Episodes
As the world becomes increasingly urban and digital, smart cities are emerging as ground-zero for new approaches to development and governance. On Thursday, January 23rd, CSIS will convene a diverse panel of experts to distinguish between leading smart city models and discuss how their technologies, including in the areas of public safety and surveillance, are impacting the power of citizens, governments, and corporations, both within and between countries.  Featuring keynote remarks by: ...
Published 01/23/20
As the world becomes increasingly urban and digital, smart cities are emerging as ground-zero for new approaches to development and governance. On Thursday, January 23rd, CSIS will convene a diverse panel of experts to distinguish between leading smart city models and discuss how their technologies, including in the areas of public safety and surveillance, are impacting the power of citizens, governments, and corporations, both within and between countries.  Featuring keynote remarks by: ...
Published 01/23/20
Please join the Center for Strategic and International Studies for a Smart Women, Smart Power and Aerospace Security Project conversation with former NASA Space Shuttle Commander Pam Melroy. She will discuss innovation and the role of government in commercial space and the importance of international partnerships and collaboration in space. Colonel Melroy (USAF, ret.) is currently Chief Executive Officer at Melroy & Hollett Technology Partners. She is a retired Air Force test pilot and...
Published 01/14/20
Please join the Center for Strategic and International Studies for a Smart Women, Smart Power and Aerospace Security Project conversation with former NASA Space Shuttle Commander Pam Melroy. She will discuss innovation and the role of government in commercial space and the importance of international partnerships and collaboration in space. Colonel Melroy (USAF, ret.) is currently Chief Executive Officer at Melroy & Hollett Technology Partners. She is a retired Air Force test pilot and...
Published 01/14/20
Digital technologies are creating new challenges for law enforcement agencies around the world. Cybercrime is proliferating due to the growing sophistication of online criminal networks and the difficulties of trans-national enforcement. Investigations of traditional crimes are also becoming more difficult as encryption, ephemerality, and other technical measures create obstacles for accessing digital evidence. This event will examine how global cooperation can help to address these issues in...
Published 12/05/19
Digital technologies are creating new challenges for law enforcement agencies around the world. Cybercrime is proliferating due to the growing sophistication of online criminal networks and the difficulties of trans-national enforcement. Investigations of traditional crimes are also becoming more difficult as encryption, ephemerality, and other technical measures create obstacles for accessing digital evidence. This event will examine how global cooperation can help to address these issues in...
Published 12/05/19
Digital technologies are creating new challenges for law enforcement agencies around the world. Cybercrime is proliferating due to the growing sophistication of online criminal networks and the difficulties of trans-national enforcement. Investigations of traditional crimes are also becoming more difficult as encryption, ephemerality, and other technical measures create obstacles for accessing digital evidence. This event will examine how global cooperation can help to address these issues in...
Published 12/05/19
On this episode of The Technology Policy Podcast, Jim Lewis sits down with David Hanke, one of the intellectual architects of the Foreign Investment Risk Review Modernization Act (FIRRMA). FIRRMA strengthened and modernized the Committee on Foreign Investment in the United States (CFIUS) in order to better address the national security concerns associated with certain foreign investment transactions. They discuss Hanke’s work on FIRRMA as a lead policy advisor to Sen. John Cornyn; the...
Published 11/22/19
On this episode of The Technology Policy Podcast, Jim Lewis sits down with David Hanke, one of the intellectual architects of the Foreign Investment Risk Review Modernization Act (FIRRMA). FIRRMA strengthened and modernized the Committee on Foreign Investment in the United States (CFIUS) in order to better address the national security concerns associated with certain foreign investment transactions. They discuss Hanke’s work on FIRRMA as a lead policy advisor to Sen. John Cornyn; the...
Published 11/22/19
On this episode of The Technology Policy Podcast, Jim Lewis sits down with David Hanke, one of the intellectual architects of the Foreign Investment Risk Review Modernization Act (FIRRMA). FIRRMA strengthened and modernized the Committee on Foreign Investment in the United States (CFIUS) in order to better address the national security concerns associated with certain foreign investment transactions. They discuss Hanke’s work on FIRRMA as a lead policy advisor to Sen. John Cornyn; the...
Published 11/22/19
On this episode of The Technology Policy Podcast, Jim Lewis sits down with David Hanke, one of the intellectual architects of the Foreign Investment Risk Review Modernization Act (FIRRMA). FIRRMA strengthened and modernized the Committee on Foreign Investment in the United States (CFIUS) in order to better address the national security concerns associated with certain foreign investment transactions. They discuss Hanke’s work on FIRRMA as a lead policy advisor to Sen. John Cornyn; the...
