
01:03:40
Hi, U of M Center for Information Assurance

01:04:47
Hi

01:05:33
Miami or Michigan or Minnesota or...

01:12:02
Hi, Brandy

01:21:36
Hi, Anastacia

01:22:14
Hello Michael, Sorry had to login and logout real quick because my University Zoom was still logged in.

01:22:54
Understand. Adrian Lauf is our coordinator for today (best gear) so he can handle the slide show permissions

01:23:13
Excellent

01:27:34
Apologies for the delay, University of Memphis

01:28:03
Hi Everyone, greetings from Seattle

01:28:31
Don’t worry! CAE Forum does not start until 1pm ET. So you are early!

01:29:26
Hi, Memphis and Simon C.!

01:30:39
Hi Michael

01:30:57
1:10* It starts at 1:10pm

01:32:50
University of Louisville, Louisville, KY

01:32:55
City University of Seattle, Seattle WA

01:33:08
All materials regarding today’s talks will be available at https://www.caecommunity.org/resources/cae-forum-resources. If you have any questions or if you would like to participate as a speaker, please email us at caeforum@caecommunity.org.

01:35:02
Hi, Colleague Haddad!

01:38:29
Do not hear audio on phone. No picture on the screen either.

01:39:52
And hello to you all. We look forward to this discussion and your thoughts/questions/fears/solutions to this interplay of law and cyber security.

01:40:16
yes

01:40:19
yes

01:40:19
Yes

01:40:22
yes

01:40:24
yes

01:56:49
And please interject any questions you have, either as chat, "hand raise" or voice. We are all in this together...

01:58:25
So, what might you hypothesize as possible legal concerns for cyber security?

01:59:25
Many SMBs are unaware of basic security concepts. Is there any research on best methods for reaching them?

02:01:02
How do we develop a comprehensive cybersecurity education when it's not part of education's common core and we lack qualified teachers?

02:04:06
ISC2 and ISACA grant CPEs for mentoring by cybersecurity professionals. It's a great way to supplement teachers. The challenge is that school administrators and teachers don't see it as a priority, so don't take advantage of it.

02:08:45
Best resources to get the word out on cybersecurity: staysafeonline.org, stopthinkconnect.org, https://www.bbb.org/council/for-businesses/cybersecurity

02:10:30
Re legal concerns: what are your thoughts on sniffing/capturing network traffic in public wifi hotspots? Done for research, not malicious purposes of course.

02:10:42
Thanks, Ron!

02:11:41
Not pen testing.

02:15:42
https://www.law.cornell.edu/uscode/text/18/2510

02:15:53
Thx for that reference to the code.

02:18:26
Thanks, Marcelle!

02:22:00
what if you are capturing packets in a public locaton on open Wi-fi

02:23:53
then they should use vpn, yes

02:24:25
Exactly, Michael, no expectation of privacy, right?

02:26:48
depends on the security on the transmission. as Ed noted, there are ways...

02:31:25
interesting, authorized by who...the internet is open to all, is it authorized to everyone? Isn't that the purpose of requiring a login?

02:32:12
I just pinged you ed ><

02:32:20
did I commit a crime?

02:33:44
OUCH!!!

02:33:53
your fault, you responded

02:34:06
Touche'!

02:35:04
passive as opposed to active Reconnaissance

02:35:49
listening or poking to get a response

02:36:04
active

02:36:19
its active, you did something to get a response

02:36:20
yes, active

02:36:49
Passive - gathering info, re osint

02:37:02
active - poking at systems

02:37:14
throwing 1 rock at your house or 100 rocks, still a crime

02:37:53
hard to prove intent

02:39:45
as long as it is interesting, keep going

02:41:41
who currently expects privacy?

02:42:22
Your recommendation would require our politicians, court systems, law enforcement, and attorneys to understand cybersecurity and privacy management, compliance, and technologies. Again, most do not, beyond the basics.

02:43:17
FBI is one of the few departments who get cybersecurity.

02:43:28
NSA..

02:43:43
than again... wikileaks might suggest otherwise

02:45:24
Ransomware

02:45:44
yes we react to pain, and little else =/

02:45:50
stealing elections

02:46:42
force us back to using paper balots and hanging chads

02:49:27
lawsuit...

02:49:30
make some pain

02:50:09
I wonder how this will change when younger people get in office?

02:50:32
I view the policy makers as similar to my aging parents...

02:50:52
grunt and click

02:51:50
What % of younger people understand cybersecurity?Why we need to educate millenials.

02:52:06
it's gotta be higher than the existing legaslative base

02:52:07
Need some of our students to go to law school and run for office :-)

02:52:31
Thanks for a fun chat

02:52:35
I'm one of those older ones who wrecks the curve and is employed already

02:52:36
thanks for the talk

02:52:41
later all

02:52:43
Thank you all for making this the discussion our country needs to have!

02:52:44
Good talk thx

02:52:57
Thank you all for this educational presentation ;-)

02:52:58
^^michael

02:53:44
Thank you
Zoom would like to update your account settings. When joining a meeting or webinar by entering a meeting ID, participants will be required to enter a password. Participants joining using a meeting invite link will not be required to enter a password. Learn More
This change will be effective on . If approved or declined, the change will take effect immediately.