[As a courtesy to Politech readers, Scientific American generously has 
offered list members three complimentary tickets to this conference. Laura 
Salant has said the *first three* Politech members to call the number below 
will get the complimentary tickets. Please do not respond to this message 
(I have nothing to do with the event). If you call too late for the free 
admission, Politech members still qualify for the two-thirds off offer. 
Good luck. --Declan]

---

Date: 26 Feb 2002 15:18:07 -0500
From: "Laura Salant" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>

--- ** Join The Summit on Privacy, Security and Safety ** -----
March 5 - 6th, Plaza Hotel, New York, NY

** Exclusive Online Offer--66% off--only $500 for full conference pass
** Call Now and mention password "SCIAM" - 914-245-7764

Be the first to examine the impact of the war against terrorism on
privacy and security. Focusing on the global concerns of the private
and public sectors, the forum will cover topics such as
technologies for the new framework, security in private sectors,
vulnerabilities in financial services, bioterrorism, tracking terror,
biosurveillance, medical privacy and much more.

===== Speakers include:
Senator Robert Bennett, R. James Woolsey (Former CIA Director),
Congressman Sherwood Boehlert (Chairman of the House Science
Committee), Marc Rotenberg (EPIC), John Rennie (Scientific American
Editor in Chief), along with representatives from IBM, Deutsche Bank,
EDS, Citigroup, Visa, DaimlerChrysler, the Council for Foreign
Relations, Brookings Institution, The New York Times, Newsweek and
Yale University.

Find out more at: http://www.globalprivacysummit.net/

** Register Now and mention password "SCIAM" - 914-245-7764

---

http://www.globalprivacysummit.net/Pages/sessions.html
Message-Id: <[EMAIL PROTECTED]>

    Program Topics

      Session I
    Privacy, Cyber Security and Safety in the Private Sector. The impact
    of the September attacks has touched every aspect of our life and
    nowhere is that transformation more keenly felt than in private
    enterprise. Government access to business transactions databases and
    banking have emerged as key weapons in the war against terrorism.
    Furthermore, The Patriot Act imposes new responsibilities on business,
    including alerting authorities about the suspicious behavior of both
    customers and employees. Transforming security policy to an IT
    infrastructure is a complex task. Session speakers will discuss the
    systems and emerging technologies that are providing the technological
    solutions to this task. The session will explore successful
    strategies, methodologies and emerging technologies that are being
    used to transform security requirements into robust, effective
    programs.

    Session II
    Trust but Verify: Vulnerabilities and Solutions in Financial Services.
    Trust continues to be the most important attribute of the financial
    services industry, with consumers continuing to want their financial
    information to be available on demand and easy to access. Above all,
    they want these services to be provided in safe, sound private and
    secure ways. Yet concern about the vulnerabilities of the Internet has
    been heightened by recent events and evidence of criminal activities
    such as identity theft and money laundering. Transaction security,
    infrastructure security and asset protection are essential in
    financial services. Industry leaders will discuss what they are doing
    to sustain consumer confidence and how they ensure the soundness,
    privacy and security of financial transactions while focusing on
    customers as a foundation for innovative business strategies.

    Session III
    The New Framework: The U.S. Perspective. Have the imperatives of the
    war on terrorism caused the need for a whole new framework for data
    protection among the democratic allies? While privacy may not be an
    absolute right, the open exchange of ideas is critical to the
    continued growth of the information economy and the protection of
    citizens' basic rights in any democratic society. Across the globe,
    governments are challenged to adopt the policies and roles that are
    most likely to guarantee freedom of expression, sustain economic
    growth, and protect the safety and security of citizens. The session
    speakers -- composed of global regulators, executives of multinational
    companies and international experts -- will examine these challenges,
    advance solutions and discuss international standards that ensure the
    safety of citizens as well as protect privacy in a world of
    trans-border data flows.