Published 11/22/19
This episode explores Europe’s evolving approach toward including Chinese telecommunications companies in its 5G infrastructure. Our guest, Dr. Janka Oertel, explains the security risks behind allowing Chinese companies like Huawei and ZTE to supply 5G technology to Europe, as well as the potential economic and political risks of shutting them out. Dr. Oertel also describes how Europe’s attitude toward Chinese technology differs from other countries like the US and Japan, and assesses the...
Published 11/20/19
This episode explores Europe’s evolving approach toward including Chinese telecommunications companies in its 5G infrastructure. Our guest, Dr. Janka Oertel, explains the security risks behind allowing Chinese companies like Huawei and ZTE to supply 5G technology to Europe, as well as the potential economic and political risks of shutting them out. Dr. Oertel also describes how Europe’s attitude toward Chinese technology differs from other countries like the US and Japan, and assesses the...
Published 11/20/19
This episode explores Europe’s evolving approach toward including Chinese telecommunications companies in its 5G infrastructure. Our guest, Dr. Janka Oertel, explains the security risks behind allowing Chinese companies like Huawei and ZTE to supply 5G technology to Europe, as well as the potential economic and political risks of shutting them out. Dr. Oertel also describes how Europe’s attitude toward Chinese technology differs from other countries like the US and Japan, and assesses the...
Published 11/20/19
This episode explores Europe’s evolving approach toward including Chinese telecommunications companies in its 5G infrastructure. Our guest, Dr. Janka Oertel, explains the security risks behind allowing Chinese companies like Huawei and ZTE to supply 5G technology to Europe, as well as the potential economic and political risks of shutting them out. Dr. Oertel also describes how Europe’s attitude toward Chinese technology differs from other countries like the US and Japan, and assesses the...
Published 11/20/19
Steve Grobman is Senior Vice President and Chief Technology Officer at McAfee. In this role, he sets the technical strategy and direction to create technologies that protect smart, connected computing devices and infrastructure worldwide. Grobman leads McAfee’s development of next generation cyber-defense and data science technologies, threat and vulnerability research and internal CISO and IT organizations. Prior to joining McAfee, he dedicated more than two decades to senior technical...
Published 10/30/19
Steve Grobman is Senior Vice President and Chief Technology Officer at McAfee. In this role, he sets the technical strategy and direction to create technologies that protect smart, connected computing devices and infrastructure worldwide. Grobman leads McAfee’s development of next generation cyber-defense and data science technologies, threat and vulnerability research and internal CISO and IT organizations. Prior to joining McAfee, he dedicated more than two decades to senior technical...
Published 10/30/19
Steve Grobman is Senior Vice President and Chief Technology Officer at McAfee. In this role, he sets the technical strategy and direction to create technologies that protect smart, connected computing devices and infrastructure worldwide. Grobman leads McAfee’s development of next generation cyber-defense and data science technologies, threat and vulnerability research and internal CISO and IT organizations. Prior to joining McAfee, he dedicated more than two decades to senior technical...
Published 10/30/19
Steve Grobman is Senior Vice President and Chief Technology Officer at McAfee. In this role, he sets the technical strategy and direction to create technologies that protect smart, connected computing devices and infrastructure worldwide. Grobman leads McAfee’s development of next generation cyber-defense and data science technologies, threat and vulnerability research and internal CISO and IT organizations. Prior to joining McAfee, he dedicated more than two decades to senior technical...
Published 10/30/19
There are deep interconnections between the U.S. and Chinese economies, and China has built its technology base on what it has acquired from the West. China’s government and some Chinese companies will use any means, legal or illegal, to acquire technology. The United States’ relationship with China cannot continue unchanged, but given the interconnections, change must be managed carefully. This event will focus on how the U.S. can modernize its technology transfer policies to manage risks...
Published 10/29/19
There are deep interconnections between the U.S. and Chinese economies, and China has built its technology base on what it has acquired from the West. China’s government and some Chinese companies will use any means, legal or illegal, to acquire technology. The United States’ relationship with China cannot continue unchanged, but given the interconnections, change must be managed carefully. This event will focus on how the U.S. can modernize its technology transfer policies to manage risks...
Published 10/29/19
There are deep interconnections between the U.S. and Chinese economies, and China has built its technology base on what it has acquired from the West. China’s government and some Chinese companies will use any means, legal or illegal, to acquire technology. The United States’ relationship with China cannot continue unchanged, but given the interconnections, change must be managed carefully. This event will focus on how the U.S. can modernize its technology transfer policies to manage risks...
Published 10/29/19
There are deep interconnections between the U.S. and Chinese economies, and China has built its technology base on what it has acquired from the West. China’s government and some Chinese companies will use any means, legal or illegal, to acquire technology. The United States’ relationship with China cannot continue unchanged, but given the interconnections, change must be managed carefully. This event will focus on how the U.S. can modernize its technology transfer policies to manage risks...
Published 10/29/19