Short Bios

(This is a partial set of participants’ bios. It will be expanded as bios are received from more of the participants)

A-F | G-L | M-R | S-T | U-Z

Chris Bronk is interested in the intersection of information technologies and international politics. He worked as a software developer and Foreign Service Officer before accepting a dual appointment between Rice University's Baker Institute for Public Policy and Department of Computer Science. He has written on subjects including employment of web 2.0 in diplomacy and intelligence, international cyber security governance, and cyber conflict. His latest work is focused upon cyber security issues found in the oil & gas sector.

Andrew Cushman is a Strategy Director on Microsoft's Global Security Strategy and Diplomacy team and is responsible for Futures & Pilots that catalyze ecosystem change and positively influence global public policy, with particular emphasis on End to End Trust, a regional focus on Brazil, global Internet Governance, and emerging governmental cybersecurity Norms of Behavior.

Randall Davis is a Professor in the MIT EECS department and the current Associate Director of the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL). He has been one of the seminal contributors to the field of knowledge-based systems, publishing more than 50 articles and playing a central role in the development of several systems. His current research involves developing advanced tools that permit natural, sketch-based interaction with software, particularly for computer-aided design and design rationale capture. He has also been active in the area of intellectual property and software. He has served as an expert in a variety of cases involving software, including the investigation by the Department of Justice of the Inslaw matter, where he investigated allegations of copyright theft and cover-up by the Federal Bureau of Investigation, the National Security Agency, the Drug Enforcement Agency, the United States Customs Service, and the Defense Intelligence Agency. From 1998-2000 he served as the chairman of the National Academy of Sciences study on intellectual property rights and the information infrastructure entitled The Digital Dilemma: Intellectual Property in the Information Age, published by the National Academy Press in February, 2000.

Ron Deibert (PhD, University of British Columbia) is Professor of Political Science, and Director of the Canada Centre for Global Security Studies and the Citizen Lab at the Munk School of Global Affairs, University of Toronto. The Citizen Lab is an interdisciplinary research and development hothouse working at the intersection of the Internet, global security, and human rights. He is a co-founder and a principal investigator of the OpenNet Initiative and Information Warfare Monitor projects. Deibert was one of the founders and (former) VP of global policy and outreach for Psiphon Inc. Deibert has published numerous articles, chapters, and four books on issues related technology, media, and world politics. He was one of the authors of the Tracking Ghostnet report that documented an alleged cyber-espionage network affecting over 1200 computers in 103 countries, and the Shadows in the Cloud report, which analyzed a cloud-based espionage network.

Chris C. Demchak has a PhD from Berkeley in Political Science with a focus on organization theory and complex systems, security studies, and surprise in largescale socio-technical systems across nations. She also holds two masters degrees, respectively, in economic development (Princeton) and energy engineering (Berkeley). She has published numerous articles on societal security difficulties with largescale information systems to include cyberwar and cyber privacy, and the topological changes to global cyberspace in "Cyber Westphalian" process. Demchak has several recent related books: an edited volume entitled Designing Resilience (2010 U Pitt Press with Comfort and Boin) and a theory-to-practice volume Wars of Disruption and Resilience: Cybered Conflict, Power, and National Security Conflicts (2011 UGA Press). She is currently working on a new manuscript tentatively entitled Organizing for Cyber Security Resilience: Cyber commands and other National Models for a Rising Cybered Conflict Age.

Tom Dukes is a career prosecutor with the Computer Crime and Intellectual Property Section at the Department of Justice, currently serving as a Senior Advisor to the State Department's Coordinator for Cyber Issues (S/CCI). At S/CCI, Tom focuses on cybercrime, cybersecurity, national security and capacity building issues. Tom is also a Lt Col JAG officer in the U.S. Air Force reserves, attached to Twenty-Fourth Air Force (AFCYBER) at Lackland AFB, Texas, where he serves as a cyber ops lawyer.

Martha Finnemore is a University Professor of Political Science and International Affairs at George Washington University in Washington, DC. Her research focuses on global governance, international organizations, international norm dynamics, and social theory. She is the author of “Cultivating International Cyber Norms” in Kristin Lord and Travis Sharp, eds. America's Cyber Future: Security and Prosperity in the Information Age, Center for a New American Security, May 2011.

