Cornell University

This two-day workshop aims to center analysis of the people, organizations and work that ultimately make and break cybersecurity. However, it aims to do so in a way that bridges the gap between two very different kinds of methods and theoretical perspectives: science and technology studies, which tends to adopt a grounded and “bottom-up” approach to analysis; and international relations, which tends to take more of a “top-down” approach that centers nation-states and the international system.

SCHEDULE

THURSDAY, JUNE 16 - 9:45 am - 5:00 pm (ET)

9:45—10:15 am Welcome and Lightning Round
Workshop participants will be asked to introduce themselves in 1-2 minutes.


Panel 1 -10:15 – 12:15 PM THREATS
Chair: Sarah Kreps, Cornell University
Discussant: Frank Smith, Naval War College


Whose Expertise? The Static, Contingent, and Recursive Strategies of Malware Analysis and Detection
Andrew Dwyer, Durham University

Dark champions: The Emergence of Commercial Cyber Threat Intelligence in Great Power Competitor States
JD Work, Columbia University

The Making of Cyber(in)security: Sociotechnical Practices and Anticipation of Future Threats
Lilly Muller, Kings College London

Protest, Police, and the Sociotechnical Construction of Threat
Jason Ludwig and Rebecca Slayton, Cornell University

Panel 2 -1:15 – 2:45 PM HACKERS
Chair: Rebecca Slayton, Cornell University
Discussant: Jesse Sowell, University College London


The Hack-and-Leak
Gabriella Coleman, Harvard University

Computer Security and Its Discontents: The Anti-Security Movement, 2000 – 2002
Matt Goerzen, Harvard University

Bounty Everything: Hackers and the Making of the Global Bug Marketplace.
Ryan Ellis, Northeastern University; Yuan Stevens

Panel 3 - 3:30-5:00 PM MATERIALITY
Chair: Lilly Muller, Cornell University
Discussant: Aaron Gluck-Thaler, Harvard University


The Casual Counterfeiter in the Age of Desktop Publishing
Gili Vidan, Cornell University

Black sites: cybersecurity expertise and digital absence
James Shires, Leiden University

The Blurry Lines Between Operations and Information
Clare Stevens, Bristol University

FRIDAY, JUNE 17, 9:30 am-1:30 pm (ET)
Chair: Lilly Muller, Cornell University
Discussant: Jon Lindsay, Georgia Tech 

Panel 1 - 9:30 am-11:30 am ORGANIZATIONS
The Technopolitics of Cybersecurity Incident Response
Rebecca Slayton and Frank Smith

Collective Resistance in the Digital Domain: An Exploratory Case Study of the Cyber Partisans
Max Smeets, ETH Zurich

Global Innovation, Knowledge Management, and Cybersecurity: UK Universities as a Case Study
Madeline Carr, University College London

Operational Epistemic Authorities in the Internet's Infrastructure
Jesse Sowell, University College London

12:30 - 1:30 pm FUTURE DIRECTIONS
Open discussion of research gaps and next steps

SPONSORED BY
Reppy Institute for Peace and Conflict Studies
Mario Einaudi Center for International Studies
U.S. National Science Foundation Award # 1553069.

Register here : https://cornell.zoom.us/meeting/register/tJwpd-yvqz4oE9Ld5SDfXOhPZkxFpCiJoGZ

0 people are interested in this event

User Activity

No recent activity