    Session IV
    Individual Privacy and Public Safety: Reconciling Competing Human
    Values. At the heart of the present debate is the protection of human
    rights and civil liberties, including privacy, and the erosion of
    those rights in the name of public safety. Justice Louis Brandeis
    described privacy as "the most comprehensive of all rights and the one
    most cherished by a free people", yet while privacy is recognized in
    the EU as a human right, there is no right to privacy in the
    Constitution. Privacy must be balanced against competing interests
    such as public safety. The current debate about privacy is not so much
    about a legal or technical concept as a social one. The critical
    question about the protection of civil liberties and public safety in
    the 21st century is the same as it has always been -- namely, whom
    should you trust?

    Session V

    Part I: Bioterrorism: Lessons Learned from Dark Winter. In July 2001
    CSIS CEO John Hamre and former senator Sam Nunn outlined the results
    of a war game that simulated a biological attack on American soil
    before the House Subcommittee on National Security, Veterans Affairs,
    and International Relations. Among the findings:
      * An attack on the United States with biological weapons could cause
        massive civilian casualties, breakdown in essential institutions,
        civil disorder, loss of confidence in government and reduced U.S.
        strategic flexibility.
      * The U.S. Government currently lacks adequate strategies, plans and
        information systems to manage a crisis of this type or magnitude.
      * Public health is now a major security issue.
      * Containing the spread of a contagious disease delivered as a
        bioweapon will present significant ethical, political, cultural,
        operational and legal challenges.

    In October 2001 the United States suffered its first confirmed
    experience of biological warfare with the anthrax attack. Our
    panelists -- all of who were participants in the original Dark Winter
    -- will review where we are now in terms of preparedness and what has
    been learned since the original exercise.

    Part II: Tracking Terror -- Biosurveillance and Medical Privacy. While
    early detection can save lives and that the U.S. public health system
    is currently unprepared and ill equipped to respond quickly and
    decisively to biological attacks. Biosurveillance -- using smart
    systems to sift through data and look for connections through access
    to medical records -- can find connections not readily apparent to
    human beings, but it is a massive undertaking. It will require
    coordination of the health care system at a national level. It will
    also require that we calculate the right balance between safety and
    privacy. How will the US health care system respond to these new
    public health imperatives? Will these requirements further erode
    patient/physician trust? Is there a technological solution capable of
    meeting the apparently contradictory requirements of HIPAA and public
    health?

    Session VI
    Meeting the Clear and Present Danger: Critical Infrastructure
    Protection and Technology. We have been warned that we need to defend
    our national infrastructure against the threat of a "digital Pearl
    Harbor." Americans have been alerted that cyberattacks may be part of
    the terror arsenal. Dependence on information and communications
    infrastructure has created new cyber-vulnerabilities. Electronic
    transfers of money, distribution of electrical power, response to
    emergency services and military command and control are all at risk.
    If not the weapons of mass destruction, these cyberthreats are
    certainly weapons of mass disruption. No computer is immune from
    denial of service attacks. Furthermore most of the cyberworld is in
    private hands, making a unified defense difficult. This session will
    discuss these challenges as well as the requirements of more secure
    technologies and the emergence of new public/private partnerships to
    meet these threats.

    Session VII
    It's Not Just about the Technology... In a world that is witnessing a
    transition from consumer/business privacy issues to citizen/privacy
    issues, technology can only provide a partial solution to what is
    essentially a human dilemma. However, new technologies that ensure
    privacy need not be a threat to public safety. Technical tools are
    definitely part of the mix of institutional, procedural and technical
    safeguards, for both privacy and security. Speakers will discuss the
    strategic implications of recent technologies, including those that
    support security and public safety in the private sector.

---




-------------------------------------------------------------------------
POLITECH -- Declan McCullagh's politics and technology mailing list
You may redistribute this message freely if you include this notice.
Declan McCullagh's photographs are at http://www.mccullagh.org/
To subscribe to Politech: http://www.politechbot.com/info/subscribe.html
This message is archived at http://www.politechbot.com/
-------------------------------------------------------------------------

Reply via email to