Back to top


Sandro Gaycken is a trained philosopher with a doctorate in technology studies. He serves as adviser to the Foreign Minister of Germany on Cyber Foreign Policy in the Policy Planning Staff of the Federal Foreign Office, and he researches the connections of IT, security and society at the Institute of Computer Science at Freie Universität Berlin with a focus on cyber security. He consults for security institutions and policy-making bodies around the world as well as companies in the fields of defense and IT. He has testified as a subject-matter expert in many hearings in the German Bundestag and other major institutions, and he serves as a regular commentator on IT- and cyber-related incidents in the press.

Amy Gordon has been a policymaker, negotiator, analyst, and research grant-maker in the field of international security over the course of the last twenty-five years. She has served as Director of the MacArthur Foundation's International Peace and Security Program, Chief of the Political Military Unit at U.S. Embassy Moscow, diplomatic coordinator in the U.S. Department of State for the Proliferation Security Initiative, and expert advisor in the U.S. Arms Control and Disarmament Agency for U.S. ratification of the Chemical Weapons Convention. She is Senior Research Fellow at the New America Foundation and writes on international security issues.

Phillip Hallam-Baker is an internationally recognized computer security specialist credited with 'significant contributions' to the design of HTTP 1.0, the core protocol of the World Wide Web. His book 'dotCrime Manifesto: How to Stop Internet Crime' sets out the first technical blueprint for how to make the Web and the Internet a less crime permissive environment by introducing accountability controls for transactions that require them. Hallam-Baker has made significant contributions to core Internet security protocols, including XKMS, SAML, WS-Security, WS-Trust and KEYPROV. He has participated in standards groups in IETF, W3C and OASIS and played a key role in establishing the concept of Extended Validation certificates as an Industry standard.

Nick Haycock is in the Office of Cyber Security and Information Assurance in the UK's Cabinet Office, and specializes in issues of tackling state-on-state behaviour through bilateral and multilateral diplomatic engagement. He represents the UK at OSCE discussions on confidence building measures in cyber space, and is the UK's expert on the UN Group of Government Experts which will report to the UN General Assembly in 2013.

Duncan B. Hollis is a Professor of International Law and the Associate Dean for Academic Affairs at the Temple University School of Law. Professor Hollis's scholarship focuses on international agreements, examining the formation, interpretation, and application of treaties and political commitments in international, comparative and constitutional contexts. As part of that research agenda, Professor Hollis is examining how existing rules of international law regulate cyberthreats, the ways new norms could be formed to redress such threats, and what the content of such norms might look like. Professor Hollis is the editor of The Oxford Guide to Treaties (2012) and National Treaty Law & Practice (2005) as well as a series of articles on cyberthreats and conflicts in cyberspace. Prior to joining the Temple faculty, Professor Hollis served from 1998 to 2004 in the Office of the Legal Adviser at the U.S. Department of State where he spent several years as the Attorney-Adviser for Treaty Affairs. He continues to consult widely on issues of treaty negotiation and interpretation and is a regular contributor to the premier international law blog, Opinio Juris.

Will Howerton specializes at Paladin Capital Group in exploring opportunities in cyber security and in advising corporate executives on cyber risk, in areas including risk analysis, strategy, governance, technology, policy, and crisis management. He recently contributed to "Confronting Cyber Risk in Critical Infrastructure: The National and Economic Benefits of Security Development Processes," a whitepaper commissioned by Microsoft and published in May 2012. Mr. Howerton received his B.A. from Georgetown University and completed coursework at Sciences-Po, Paris, in international relations and international security.

Rex B. Hughes is a Cyber Security Fellow at Wolfson College, University of Cambridge and the Munk School of Global Affairs, University of Toronto. With Marconi Professor Jon Crowcroft, Hughes co-directs the Cambridge Cyber Defence Project, a joint initiative of The Computer Laboratory and the Centre for Science & Policy. With Citizen Lab Director Professor Ron Deibert, Hughes is exploring new methods and models for mapping strategic cyberspace.

