You are cordially invited to a one-day seminar on the topic of

Threat Intelligence and Legal Constraints on Cyber Operations

including presentations on
Threat Intelligence
with Paul Davis, former senior counterintelligence analyst for the U.S. government

and
The International Legal Constraints on Cyber Operations
with Ethan S. Burger, a Washington-based international legal consultant and educator

Thursday, January 23, 2020
7:30 AM-5:30 PM

The Institute of World Politics
1521 16th Street NW
Washington, D.C.
Parking

Cost: $1,000 per person
20% discount when you register for all five seminars.

Register

Threat Intelligence

This seminar introduces threat analysis and cyber threat analysis as a function of government and business threat intelligence. It is a primer on methods and means of cyber intrusion in an attempt to garner information and how to detect and mitigate the impact. It will provide an understanding of intelligence gathering and the intelligence cycle, and it will bridge the traditional intelligence tradecraft methods and how they are used in cyber threat intelligence.

Instructor: Paul Davis

Mr. Davis is the owner of JANUSThink, an IT innovation consulting firm, and he serves as the VP of Business Development. He has over 30 years of combined business and intelligence operations experience. His intelligence work began as a tactical military intelligence analyst concentrating on the Soviet Union, followed by North Korea and the Middle East. Mr. Davis was a senior counterintelligence analyst for the U.S. government and has been a consultant on numerous vertical areas and has then published a number of reports. Mr. Davis consults with several small businesses and writes a number of articles for foreign and domestic outlets on issues ranging from foreign policy to politics.

The International Legal Constraints on Cyber Operations

Cyber capabilities have fundamentally changed the nature of international “armed” conflict but have not done away with the underlying principles of international law. While there is general agreement that long-standing international legal principles and norms of armed conflict survive technological change, there is no consensus among experts about how these rules apply to cyber operations.

This session will provide an overview of issues such as:

Sovereignty
Prohibition of intervention
The use of force
Attribution
Cyber espionage
International humanitarian law
The discussion examines the interplay between the use of offensive cyber-capability and international law that national security managers must understand.

Instructor: Ethan S. Burger, Esq.

Ethan S. Burger is a Washington-based international legal consultant and educator. His areas of interest include corporate governance, transnational crime (corruption, cybercrime, and money laundering), and Russian affairs. After working as an attorney on Russian commercial, investment, and risk issues, he segued into academic, research, and advisory roles https://www.linkedin.com/in/ethansb/). He has taught at Vilnius University about cybersecurity issues while on a Fulbright Foundation grant and participated in the NATO Cooperative Cyber Defence Centre of Excellence’s seminar on the international law governing cyber operations. He received his undergraduate degree from Harvard University and J.D. from the Georgetown University Law Center.

Request more info Other seminars in this seriesRegister