Cyber Dialogue & Related Events

Cybersecurity Speakers

The Disconnect between Cyber Policy and Technology

With Dr. Kamal Jabbour, Senior Scientist for Information Assurance, Information Directorate, Air Force Research Laboratory (Rome, NY)

Syracuse Law | Nov. 28, 2016

kamal_jabbour-112816Dr. Kamal Jabbour spoke at Syracuse Law on Nov. 28, 2016, about the disconnect between cyber policy and technology in the US. Cyber policy, says Jabbour, is out of step with techniques that could actually ensure the integrity and security of computer information. Policy, he says, remains stuck on out-dated security concepts—such as protecting physical objects (computers, processors), scanning thousands of lines of code for malware, and socially engineering “dumb users”—rather than on assurance techniques that look at computer instructions as mathematical equations, the way Alan Turing and others did when inventing the concept of computer code. When considered as equations, computer instructions can be encrypted, quantized, ephemeral, or custom-made—thus foiling the would-be attacker. Cybersecurity policymakers ideally should have 35 hours of higher level mathematics training before tackling national policy, Jabbour says, but given that that is a difficult requirement to seek, policymakers, lawyers, and computer engineers must work more closely together on security, integrity, and assurance techniques that actually work.

Cyber Dialogue Speaker Series

Promise & Risk: National Security & Digital Infrastructure (2011)

Syracuse University | March 10-April 21, 2011

Cyberspace presents both immense promise and grave risk. The same technology that provides new opportunities for economic growth and for the free exchange of ideas worldwide also enables new threats. According to the White House, the status quo is no longer acceptable, and the national dialogue on cybersecurity must begin today. Syracuse University joins this dialogue, holding a four-part series of luncheon discussions co-sponsored by the Institute for National Security and Counterterrorism (INSCT) and the Center for Information and Systems Assurance and Trust (CISAT).

The Bit Stops Here: Accountability Mechanisms in Cyber Space
National Strategy for Trusted Identities in Cyberspace: Securing the Internet or Attacking Civil Liberties?
Anonymity in Cyberspace: Promoter of Democracy or Shield for Criminals?

Cyber Roundtable: Recommendations for the National Strategy for Trusted Identities in Cyberspace

Syracuse University | Sept. 3, 2010

In September 2010, INSCT and the Center for Information and Systems Assurance and Trust (CISAT), both headquartered at Syracuse University, held a roundtable discussion of the Obama Administration’s recently published National Strategy for Trusted Identities in Cyberspace. The event brought together legal and technical experts, experts in management and public communications, and officials from JPMorgan Chase and Co.

Working Paper


  • William C. Banks, Moderator, Director, INSCT
  • Shiu-Kai Chin, Professor, SU Department of Electrical Engineering and Computer Science and Director, Center for Information and Systems Assurance and Trust (CISAT)
  • Kevin Du, Associate Professor, L.C. Smith College of Engineering and Computer Science, Syracuse University
  • Lisa A. Dolak, Professor of Law, SU College of Law; Associate Director of the Center on Property, Citizenship, and Social Entrepreneurism; and Associate Director, Institute for the Study of the Judiciary, Politics and the Media
  • Randy Elder, Senior Associate Dean, Whitman School of Management, Syracuse University
  • David M. Rubin, Professor and Former Dean, Newhouse School of Public Communications, Syracuse University
  • William Snyder, Visiting Assistant Professor, SU College of Law
  • Jeffrey M. Stanton, Associate Dean for Research and Doctoral Programs and Associate Professor, School of Information Studies, Syracuse University


In simplest terms, the use of strong identification by all actors on the Internet would make the cyber realm sufficiently trusted for commercial activities and make it far more difficult for criminals and terrorists to operate with impunity.  At the same time, it would far more than simply risk chilling free speech; in many countries the government could use the identification data to literally kill dissent.

Read More

InfraGard Conference on Cyber Security (2010)

Syracuse University | Sept. 24, 2010

A joint conference of the Albany, Buffalo, and Rochester InfraGard Member Alliances. The three alliances are part of the InfraGard National Members Alliance, which provides a trusted forum for exchanging knowledge, experience, and information to help protect our nation’s infrastructure from both physical and cyber threats. The goal of this conference is to build partnerships with the private sector, academia, law enforcement, and Upstate New York InfraGard Member Alliances and to educate attendees on current tools, technologies, and trends in computer forensic investigations.


Infragard has partnered with INSCT, the Center for Advance Systems and Engineering at Syracuse University, and SRC, Inc. to bring together leaders, policymakers ,and academics engaging in various aspects of cybersecurity.


Read More