, we take a deep dive into the outcomes of the Chinese Communist Party’s 19Party Congress.  Now that the dust has settled following Xi Jinping’s resounding win, we turned to two leading China-watchers to analyze the implications for China’s economic planning, PLA reform, foreign policy, anti-corruption effort, and censorship. Dr. Oriana Skylar Mastro, assistant professor of security studies at Georgetown University, and Christopher Johnson, chair of the CSIS Freeman Chair in China Studies, join us to help assess the takeaways across Chinese politics. Hosted by Will Colson. Audio edited by Ribka Gemilangsari. Written and Produced by Jeffrey Bean.     Read more from Dr. Oriana Mastro on China’s military reform and strategy here. Read Christopher Johnson’s analysis of the 19 Party Congress here.
November 6, 2017
In the 10 years since China’s first successful anti-satellite test, the vulnerability of essential U.S. space systems has been underscored and competition in outer space has resumed. How has the United States responded? What are the implications for strategy and deterrence in this new era? In this podcast, CSIS experts Todd Harrison and Dr. Zack Cooper along with Secure World Foundation’s Dr. Brian Weeden talk about the changes in the space domain since the end of the Cold War and China’s expanding capabilities, describe how the proliferation of space technology has impacted other countries in the Indo-Pacific, and assess the implications for international cooperation in space exploration. Hosted by Will Colson. Audio edited by Ribka Gemilangsari. Written and Produced by Jeffrey Bean. Read Todd Harrison and Zack Cooper’s new CSIS report: Escalation and Deterrence in the Second Space Age, here.  See Brian Weeden’s recent work on U.S. space systems and U.S.-China strategic relations in space: U.S.-China Strategic Relations in Space (report chapter w/ Xiao He), NBR here. The End of Sanctuary in Space, War is Boring here. Use Outer Space to Strengthen U.S.-China Ties (w/ Xiao He), War on the Rocks here.
October 3, 2017
Innovation and technology are increasingly at the heart of economic growth around the world and will be crucial tools for addressing emerging issues such as global urbanization and growing demand for food, energy, and water. In this report, CSIS and RTI International assess the challenges and opportunities facing developing countries as they pursue innovation and technology-driven economic growth. The report includes analysis of three different sub-topics—education and human capital development, translational research and development and commercialization, and the innovation policy environment—as well as case studies from Kenya, Malaysia, and Gujarat, India. From this research collaboration, CSIS and RTI International hope to create a platform for engaging a broad set of actors to support the creation of knowledge-based economies and innovation-led economic growth in places where we never expected to find it before.
September 29, 2017
After decades of effort to strengthen the federal government’s cyber defenses, are we really more secure? The federal government operates a patchwork of IT systems across multiple agencies, many of which are decades old, costly to maintain and contain known vulnerabilities. The President recently signed an executive order which highlighted the importance of strengthening the security of federal networks and outlined the new administration’s approach to dealing with these challenges. The order echoes Congressional efforts to provide agencies with the budget, authority, and legislative mandate to access cutting edge technologies and adopt shared services to increase efficiency, reduce costs, and improve security. CSIS is hosting an event to discuss how Congress and the Administration can strengthen the federal government’s cyber defenses.Panel of experts to follow keynote addresses by Jeanette Manfra and Congressman Hurd.
September 29, 2017
Dan hosted Dr. Kitano, Director of JICA-RI, for a discussion of our recent report, Harnessing the Data Revolution to Achieve the Sustainable Development Goals. The report analyzes the challenges and opportunities that exist in the pursuit of the revolution in development data globally. The conversation addresses the importance of both small and big data. Dr. Kitano also shares insights into Africa’s attempts to launch their first satellite into space.
September 14, 2017
A spate of ransomware attacks in early 2017 hit millions of computer systems worldwide, including those of National Health Service hospitals in England and radiation monitoring stations in Chernobyl. The persistent spread of simple, cheap ransomware tools puts the onus on businesses and law enforcement to reconsider their tactics for mitigating the effects of cybercrime. CSIS will host a panel discussion on ransomware proliferation and effective tactics for business-law enforcement cooperation on cybersecurity.
September 14, 2017
Please join CSIS and the United States Naval Institute (USNI) for a Maritime Security Dialogue event featuring Vice Admiral Jan Tighe, Deputy Chief of Naval Operations for Information Warfare/Director of Naval Intelligence, for a discussion on cyber warfare in the maritime domain.
August 31, 2017
In this podcast, Dan examines the role of technology in combating India’s population troubles. This week’s guest is Preeti Sinha, Senior President of YES BANK and Global Convenor of YES Institute. Preeti’s background in the financial sector and her experience growing up in India and going to university in the United States give her a unique perspective on the opportunities surrounding FinTech and the use of technology to integrate citizens in both the United States and India into the formal financial sector.
      0:00:00 / 0:00:00