Roger Hurwitz is a research scientist at CSAIL, MIT and a Senior Fellow at Canada Centre for Security Studies at the University of Toronto. He is interested in how cyber conflict and cooperation have become part of international relations practice and may force us to change our theories of that practice. Hurwitz holds advanced degrees in international relations and computational social science (Ph.D.), has taught at MIT and the Hebrew University, was a founder of the Harvard-MIT joint project "Explorations in Cyber International Relations," funded by the Minerva Research Initiative, and co-chaired last year's Cyber Norms Workshop.

Nigel Inkster CMG has been responsible for introducing a cyber security agenda to IISS with a primary focus on how the evolution of the cyber domain has affected the ways in which states exercise strategic effect. As a former intelligence professional with a background on China, his personal research has focused on the impact of the cyber domain on Chinese defence and security policies with a particular focus on cyber espionage.

Yurie Ito is a Director of Global Coordination at JPCERT/CC, she has been active contributor of various international security operations groups including chairing Asia Pacific CERTs forum and Board director of FIRST for 6 years, and inter-governmental groups. In 2008, She joined Internet Corporation for Assigned Names and Numbers (ICANN) as a Director, Global Security Programs where she leads ICANN’s involvement in collaborative response activities and works with ICANN partner organizations and stakeholders at global and regional levels in implementing ICANN security, stability and resiliency programs. In April 2011, she completed her contract with ICANN and returned to JPCERT/CC as Director of Global Coordination, and responsible for JPCERT’s international relations with international forums and operation groups. She has a master's degree in International Law and Diplomacy from Tufts University Fletcher School.

Eric Talbot Jensen is an Associate Professor at Brigham Young Law School in Provo, Utah, where he teaches Public International Law, US National Security Law, Criminal Law, the Law of Armed Conflict, and Cyber law. Prior to his current position, he spent 20 years in the US Army, serving in various positions including as the Chief of the Army’s International Law Branch; Deputy Legal Advisor for Task Force Baghdad; Professor of International and Operational Law at The Judge Advocate General’s Legal Center and School; legal advisor to the US contingent of UN Forces deployed to Skopje, Macedonia as part of UNPREDEP; and legal advisor in Bosnia in support of Operation Joint Endeavor/Guard. Professor Jensen is a graduate of Brigham Young University (B.A., International Relations), University of Notre Dame Law School (J.D.), The Judge Advocate General’s Legal Center and School (LL.M.) and Yale Law School (LL.M.). Professor Jensen’s scholarship focuses on international law, national security law, cyber law and international criminal law. His recent publications include a case book The Law of Armed Conflict: An Operational Approach (2012), with G. Corn, V. Hansen, C. Jenks, R. Jackson, and J. Schoettle, and several law review articles on international law in cyber conflict.

Ferenc "Frank" Kalmar is a career foreign service officer, whose previous assignment was desk officer in the Security Policy and Non-Proliferation Department of the Ministry of Foreign Affairs of Hungary. There he was responsible inter alia for emerging security challenges/cyber defense. Mr. Kalmar drafted a cyber defense non-paper introduced in the EU under Hungary’s Presidency, wrote the cyber security chapter of the new Hungarian national security strategy, and helped coordinate Hungarian position for NATO's then-nascent cyber defense policy. He currently has cyber affairs in his portfolio at the Hungarian embassy in Washington, working in particular to assit preparations for the Budapest International Cyberspace Conference in October 2012, by securing appropriate US participation and by providing analysis on important American perspectives and developments.

Sean Kanuck was appointed as the first National Intelligence Officer for Cyber Issues in May 2011. Mr. Kanuck came to the NIC after a decade of experience in the CIA's Information Operations Center, including both analytic and field assignments. In his Senior Analytic Service role, he was a contributing author for the 2009 White House Cyberspace Policy Review, an Intelligence Fellow with the Directorates for Cybersecurity and Combating Terrorism at the National Security Council, and a member of the US delegation to the UN Group of Governmental Experts on international information security.

Camino Kavanagh is currently pursuing a PhD at Kings College London’s Dept. of War Studies and is a non-resident fellow at University of Toronto’s Canada Center and the Citizen Lab. Her principal research focus is on power dynamics in (and in relation to) cyberspace. She has an MA in Contemporary Warfare and an MA in International Human Rights Law. Camino is also a Fellow at NYU’s Center on International Cooperation (CIC) where she focuses principally on transnational threats such as organized crime and trafficking. Before joining CIC she worked at the International Institute for Democracy and Assistance (IDEA), and has spent more than ten years in the field, principally working in UN peacekeeping operations in Africa and Central America, as advisor to governments in different reform processes in Central America and Southeast Asia, and conducting research on organized crime and trafficking.

Alexander Klimburg is a Fellow and Senior Adviser at the Austrian Institute for International Affairs. Since joining the Institute in October 2006, Mr Klimburg has acted as an adviser to governments and international organizations on a number of issues within national cybersecurity and critical infrastructure protection (CIP). Mr Klimburg has partaken in numerous international and intergovernmental discussions, advised on national and European legislation and has consulted to private enterprise.  He is the author of a number of advisory papers and is regularly consulted by the media. Mr Klimburg is particularly interested in the roles that non-state actors have within cybersecurity, and how work towards to a whole-of-nation capability within cyberpower. 

Mitchell Komaroff serves as the Director, Trusted Mission Systems and Networks (TMSN), for the DoD Chief Information Officer (DoD CIO) responsible for developing and implementing strategy for mitigating national security risks to DoD arising from the increasing globalization of the information and communications technology sector. The TMSN is the DoD CIO focal point for transactional risk management in CFIUS/FCC Licensing matters, developing strategies for preserving and improving Internet security and stability in support of DoD and USG communications, and policy development addressing global supply chain risk, implementing software and systems assurance across DoD.

Karl N. Levitt joined the faculty of the Department of Computer Science, University of California, Davis in 1986; after 20 years on the research staff of the Computer Science Laboratory (CSL) of SRI International, with the final five as Director of CSL. At SRI he led projects concerned with many aspects of computer system design, especially issues of security, fault-tolerance, and formal methods. At Davis he established programs in computer security and formal methods, and was a major contributor to the creation of the Security Laboratory, which now includes 8 faculty, 3 full time researchers, 30 graduate students, and has graduated 50 PhDs. Levitt has led projects for DARPA, NSF, NSA, AFRL, ARL, CIA, and other Government and commercial organizations, with many concerning intrusion detection and automated response to attacks. He has contributed to the development of the first intrusion detection systems for local area networks, for small scale distributed systems, and a scalable system for large networks. From 2005 to 2009, he was the lead program manager for NSF’s programs: Cyber Trust and its successor Trustworthy Computing, and co-led the Infosec Research Council, an informal consortium of Government program managers for computer security activities.

James Lewis is a senior fellow and Program Director at the Center for Strategic and International Studies, where he writes on technology, security and the international economy. Before joining CSIS, he served at the Departments of State and Commerce. Lewis has authored more than seventy publications since coming to CSIS and was the Director of CSIS’s Commission on Cybersecurity for the 44th Presidency, whose report has been downloaded more than 50,000 times. Lewis was also the Rapporteur for the UN’s 2010 Group of Government Experts on Information Security. Lewis received a Ph.D. from the University of Chicago; his current research involves the political effect of the Internet, asymmetric warfare, strategic competition, and technological innovation.

Patrick D. Lincoln is the Director of the Computer Science Laboratory at SRI International. The Computer Science Laboratory studies the logical foundations of scalable systems that are beyond the scope of traditional testing or simulation, and builds and applies efficient high-level tools for rigorous mechanical analysis. Current systems of interest include not only traditional computer hardware and software, but also biological systems and nanoelectronics. Dr. Lincoln has published extensively and broadly in fields ranging from biological signaling and logic programming to algorithm development, software security and network protection.

Kristin Lord is Executive Vice President and Director of Studies at the Center for a New American Security, where she is launching a new Program on U.S. National Security in the Information Age. She served as the co-editor of and a contributor to a major CNAS report entitled "America's Cyber Future: Security and Prosperity in the Information Age." She has also authored numerous publications on national security in the information age, including the book "Power and Conflict in an Age of Transparency: Why the Information Age May Not Lead to Security, Democracy, or Peace."

Catherine Lotrionte is the Director of the Institute for Law, Science & Global Security, Visiting Professor of Government at Georgetown University and the Director of Georgetown University’s CyberProject. From 2002 to 2006 she served as Counsel to the President's Foreign Intelligence Advisory Board at the White House. In 2002 she served as a legal counsel for the Joint Inquiry Committee of the Senate Select Committee on Intelligence. Prior to that, Professor Lotrionte was Assistant General Counsel with the Office of General Counsel at the Central Intelligence Agency. At Georgetown she teaches courses on intelligence law, international law and foreign policy and directs the cyber and nonproliferation projects through the Institute for Law, Science & Global Security. Professor Lotrionte earned her PhD from Georgetown University and her JD from New York University and is the author of numerous publications, including two forthcoming books, Cyber Policy: An Instrument of International Relations, Intelligence and National Power and U.S. National Security Law in the Post-Cold War Era. She is a life member of the Council on Foreign Relations.

Back to top


John C. Mallery has been affiliated at the MIT Computer Science & Artificial Intelligence Laboratory or its predecessor the Artificial Intelligence Laboratory since 1980 as a graduate student and later a research scientist. His recent research involves national cyber strategy, escalatory models of cyber conflict, architectures for international cyber sharing and collaborative analysis, threat reduction via cyber norms, and technical strategies for cyber defense. He is generally concerned with cyber policy and has been developing advanced architectural concepts for cyber security and transformational computing for the past decade. During the 2008 Presidential campaign, he served on Obama's cyber policy team and helped craft his July 16, 2008 cyber platform. Since 2006, he organized a series of national workshops on technical and policy aspects of cyber. His interests span a variety of fields from artificial intelligence, computer science and information assurance to cyber defense, economics and international relations. During the 1990s, he was the principal architect and developer of the White House Electronic Publications System that served the Clinton Administration from 1992-2001. In the process, he created and fielded the first large-scale wide-area collaboration system for the Vice President's 1994 Open Meeting on the National Performance Review with 4000 Federal workers, pioneered online survey research in 1992 leading up to hierarchical adaptive surveys in 1996, implemented the first production HTTP 1.1 Web server and URN resolver, among many other firsts.

Mark Matz is Director of Policy and Issues Management within the National Cyber Security Directorate at Public Safety Canada. Mark has worked in various policy postions with the Government of Canada, including with the Privy Council Office helping to manage the Cabinet agenda as well as national security and criminal justice issues. Mark holds a Masters of Philosophy from the University of Oxford.

Tim Maurer is a research associate in the Technology and Public Policy Program at the Center for Strategic and International Studies. He focuses on international affairs and Internet policy including cyber-security, Internet governance, and the human rights dimension of international Internet policy. Foreign Policy published his writing on Stuxnet and Flame and the Harvard Belfer Center for Science and International Affairs published his studies on WikiLeaks and the United Nations' activities regarding cyber-security. His most recent research examined public-private partnerships for critical infrastructure protection. Tim has a Master in Public Policy from the Harvard Kennedy School concentrating in international and global affairs. His thesis written for the White House National Security Council received the award 'Best Policy Analysis Exercise in International and Global Affairs'.

Angela McKay is a Principal Security Strategist in the Global Security Strategy and Diplomacy (GSSD) team at Microsoft, with a primary focus on shaping U.S. cyber security policy and facilitating international collaboration to improve cyber security globally. She also serves as Vice Chair of the Information Technology (IT) Sector Coordinating Council and Microsoft’s Point of Contact for the National Security Telecommunications Advisory Committee (NSTAC). In these posts, Ms. McKay leverages her 10+ years of experience to address complex global challenges related to critical infrastructure protection (CIP) and information assurance across a wide range of topics, including strategic and operational risk management, information sharing, incident response and emergency communications, and software security and integrity. In previous roles at Microsoft, Ms. McKay's focus was to increase capacity and build cyber security capabilities in developing and emerging countries. Prior to joining Microsoft, she was at Booz Allen Hamilton, serving for over five years in several key roles to support the Department of Homeland Security’s mission to improve the cyber security of the 18 critical infrastructure sectors through implementation of the National Strategy to Secure Cyberspace, Homeland Security Presidential Directive Seven, and the National Infrastructure Protection Plan. Ms. McKay holds a Bachelor’s of Industrial and Systems Engineering from the Georgia Institute of Technology.

Sarah McKune is Senior Researcher at the Citizen Lab, Munk School of Global Affairs, University of Toronto. Her work includes analysis of targeted cyber threats against civil society, as well as research regarding the Shanghai Cooperation Organization and cyber security issues related to China. Sarah is a lawyer with a background in international human rights law.

Dave McMahon has an honours degree in computer engineering from the Royal Military College of Canada and 30 years field experience leading major cyber security initiatives both in private and public sector. Dave is a widely published author and futurist on the subject of the Cyber issues, 5th dimension Warfare, e-spionage, critical infrastructure protection, privacy, human rights and the geopolitics of cyberspace, upstream security and proactive defence. Dave McMahon manages complex security programs and research for Bell Canada, Business Markets.

Vivek Mohan is a Fellow with the Science, Technology and Public Policy Program at the Harvard Kennedy School's Belfer Center for Science and International Affairs. Vivek's research and writing focuses on the challenges existing legal frameworks pose for cybersecurity governance. Vivek has written on how technologies have changed assumptions that underping both domestic and international legal frameworks, and has particular interest in analyzing the success of public-private sector collaboration in cybersecurity. Vivek joined the Belfer Center from Microsoft's Innovation & Policy Center in DC, and holds a JD from Columbia Law School and a BA from UC Berkeley.

James Mulvenon is Vice-President of Defense Group, Inc.'s Intelligence Division and Director of DGI's Center for Intelligence Research and Analysis. At CIRA, Dr. Mulvenon runs teams of nearly thirty cleared Chinese, Russian, Arabic, Pashto, Urdu, and Dari/Farsi linguist-analysts performing open-source research for the US Government. A specialist on the Chinese military and cyber warfare, Dr. Mulvenon's research focuses on Chinese C4ISR, defense RD&A organizations and policy, and strategic weapons programs, including computer network operations and nuclear warfare. He is also a founding member and current Chairman of the Board of the Cyber Conflict Studies Association.

Joseph S. Nye, Jr. is University Distinguished Service Professor and former Dean of Harvard’s Kennedy School of Government. He received his bachelor's degree summa cum laude from Princeton University, won a Rhodes Scholarship to Oxford, and earned a Ph.D. in political science from Harvard. He has served as Assistant Secretary of Defense for International Security Affairs, Chair of the National Intelligence Council, and a Deputy Under Secretary of State. His most recent books include Soft Power, The Powers to Lead, and The Future of Power. He is a fellow of the American Academy of Arts and Sciences, the British Academy, and the American Academy of Diplomacy. In a recent survey of international relations scholars, he was ranked as the most influential scholar on American foreign policy.

Emilian Papadopoulos is Good Harbor's chief of staff and a director with its cyber risk management practice. He has advised clients in sectors including telecommunications, critical infrastructure, and legal and financial services on issues including cyber risk management, critical infrastructure security, and crisis management. He co-authored "Confronting Cyber Risk in Critical Infrastructure: The National and Economic Benefits of Security Development Processes," "Introduction to Terrorism: What the Next President Will Face," and "Securing Passenger Rail Against Terrorism: Recommendations for Plan Abu Dhabi 2030." Mr. Papadopoulos previously worked for Foreign Affairs Canada and at the Canadian Embassy in Washington, D.C. He graduated from the University of Toronto and received a Masters of Public Policy from the Harvard Kennedy School of Government.

Greg Rattray is a CEO and founding partner in Delta Risk. Rattray brings an exceptional record in establishing strategies for cyber security across both the government and private sectors. He also is the Senior Security Advisor for BITS/The Financial Services Roundtable. During his 23 year Air Force career, he served as the Director for Cyber Security on the National Security Council staff in the White House, commanded the Operations Group of the AF Information Warfare Center. He is a Full Member of the Council on Foreign Relations, President of the Cyber Conflict Studies Association and author of Strategic Warfare in Cyberspace.

Harvey Rishikoff is the Chair of the ABA Advisory Committee for the Standing Committee on Law and National Security, and Co-Chair (with Judy Miller) of the ABA National Task Force on Cyber and Security established in August 2012. He is a former senior policy advisor to DNI-NCIX, a former legal counsel to the deputy director of the FBI, a former AA to the Chief Justice, and a member of the Council on Foreign Relations Task force on cyber.

Rafal Rohozinski is one of Canada’s thought leaders in the fields of cyber security and Internet freedom. He is the founder and CEO of The SecDev Group and Psiphon Inc., and his work in information security spans two decades and 37 countries, including conflict zones in the CIS, the Middle East and Africa. His well known work on cyber espionage includes co-authorship of the Tracking GhostNet, Shadows in the Cloud and Koobface. He was a senior scholar at the Canada Centre for Global Security Studies, Munk School of Global Affairs and a director of the Advanced Network Research Group, University of Cambridge. With Ron Deibert he founded the Information Warfare Monitor and the OpenNet Initiative. In addition to publishing extensively in academic journals and the press on cyber conflict and war fighting, he was one of the editors and contributors to Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace (MIT Press, 2010), and Access Contested: Security, Identity and Resistance in Asian Cyberspace (MIT Press, 2011).

Neil Rowe is Professor of Computer Science at the U.S. Naval Postgraduate School where he has been since his Ph.D. from Stanford in 1983. His main research interests are the modeling of deception, information security, surveillance systems, and data mining. Recent work has focused on experimental computer security with live cyberattackers, issues of perfidy in cyberwarfare, and detecting suspicious behavior from data in file directories.

Back to top


Jamie Saunders leads a joint team drawn from the Foreign and Commonwealth Office and the Office of Cyber Security and Information Assurance, responsible for taking forward the international agenda set at the November 2011 London Cyber Conference. Jamie took up this post in January 2012, following over 20 years of security policy experience. His most recent assignment was as cyber policy lead in the British Embassy, Washington (2008-2011). Previously he was assigned to a range of operational and policy positions at GCHQ.

John E. Savage is the An Wang Professor of Computer Science at Brown University. He earned his PhD in Electrical Engineering at MIT in coding and communication theory and joined Bell Laboratories in 1965 and Brown University in 1967. In 1979 he co-founded the Department of Computer Science at Brown and served as its second chair from 1985 to 1991. His research has centered on theoretical computer science and currently includes cybersecurity, computational nanotechnology, the performance of multicore chips, and reliable computing with unreliable elements. He is a Guggenheim Fellow and a Fellow of AAAS and ACM, and a Life Fellow of IEEE. He served as Jefferson Science Fellow in the U.S. Department of State in 2009-2010.

Eric Sears joined the MacArthur Foundation in May 2009. He oversees several areas of MacArthur's human rights grantmaking portfolio, including efforts to advance an open and secure internet. His responsibilities also include grantmaking to promote accountability for atrocity crimes and efforts to leverage technology for human rights protections. Prior to joining MacArthur, Eric worked in the Crimes Against Humanity Program at Human Rights First, in New York, and for Amnesty International USA, in Washington DC, where he helped establish the orgnization's Crisis Response Program.

Michael Sechrist's research covers submarine fiber-optic cable system security and related technical developments. He currently works for State Street Corporation in information security threat and vulnerability management. He previously served as project manager for Harvard on the Exploration in Cyber International Relations project, funded by DoD's MInerva Research Initiative.

Adam Segal is the Maurice R Greenberg Senior Fellow in China Studies where he directs CFR's cyber conflict and cybersecurity initiative and is the project director for a CFR independent task for on US foreign policy in the digital age. He writes primarily on Chinese approaches to cyberspace, security, and technology policy.

Aadya Shukla is a Computer Scientist and AI researcher by training and a STPP fellow at the Harvard Kennedy School. Her research focuses on construction of computational models to conceptualize cyberspace (cyber ontology & mapping), comparative analysis of national cyber strategies, critical infrastructure security, formulation of frameworks to measure the impact of innovative semantic technologies and use of trustworthy computing in digital government.

Bill Studeman has a long history in Cyber and Information based strategy and conflict, and in national security intelligence. He served as the director of Naval Intelligence, the Director of the NSA, the Deputy Director of the CIA and twice Acting Director of the CIA. Later at TRW/Northrop Grumman, he took leading roles in defense, intel and cyber/IO work. He currently allocates one-third of his time to government advisory boards, one-third to industrial consulting and one-third to retirement.

Hardin Tibbs is a strategy consultant and futures researcher based in the UK. Hardin is currently Principal Investigator of the Seaford House Cyber Inquiry being undertaken by the UK Defence Academy. In this capacity he is currently reviewing the role of cyber norms in strategy for cyber security, as part of a wide-ranging assessment of strategy for cyber-security. He is also CEO of Synthesys Strategic Consulting Ltd in the UK.

Eneken Tikk is a post-doctoral fellow at Citizen Lab and Canada Centre for Global Security Studies. She holds a PhD in law for a dissertation on a comprehensive legal approach to cyber security (2011), a field of interest that she is augmenting during her post-doctoral studies. Eneken promotes an interdisciplinary and systematic understanding of strategic implications and issues related to uses of ICTs. She has developed extensive experience with legal and policy aspects of uses of ICTs in various tasks and positions as a member of the Estonian Bar Association (2003-2006), adviser to several Estonian governmental authorities (2003-2008) and the NATO Cooperative Cyber Defence Centre of Excellence (2006-2011). She is involved in several international cyber security expert groups and serves as a special adviser to the ICT4Peace Foundation in Switzerland.

Back to top


Michael Walma has been with Canada's Foreign Ministry for 20 years, specializing in international security, and serves as the Canadian expert to the UN GGE. As the Director of the Policy Planning Division, he will be working to develop a Canadian internet foreign policy which balances economic, social and security interests. He has a particular interest in internet governance issues, protection and promotion of individual rights, and the roles of civil society and private industry, particularly telecom providers and 'Big Data'.

Rick Welch is the Executive Director of the Advanced Cyber Security Center (ACSC), a non-profit consortium of New England Companies and Universities. The ACSC brings together industry, university, and government organizations to address the most sophisticated advanced cyber threats. Rick was an executive at RSA Security Inc. where he was VP of RSA’s Encryption Division for 4 years and led RSA’s Consulting business for 8 years. Rick received his B.S. from UNH and his MBA from Boston University. He is a Certified Information Systems Security Professional (CISSP).

Jody Westby provides legal and consulting services in the areas of privacy, security, cybercrime, IT governance, and e-discovery. She is CEO of Global Cyber Risk and also serves as Distinguished Fellow for Carnegie Mellon CyLab. Ms. Westby chairs the American Bar Association’s Privacy & Computer Crime Committee and co-chairs the World Federation of Scientists Permanent Monitoring Panel on Information Security. She is also a member of the United Nation’s ITU High Level Experts Group on Cyber Security and led the development of the ITU Toolkit for Cybercrime Legislation. Ms. Westby is co-author and editor of four books on privacy, security, cybercrime, and enterprise security programs and speaks globally on these issues. She developed an IT governance guide for boards of directors and senior executives for Carnegie Mellon University and authored the 2008 and 2010 CyLab Governance Survey Reports on board and senior management governance of privacy and security.

Detlev Wolter is currently the head of the Division of the Conventional Arms Control and CSBMs (Confidence and Security Building Measures) in Germany's Federal Foreign Office. In his career of over twenty-five years in the Foreign Office, he has represented Germany in major foreign countries and at intergovernmental organizations, especially on matters of international security and arms control. Dr. Wolter holds several degrees in law and international relations and received a Ph.D. (Humboldt University) for his study on arms control and international law. He has published articles in English and German on a broad variety of topics in EU, foreign, security and international politics. In 2004, he was awarded the Helmuth von Moltke-Prize for Humanitarian International Law.

Panayotis "Pano" Yannakogeorgos is a Research Professor of Cyber Policy and Global Affairs at the U.S. Air Force Research Institute of Air University. His research interests include the intersection of cyberspace, national security, military operations and international cooperation.

Back to top