[As a courtesy to Politech readers, Scientific American generously has offered list members three complimentary tickets to this conference. Laura Salant has said the *first three* Politech members to call the number below will get the complimentary tickets. Please do not respond to this message (I have nothing to do with the event). If you call too late for the free admission, Politech members still qualify for the two-thirds off offer. Good luck. --Declan] --- Date: 26 Feb 2002 15:18:07 -0500 From: "Laura Salant" <lsalantat_private> To: <declanat_private> --- ** Join The Summit on Privacy, Security and Safety ** ----- March 5 - 6th, Plaza Hotel, New York, NY ** Exclusive Online Offer--66% off--only $500 for full conference pass ** Call Now and mention password "SCIAM" - 914-245-7764 Be the first to examine the impact of the war against terrorism on privacy and security. Focusing on the global concerns of the private and public sectors, the forum will cover topics such as technologies for the new framework, security in private sectors, vulnerabilities in financial services, bioterrorism, tracking terror, biosurveillance, medical privacy and much more. ===== Speakers include: Senator Robert Bennett, R. James Woolsey (Former CIA Director), Congressman Sherwood Boehlert (Chairman of the House Science Committee), Marc Rotenberg (EPIC), John Rennie (Scientific American Editor in Chief), along with representatives from IBM, Deutsche Bank, EDS, Citigroup, Visa, DaimlerChrysler, the Council for Foreign Relations, Brookings Institution, The New York Times, Newsweek and Yale University. Find out more at: http://www.globalprivacysummit.net/ ** Register Now and mention password "SCIAM" - 914-245-7764 --- http://www.globalprivacysummit.net/Pages/sessions.html Message-Id: <20020227185532.7550B104F9at_private> Program Topics Session I Privacy, Cyber Security and Safety in the Private Sector. The impact of the September attacks has touched every aspect of our life and nowhere is that transformation more keenly felt than in private enterprise. Government access to business transactions databases and banking have emerged as key weapons in the war against terrorism. Furthermore, The Patriot Act imposes new responsibilities on business, including alerting authorities about the suspicious behavior of both customers and employees. Transforming security policy to an IT infrastructure is a complex task. Session speakers will discuss the systems and emerging technologies that are providing the technological solutions to this task. The session will explore successful strategies, methodologies and emerging technologies that are being used to transform security requirements into robust, effective programs. Session II Trust but Verify: Vulnerabilities and Solutions in Financial Services. Trust continues to be the most important attribute of the financial services industry, with consumers continuing to want their financial information to be available on demand and easy to access. Above all, they want these services to be provided in safe, sound private and secure ways. Yet concern about the vulnerabilities of the Internet has been heightened by recent events and evidence of criminal activities such as identity theft and money laundering. Transaction security, infrastructure security and asset protection are essential in financial services. Industry leaders will discuss what they are doing to sustain consumer confidence and how they ensure the soundness, privacy and security of financial transactions while focusing on customers as a foundation for innovative business strategies. Session III The New Framework: The U.S. Perspective. Have the imperatives of the war on terrorism caused the need for a whole new framework for data protection among the democratic allies? While privacy may not be an absolute right, the open exchange of ideas is critical to the continued growth of the information economy and the protection of citizens' basic rights in any democratic society. Across the globe, governments are challenged to adopt the policies and roles that are most likely to guarantee freedom of expression, sustain economic growth, and protect the safety and security of citizens. The session speakers -- composed of global regulators, executives of multinational companies and international experts -- will examine these challenges, advance solutions and discuss international standards that ensure the safety of citizens as well as protect privacy in a world of trans-border data flows. Session IV Individual Privacy and Public Safety: Reconciling Competing Human Values. At the heart of the present debate is the protection of human rights and civil liberties, including privacy, and the erosion of those rights in the name of public safety. Justice Louis Brandeis described privacy as "the most comprehensive of all rights and the one most cherished by a free people", yet while privacy is recognized in the EU as a human right, there is no right to privacy in the Constitution. Privacy must be balanced against competing interests such as public safety. The current debate about privacy is not so much about a legal or technical concept as a social one. The critical question about the protection of civil liberties and public safety in the 21st century is the same as it has always been -- namely, whom should you trust? Session V Part I: Bioterrorism: Lessons Learned from Dark Winter. In July 2001 CSIS CEO John Hamre and former senator Sam Nunn outlined the results of a war game that simulated a biological attack on American soil before the House Subcommittee on National Security, Veterans Affairs, and International Relations. Among the findings: * An attack on the United States with biological weapons could cause massive civilian casualties, breakdown in essential institutions, civil disorder, loss of confidence in government and reduced U.S. strategic flexibility. * The U.S. Government currently lacks adequate strategies, plans and information systems to manage a crisis of this type or magnitude. * Public health is now a major security issue. * Containing the spread of a contagious disease delivered as a bioweapon will present significant ethical, political, cultural, operational and legal challenges. In October 2001 the United States suffered its first confirmed experience of biological warfare with the anthrax attack. Our panelists -- all of who were participants in the original Dark Winter -- will review where we are now in terms of preparedness and what has been learned since the original exercise. Part II: Tracking Terror -- Biosurveillance and Medical Privacy. While early detection can save lives and that the U.S. public health system is currently unprepared and ill equipped to respond quickly and decisively to biological attacks. Biosurveillance -- using smart systems to sift through data and look for connections through access to medical records -- can find connections not readily apparent to human beings, but it is a massive undertaking. It will require coordination of the health care system at a national level. It will also require that we calculate the right balance between safety and privacy. How will the US health care system respond to these new public health imperatives? Will these requirements further erode patient/physician trust? Is there a technological solution capable of meeting the apparently contradictory requirements of HIPAA and public health? Session VI Meeting the Clear and Present Danger: Critical Infrastructure Protection and Technology. We have been warned that we need to defend our national infrastructure against the threat of a "digital Pearl Harbor." Americans have been alerted that cyberattacks may be part of the terror arsenal. Dependence on information and communications infrastructure has created new cyber-vulnerabilities. Electronic transfers of money, distribution of electrical power, response to emergency services and military command and control are all at risk. If not the weapons of mass destruction, these cyberthreats are certainly weapons of mass disruption. No computer is immune from denial of service attacks. Furthermore most of the cyberworld is in private hands, making a unified defense difficult. This session will discuss these challenges as well as the requirements of more secure technologies and the emergence of new public/private partnerships to meet these threats. Session VII It's Not Just about the Technology... In a world that is witnessing a transition from consumer/business privacy issues to citizen/privacy issues, technology can only provide a partial solution to what is essentially a human dilemma. However, new technologies that ensure privacy need not be a threat to public safety. Technical tools are definitely part of the mix of institutional, procedural and technical safeguards, for both privacy and security. Speakers will discuss the strategic implications of recent technologies, including those that support security and public safety in the private sector. --- ------------------------------------------------------------------------- POLITECH -- Declan McCullagh's politics and technology mailing list You may redistribute this message freely if you include this notice. Declan McCullagh's photographs are at http://www.mccullagh.org/ To subscribe to Politech: http://www.politechbot.com/info/subscribe.html This message is archived at http://www.politechbot.com/ -------------------------------------------------------------------------
This archive was generated by hypermail 2b30 : Wed Feb 27 2002 - 09:59:37 PST