The Geopolitics of Cybersecurity
Event date
This symposium convenes senior government officials and experts from think tanks, academia, and the private sector to address the interaction of cyber conflict and foreign policy goals, examining the current state of Russian, Chinese, Iranian, and North Korean cyber operations, as well as how the United States is responding and its own vulnerability to cyberattacks as a symptom of a broken geopolitical order.
Click here to download the full agenda for the symposium.
In-Person Keynote Session: A Conversation With Chris Inglis
Speaker
- Chris InglisNational Cyber Director, Executive Office of the President
Presider
- David E. SangerWhite House and National Security Correspondent, New York Times; CFR Member
Introductory Remarks
- Adam SegalIra A. Lipman Chair in Emerging Technologies and National Security and Director of the Digital and Cyberspace Policy Program, Council on Foreign Relations (via videoconference)
Transcript
SEGAL: Good morning. I am Adam Segal. I am the Ira A. Lipman Chair in Emerging Technologies and National Security and director of the Council’s Digital and Cyberspace Policy Program.
I’m just going to take a brief moment to welcome you all to today’s event. I think it is extremely exciting that this is the first D.C. symposium in person, although I am, obviously, not there to enjoy it with you. But this is the eighth Cyber Symposium that we’ve had. The last three not surprisingly, have focused on great powers and geopolitical competition in cyber, but in the past we’ve also covered online content moderation, deepfakes, internet governance, and privacy and international trade.
I hope all of you will take part and consider subscribing to some of the other products from the Digital and Cyberspace Policy Program. You’ll check out the Cyber Operations Tracker, which is the running track of known state-based attacks. And unfortunately, of course, we are adding to those at quite a pitch given what’s happening in the world these days. But also, subscribe to Net Politics, the blog of the Digital and Cyberspace Policy Program, as well as our newsletter.
I do want to thank...
Virtual Session II: Cybersecurity by Other Means—Diplomacy and Deterrence
Speakers
- Emily HardingDeputy Director and Senior Fellow, International Security Program, Center for Strategic and International Studies
- John HultquistVice President, Intelligence Analysis, Mandiant
- Max SmeetsSenior Researcher, Center for Security Studies, ETH Zurich; Director, European Cyber Conflict Research Initiative; Author, No Shortcuts: Why States Struggle to Develop a Military Cyber-Force (via videoconference)
Presider
- Camille A. StewartGlobal Head, Product Security Strategy, Google; CFR Term Member
Transcript
STEWART: All right. Good afternoon, everyone. Thanks for joining us. I have the pleasure of presiding over this conversation about diplomacy and deterrence and we’re going to get started today by having our panelists introduce themselves.
My name is Camille Stewart. I’m the global head of product security strategy at Google, where I sit at the intersection of our product security teams and our central security team, and I have worked across government and private sector on cybersecurity issues for a number of years.
HARDING: I’m Emily Harding. I am the deputy director of the International Security Program at the Center for Strategic and International Studies, which is a very long title that just means that I get to oversee the work of about 50 scholars doing tremendous work in intelligence, defense, and tech policy. Before that I spent almost two decades working in the federal government, both in the Senate in the Senate Intelligence Committee and then in the intelligence community, and a couple years at the White House.
HULTQUIST: I’m John Hultquist. I’m from Mandiant’s intelligence analysis shop. We, you know, look at threats from all over the world using our incident response and our—you know, a dozen...



