Women have and continue to play a key role in keeping our digital landscape safe. Check out the recent panel discussion from the SheTek Conference 2023 - Women in Cybersecurity - Protecting the Digital Landscape. Find out what's happening now - and how you can get into a cyber career.and thinkers.governments, VC and startups.
The White House launched the IoT Cyber Label, and I had the honor of having my first official White House live appearance. I was especially humbled and honored to share the stage with the nation's top government leaders, Anne Neuberger, Jen Easterly Laurie Locascio and Jessica Rosenworcel. Congrats to all involved for what is the most significant step forward in protecting the IoT in decade, and to Steven M. Kelly, CISSP and Katerina Megas in particular.
Dr. Amit Elazari -CEO and Co-Founder of OpenPolicy was honored and humbled to unveil OpenPolicy Co-founded by her and David Uzan at CyberWeek2023 keynote stage and a series of events with governments, VC and startups.
Cybersecurity Policy has transformed our industry. Cyber is perhaps the most emerging domain of the law, with strategies, regulations, and standards constantly emerging, globally. This domain also serves an amazing opportunity for you explore to new paths, and opportunities, to drive impact at scale and collaborate with the hacker ecosystem to drive better polices, and better security – that advance all users. This talk invites the audience to explore the latest trend in cyber policy globally, focusing on areas with broad impact on the community – such as secure development, workforce, vulnerability disclosure, product security, and anti- hacking laws. We will cover the latest developments from the National Cyber Security Strategy to the EU Cyber Resilience Act – and introduce the audience to the world of policy hacking, and policy “hacking”.
The passage of the CHIPS & Science Act of 2022 presents a critical opportunity for the continued enhancement of security and the foundational components powering digital innovation. With billions of dollars of federal investment and novel requirements developed, panelists from government and industry will distill the latest developments in hardware security policy and discuss global implications.
If you want to learn more about Bill of Materials (not just SBOM!), please listen to Dr. Amit Elazari at the Cybersecurity Coalition and Cyber Threat Alliance’s CyberNextDC 2022!
A discussion of the latest in the how the law is coming for the IoT, especially in the realm of whether or not cybersecurity is considered a manufacturing or design defect to allow product liability law to be used to sue manufacturers, installers, retailers, and others associated with IoT devices. If your house burns down due to a hacker, who can be sued.
CypherCon is Wisconsin’s largest annual hacker conference based in Milwaukee, Wisconsin. Topics include Hacking, Information Security, Privacy, Cryptography, Forensics, and other Security oriented topics. The event aims to lead, convene, and connect local and neighboring hacker and information security friends for an open discussion on strong cryptography, become advocacy outlet for privacy, and strive for the betterment of education of the general public in a diligent, loyal, honest manner, and not knowingly be part of any illegal or improper activities.
If you want to learn more about convergence of technology & digital policy, join Dr. Amit Elazari, J.S.D and Chris H. at Resilient Cyber podcast.
Dr. Elazari previously served as the Head of Cybersecurity Policy for Intel Corporation and has spoken and presented at various industry conferences, journals and outlet.
If you want to learn more about what #generativeAI means from a national security, cyber, U.S. competitiveness, regulatory, and policy perspective with some of the best experts, press the learn more botton.
Dr. Amit Elazari covered some insights which Openpolicy are considering:
- Why should investors and startups care (unicorns including) about AI Policy
- What can innovative entities do and where can they find relevant information on future market requirements
- How should the U.S. act to avoid pitfalls from a national and economic security lens
- The uniqueness of Gen-AI from tech policy lens in terms of positive and negative externalities impact!
Real-Time Hands-On Self-Service POV's of Cybersecurity productsץ
Security is one of the most evolving and impactful landscapes in the regulatory sphere. Proposed initiatives in the areas of Incident Response, Software and Product Assurance, Coordinated Vulnerability Disclosure (CVD), and IoT or Connected Products Regulations are among the most active and developing areas of security policy around the world. This evolving landscape also serves as an opportunity for innovation and research collaboration. Elazari walked us through some of the most recent trends in policy proposals shaping the future of security. We also talked about bug bounties and vulnerability disclosure, what are some of the industry's best practices in this area, how to implement these programs to foster security, collaboration and transparency, and how this connects to the policy momentum and its impact on security researchers.
The event featured Amit Elazari, Director, Global Security Policy at Intel Corporation and Cristin Goodwin, Assistant General Counsel for Cybersecurity and Digital Trust at Microsoft, for a conversation on recent trends in the landscape of international digital security policy amid Covid-19.
The pair discussed how the attack landscape is evolving, how governments and policymakers are responding to these rapid changes from a cybersecurity policy, legal, and regulatory lens, as well as how the global pandemic crisis impacts the (immediate and longer-term) horizons of the global security law and policy landscape. Elazari and Goodwin accepted pre-submitted and live audience questions before giving their closing thoughts.
In the 15th Web Hacking Pro Tips, Dr. Amit Elazari discussed about bug bounty legalities, specifically:
- What is safe harbor and why it matters
- What the DMCA and CFAA are
- Why having a bounty program isn't enough of a legal protection
- The Department of Justice's disclosure policy framework
- How hackers should should approach program policies