nationalsecuritylaw Upcoming event: Cybersecurity at Roger Williams June 17-20

Upcoming event at Roger Williams (Newport, RI):

Cyber Threats and Cyber Realities: Law, Policy, and Regulation in Business, the Professions and National Security

From June 17-20, Roger Williams University will host an Institute in beautiful Bristol, Rhode Island on the legal and policy landscape of cyber risks, foreign and domestic. Cybersecurity has recently taken center stage for government, business, and the professions. Former Defense Secretary Leon Panetta warned last fall about the prospect of a “cyber Pearl Harbor.” A cyber security firm recently traced back to a Chinese government agency a wave of cyber intrusions that harvested information about U.S. critical infrastructure. Cyber crime has also proliferated, through burgeoning efforts to steal trade secrets, undermine privacy and confidentiality in health care and legal data, and defraud unknowing consumers through trafficking in misappropriate passwords. While cyber is increasingly important, only a few experts and practitioners have a working knowledge of how cyber interacts with law, policy, and regulation. Cyber Threats and Cyber Realities fills that gap.

Cyber Threats and Cyber Realities, jointly sponsored by the Roger Williams University School of Law and School of Justice Studies, will be an interactive forum with nationally known experts and practitioners on cyber law, policy, and regulation. Organized in two two-day modules, attendees will learn about domestic law and policy on June 17-18, and international law and national security on June 19-20. In addition to informative panels, each module will include as a capstone experience a simulation that offers participants an opportunity to collaborate in resolving a regulatory challenge or national security crisis.

Attendance in the event is open to lawyers, law enforcement personnel, health-care administrators, corporate employees, legal and other academics, and J.D. and other graduate and undergraduate students. A CLE application (including all-important Ethics credit) is pending. Roger Williams J.D. students can get one academic credit for each module, or two credits for completing both (including an exam). School of Justice Studies students may use participation in the conference as part of a for-credit directed research project. J.D. and other students from other institutions should consult with their schools regarding credit eligibility. Students who get at least one credit will also receive a certificate showing their completion of a course of study in cybersecurity.

Costs: For lawyers, other professionals, and students not seeking academic credit: $150/day, $275/two-day module, $475 for all four days. J.D. and other RWU students will pay standard tuition per credit; students at other schools should consult their own institution.

For more information, contact Events Office at or call (401)254-4659.

Preliminary schedule:



9:00 a.m.: Cyber Risks in the Domestic and International Realms

Dr. John Savage, Brown University

Timothy Edgar, Fellow, Watson Institute for International Studies, Brown University (formerly Director of Privacy and Civil Liberties, White House National Security Staff)

10:30 a.m.: Cyber and Privacy Threats

Linn Foster Freedman, Nixon Peabody

Theresa Murray, former Director, Rhode Island Emergency Management Association

Dr. Doug White, Roger Williams University School of Criminal Justice

1:00 p.m.: Intellectual Property and Torts:

Prof. Zoe Argento, Roger Williams University School of Law

Prof. Michael Rustad, Suffolk University School of Law (invited)

3:00 p.m.: Legal Ethics and Preventing Cyber Threats to Client Secrets

Prof. Peter Margulies, Roger Williams University School of Law

Linn Foster Freedman, Nixon Peabody


9:00 a.m.: Domestic Regulation of Cyber Security: The Legislative Outlook and Policy Landscape

Paul Rosenzweig, Esq. (formerly Dep’t of Homeland Security)

Allan Friedman, Brookings Institution

Jonathan Schneider, Stinson Morrison Hecker LLP

Prof. Nathan Sales, George Mason University School of Law

10:30 a.m.: Cyber Crime: Constitutional Limits and the Reach of Federal Law

Prof. Mary-Rose Papandrea, Boston College School of Law (invited)

Prof. Victor Hansen, New England Law School

1:00 p.m.: Simulation: Threading the Needle: Passing a Federal Cyber Regulation Statute

4:00 p.m.: Conclusion


Wednesday, June 19,

9:00 a.m.: The Global Threat Environment:

Col. James G. Bitzes, USAF, Cyber Com Staff Judge Advocate (invited)

Col. Gary Brown, USAF (Ret.), Deputy Legal Director, International Committee of the Red Cross (ICRC) Regional Delegation for the U.S. and Canada

10:30 a.m.: The Organizational Structure of Responses to Cyber Threats:

Paul Rosenzweig, Esq. (formerly Dep’t of Homeland Security)

Allan Friedman, Brookings Institution

Prof. Nathan Sales, George Mason University School of Law

1:00 p.m.: The Use of Force in the Cyber Context

Prof. Michael N. Schmitt, Chair, International Law Department, U.S. Naval War College

Prof. Laurie Blank, Emory University School of Law (invited)

3:00 p.m. The Conduct of War and Cyber Operations

Gary Brown, ICRC

Prof. Michael N. Schmitt, Naval War College


9:00 a.m.: Cyber Attacks and International Human Rights:

Glenn Sulmasy, Chair, Humanities Department, U.S. Coast Guard Academy

Dr. Michael C. Fowler, Adjunct Professor, Roger Williams University (invited)

10:30: Legal Ethics and Cyber Defense:

Maj. Gen. Charles J. Dunlap, Jr. USAF (Ret.), Director, Center for Law, Ethics, and National Security, Duke University School of Law (invited)

Prof. Peter Margulies, Roger Williams

1:00 p.m.: Simulation: A Cyber Pearl Harbor: Threats and Responses

4:00 Conference Conclusion

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: