Skip to content Skip to navigation


Events of interest to the Cyber Initiative community

Distributed weekly through, to be added please email or visit this page.

Cyber Initiative and Related events:



Raw Data, a Cyber Initiative- and PRX-supported podcast on data, privacy, technology, and the cost of digital disruption, returns for season 4 at the end of March. Catch up on seasons 1-3 and subscribe to be notified when season 4 launches at

Sign up for (or read) our weekly newsletter on cybersecurity headlines at


Protecting the Front Line: County Election Security in the 21st Century - Supervisor Joe Simitian, Secretary of State Alex Padilla
Wednesday March 6th, 9:30am-3:00pm
Join us for a day long conference on election security, featuring panels on the technology, law, policies, and operations at the local level we use to secure votes at the ballot box, with a lunchtime keynote address from California Secretary of State Alex Padilla. While counties are the front line when it comes to the actual running of elections, there has been relatively little discussion about best security and operational practices aimed specifically at county registrars of voters. Join County Supervisor Joe Simitian and a group of nationally recognized experts for a conference on the law, technology, and best practices in place for protecting elections throughout the Bay Area and beyond.

The Active Citizen in the Digital Age - Wednesday March 6th, 5pm. Oksenberg Conference Room, 3rd floor, Encina Hall
Jenna Burrell, Associate Professor at UC Berkeley, will highlight both her current work on rural American connectivity, and her previous research on internet access with youth in Ghana. Tawana Petty from the Detroit Community Technology Project, will talk about her work with communities in Detroit to access and create equitable and ethical digital technologies. Our Postdoctoral Fellow Toussaint Nothias will be moderating and adding his expertise on Facebook's Free Basics application in Africa. Democracy depends on participation. In the digital era, participation often depends on access to a free and open internet. Yet for most of the world’s population, digital access remains expensive, unreliable and limited. How are marginalized communities – across both the US and the Global South – organizing digital access for themselves? In this event, we’ll talk to two experts on connectivity and community-led efforts to create equal access to digital resources. Tawana Petty is a researcher with the Detroit Community Technology Project, which brings together technologists, activists, and community members to build wireless networks across Detroit. Jenna Burrell, an ethnographer and associate professor in the School of Information at UC Berkeley, has researched digital connectivity among marginalized populations, first in sub-Saharan Africa and, currently, in rural areas of California and Oregon. Toussaint Nothias is a postdoctoral fellow at the Digital Civil Society Lab whose research explores journalism, social media and civil society in Africa.

Digital Democracy, Analogue Politics: How the Internet Era is Transforming Kenya - Thursday March 7th, 1:30pm, Room 301 Stanford Law School
Join Kenyan political analyst Nanjala Nyabola for a talk about her recently published book. The concept of a digital civil society is a fluid one given how dramatically the space changes daily. Yet, as Kenya’s experience with the 2017 election highlights, it has become unequivocally important to understand the broad contours of how citizens are organising, creating and distributing information, and generally crafting and deploying their political identities online. Drawing from her book, ‘Digital Democracy, Analogue Politics: How the Internet Era is Transforming Politics in Kenya’, Nyabola will discuss the ways in which technology is intersecting with politics in the broadest sense in Kenya, leading to an interesting demonstrations of agency and creativity in the civic space.  If you are planning to attend, please RSVP to Heather Noelle Robinson (

Detecting macOS Threats - Thursday, March 7th, 3:00-4:00pm, Spilker 317
Join Applied Cybersecurity for a talk with the CRO at Digital Security and founder of Objective-See about leveraging Apple’s game engine to heuristically detect macOS threats!
By examining recent exploits and malware attacks, we'll illustrate that macOS is a rather vulnerable and an ever more targeted OS. And unfortunately for Mac users, traditional signature-based approaches often fail to detect such threats. Instead a heuristic-based, behavioral approach is clearly needed. In this talk, we will discuss a new open-source monitoring framework which passively collects a myriad of system events. Building on top of this, we will then detail a predicate-based system that leverages Apple’s game (logic) engine to quickly and efficiently apply rules against these events. End result? A comprehensive detection, response and threat hunting platform.
Patrick Wardle is the Chief Research Officer at Digital Security and founder of Objective-See.

Sensing the World Wirelessly: Perception in the Age of IoT - Prof. Fadel Adib (MIT)
Thursday March 7th, 4:15-5:15pm, Packard 101
The success of wireless and mobile systems has led to a digital infrastructure that is integrated into the fabric of the physical world at a scale unimaginable two decades ago. This has come to be known as the internet of things, or the IoT. Batteryless devices constitute the largest component of this infrastructure, as they are attached to clothing, food, drugs, and manufacturing parts. However, due to their batteryless nature, these devices were assumed to be intrinsically limited in bandwidth, range, and sensing capability. To overcome these limitations, existing approaches required designing new hardware that replaces the hundreds of billions of devices already deployed. In this talk, I will describe how our research enables transforming batteryless devices into powerful sensors without modifying their hardware in any way, thus bringing direct benefits to the billions of devices deployed in today’s world. Specifically, I will describe how we can extract a sensing bandwidth from batteryless devices that is 10,000x larger than their communication bandwidth, and how we can extend their operation range by over 10x. I will also describe how we have designed novel inference algorithms and learning models that build on these techniques to deliver a variety of sensing tasks including sub-centimeter positioning, deep-tissue communication, and non-contact food sensing.The systems we have built have transformative implications on smart environments, healthcare,  manufacturing, and food safety. They enable agile robots to operate in non-line-of-sight environments where vision systems typically fail. They have led to the first demonstration of communication with deep-tissue batteryless micro-implants in a large living animal (pig) from meter-scale distances. Most recently, we demonstrated the potential of using these techniques to sense contaminated food in closed containers. I will conclude by describing how rethinking the abstractions of computing will enable us to bring the next generation of micro-computers to exciting new domains ranging from the human body to the depth of the ocean.
Fadel Adib is an Assistant Professor at MIT and the founding director of the Signal Kinetics research group at the MIT Media Lab.

Cybersecurity and The Board’s Responsibility: What Directors Need to Know about Risk and Oversight - Thursday, March 14. Room 190, Stanford Law School
Cybersecurity continues to be a pressing concern for boards in virtually all corporate sectors. Cyber attacks appear in the headlines virtually every week, reminding board members of the reputational, legal, and business threats such attacks pose. Regulators expect boards to maintain effective oversight over cybersecurity and to ensure that their companies are adequately prepared to respond and recover from any attack that does happen—including making timely disclosures required by ever-expanding notification requirements. Is your board providing proper oversight over your cybersecurity program? Are you ready to handle a significant attack – along with the potential legal ramifications? The Rock Center and SVDX will host a panel of experts to discuss the current cybersecurity threat landscape, evolving regulatory developments in this area, and what boards should be doing to ensure that their companies are well protected and that their oversight responsibilities are being adequately fulfilled.
This event is free and open to the public. Registration is recommended. Click here to register:
Please join the Rock Center and SVDX for a leading edge discussion with our featured panelists: Anthony P. Garcia, Senior Counsel, The Boeing Company; Alexa King, Executive Vice President, General Counsel and Secretary, FireEye; Milan Patel, Chief Client Officer, BlueVoyant; Serrin A. Turner, Partner, Latham & Watkins LLP

Blockchain Use Cases: What's Working? What's Not? - March 20th, 6pm-9pm, K&L Gates, 440 Pacific Avenue, SF. You've heard the blockchain buzz and potential of smart contracts. What is actually working? What still needs work? Hear from blockchain entrepreneurs and experts about how they developed their respective companies and got adoption. Network and find others with similar interest in blockchain applications. Learn from Olga Mack, currently Vice President of Strategy at Quantstamp,, the first decentralized security auditing blockchain platform. Olga was instrumental in passing AB 2658 and SB 838, which define blockchain and form a working blockchain group in California. She co-authored Fundamentals of Smart Contracts Security (Momentum Press, March 2019) and she is writing a book about blockchain and distributed ledger technology business models. Olga leads the Smart Contracts Security Alliance to help enterprises innovate in blockchain securely. Hear from Saritta Hines, CEO of Trustabit, on how and why she started Trustabit, a blockchain-based flight disruption management solution helping airlines harness the power of smart contracts to improve the passenger experience by automating compensation and notifying passengers sooner when flight disruptions occur. Affected passengers may use their smartphones to redeem compensation in various mediums (vouchers, miles, or fiat) with select airport vendors. And, learn about use cases the Stanford Cyber Initiative is working on from Allison Berke, the Executive Director of the Stanford Cyber Initiative.
More information:

Governing Machines: Defining and Enforcing Public Policy Values in AI Systems - Annual Symposium of the Berkeley Technology Law Journal and Berkeley Center for Law & Technology
Thursday April 4 - Friday, April 5, 2019
UC Berkeley Law School
Full agenda:
This symposium will convene scholars, regulators, and practitioners from law, policy, ethics, computer science, medicine, and social science to consider how best to integrate machines into legal and social systems. It will consider what roles we will allow machines to play and how to govern them in support of public policy values. Papers will be presented by Karen Levy, Pilar Ossorio, Ryan Calo, Amit Elazari, Meg Leta Jones, Deirdre Mulligan, and a keynote by Andrea Jelinek, Chair of the European Data Protection Board


Internet Observatory Program Manager - Alex Stamos, Adjunct Professor at Stanford’s Freeman-Spogli Institute, Cyber Initiative fellow, William J. Perry Fellow at the Center for International Security and Cooperation, and visiting scholar at the Hoover Institution is currently looking for a program manager for the Internet Observatory. The Internet Observatory is a bold, new cross-disciplinary program that grew out of the Stanford Cyber Initiative and aims to advance the teaching, research, and public policy on technology trust and security in today’s complex digital world. Based at the Freeman Spogli Institute and led by Program Director Alex Stamos, the Internet Observatory will formally launch in September 2019 with an innovative curriculum on trust and safety in technology, a new study to understand information warfare and a set of papers designed to impact public policy. Reporting to the Program Director of the Internet Observatory, the Program Manager will help develop, implement, and administer the vision, strategy, and goals of the new internet trust and safety curriculum, manage day-to-day research activity, and oversee the publication of cyber policy papers. Core responsibilities include strategy development, long-range planning, and partnership development for the research study; working with the Program Director to design, develop, implement and evaluate the cyber security curriculum; and developing white papers, proposals and reports for sponsors, government agencies, and policy impact initiatives. Strong planning and execution skills are a must for this position. Apply here:

“Cyber Vault” Project Fellowship - National Security Archive, June 2019 - May 2020
Position Description:  Through a generous grant from the Hewlett Foundation, the National Security Archive has an opening for a Cyber Fellow to help run the Cyber Vault Project for a one-year period (June 1, 2019 – May 31, 2020).  The Cyber Vault has several main goals: to address the widely-acknowledged problem of over-classification on cybersecurity through systematic use of access laws such as the Freedom of Information Act; to help manage the extraordinary growth of publicly available documentation by curating collections of significant primary sources; to further advance educational ends by preserving and disseminating primary documentation and other valuable research materials to a broad audience, from experts to students and the general public; and generally to serve as a public resource on cybersecurity.
Tasks: The Fellow will help continually to update and refine the specific scope and focus of the project.  A central area of activity will be to document the evolution of US cybersecurity policy. Assignments will include tracking down US government records and other sources through Web searches and FOIA requests.  The Fellow will oversee and contribute to the organizing, cataloguing, and posting of documentation on a dedicated Web site.  Preparation of substantive articles for publication is also envisioned.  The Fellow will further participate in related research tasks including development of a chronology, bibliography, glossaries, and other research guides.  Other key activities will consist of networking with experts in the field, consulting on ways to expand and improve the project’s output including its Web presence, consulting with an Advisory Board, and preparing grant reports and proposals.
Qualifications:  Applicants should have completed either a Doctoral or Master’s program in cyber studies or a closely related field, ideally with a background in national security or international affairs. A solid knowledge of the state of the cyber field is essential.  Applicants should demonstrate research, writing, and project management skills. Experience working with government records and FOIA are strong plusses.
Compensation:  $40,000–$50,000 for one year depending on experience.
Date Available:  June 1, 2019
Email Resume To:
Sue Bechtel
The National Security Archive

CGSR Research Interns - Summer Research Internship applications are currently open at the Center for Global Security Research (CGSR) at Lawrence Livermore National Laboratory. The current call will be open and accept applications on a rolling basis until Friday, March 15th. This is a paid internship in Livermore, CA, working with the center's director and fellows on projects related to international security and technology. In addition to assisting with ongoing projects, interns will also conduct individual research in relation with their interests and expertise.  We invite applications from current or recent students at both the undergraduate and graduate levels.  Bachelors, masters and PhD candidates and recent degree recipients are welcome to apply.  The typical internship length is three months (roughly the length of a semester), though there is some flexibility. The broad array of potential topics include: deterrence, diplomacy, dual-use technologies, arms control, nonproliferation, peacekeeping, terrorism, energy security, nuclear security, cybersecurity, biological and chemical security, artificial intelligence, and the strategic repercussions of current and emerging technologies.  Work also focuses on Russia, China, North Korea, Southeast Asia, the Middle East, Europe, and the politics of these countries and regions as they relate to international security.  There are opportunities to do work across several topic areas.  Students with technical or social science or regional expertise are welcome to apply.  Those interested can learn more about the center and its research areas here:
Apply at:

To suggest a related event to be listed here, please email