National Academies Press: OpenBook
« Previous: Appendix A: Workshop Agenda and Participants List
Suggested Citation:"Appendix B: Planning Committee Biographies." National Academies of Sciences, Engineering, and Medicine. 2016. Data Breach Aftermath and Recovery for Individuals and Institutions: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/23559.
×

B Planning Committee Biographies

FRED B. SCHNEIDER, Chair, is the Samuel B. Eckert Professor of Computer Science at Cornell University and chair of the department. He joined Cornell’s faculty in Fall 1978, having completed a Ph.D. at Stony Brook University and a B.S. in engineering at Cornell in 1975. Dr. Schneider’s research has always concerned various aspects of trustworthy systems—systems that will perform as expected, despite failures and attacks. Most recently, his interests have focused on system security. His work characterizing what policies can be enforced with various classes of defenses is widely cited, and it is seen as advancing the nascent science base for security. He is also engaged in research concerning legal and economic measures for improving system trustworthiness. Dr. Schneider was elected a fellow of the American Association for the Advancement of Science (AAAS;1992), the Association of Computing Machinery (1995), and the Institute of Electrical and Electronics Engineers (IEEE; 2008). He was named a professor-at-large at the University of Tromso (Norway) in 1996 and was awarded a doctor of science (honoris causa) by the University of Newcastle-upon-Tyne in 2003 for his work in computer dependability and security. He received the 2012 IEEE Emanuel R. Piore Award for contributions to trustworthy computing through novel approaches to security, fault-tolerance and formal methods for concurrent and distributed systems. The U.S. National Academy of Engineering (NAE) elected Dr. Schneider to membership in 2011, and the Norges Tekniske Vitenskapsakademi (Norwegian Academy of Technological Sciences) named him a foreign member in 2010. He is currently a member of the National Academies of Sciences, Engineering, and Medicine’s Naval Studies Board and Computer Science and Telecommunications Board and is founding chair of the Academies’ Forum on Cyber Resilience.

FRED H. CATE is vice president for research at Indiana University. He is the distinguished professor and the C. Ben Dutton Professor of Law at the Indiana University Maurer School of Law. He also serves as the managing director of the Center for Law, Ethics, and Applied Research in Health Information and a senior fellow and former founding director of the Center for Applied Cybersecurity Research. Professor Cate specializes in information privacy and security law issues. He has testified before numerous congressional committees and speaks frequently before professional, industry, and government groups. He is a senior policy advisor to the Centre for Information Policy Leadership at Hunton & Williams, LLP, and is a member of Intel’s Privacy and Security External Advisory Board, the Department of Homeland Security’s Data Privacy and Integrity Committee Cybersecurity

Suggested Citation:"Appendix B: Planning Committee Biographies." National Academies of Sciences, Engineering, and Medicine. 2016. Data Breach Aftermath and Recovery for Individuals and Institutions: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/23559.
×

Subcommittee, and the National Security Agency’s Privacy and Civil Liberties Panel. He serves on the board of directors of The Privacy Projects, the International Foundation for Online Responsibility, and the Kinsey Institute for Research in Sex, Gender and Reproduction. Previously, Professor Cate served as a member of the Academies’ Committee on Technical and Privacy Dimensions of Information for Terrorism Prevention, as counsel to the Department of Defense Technology and Privacy Advisory Committee, as a reporter for the third report of the Markle Task Force on National Security in the Information Age, as a member of the Federal Trade Commission’s (FTC’s) Advisory Committee on Online Access and Security, and on Microsoft’s Trustworthy Computing Academic Advisory Board. He chaired the International Telecommunication Union’s High-Level Experts on Electronic Signatures and Certification Authorities. He served as the privacy editor for IEEE’s Security & Privacy and is one of the founding editors of the Oxford University Press journal International Data Privacy Law. He is the author of more than 150 books and articles, and he appears frequently in the popular press. Professor Cate attended Oxford University and received his J.D. and his A.B. with honors and distinction from Stanford University. He is a senator and fellow (and immediate past president) of the Phi Beta Kappa Society, an elected member of the American Law Institute, and a fellow of the American Bar Foundation.

ERIC GROSSE is a senior member of the Google Security Team and previously vice president, Security and Privacy Engineering, at Google, Inc., in Mountain View, California, leading a team of 512 who ensure systems and data stay safe and users’ privacy remains secure. Improved and wider use of SSL, stronger consumer authentication technology, detection and blocking of espionage, transparency on legal requests for data, sophisticated malware analysis, and tools and frameworks for safer building of web applications are among the achievements of the Google Security Team. Before Google, Dr. Grosse was a research director and fellow at Lucent Bell Labs where he worked on security, networking, algorithms for approximation and visualization, software distribution, and scientific computing. He has a Ph.D. in computer science from Stanford University.

SUSAN LANDAU is a professor of cybersecurity policy in the Department of Social Science and Policy Studies at Worcester Polytechnic Institute. Dr. Landau has been a senior staff privacy analyst at Google, Inc., a distinguished engineer at Sun Microsystems, and a faculty member at the University of Massachusetts, Amherst, and at Wesleyan University. She has held visiting positions at Harvard University, Cornell University, Yale University, and the Mathematical Sciences Research Institute. Dr. Landau is the author of Surveillance or Security? The Risks Posed by New Wiretapping Technologies (2011) and co-author, with Whitfield Diffie, of Privacy on the Line: The Politics of Wiretapping and Encryption (1998,

Suggested Citation:"Appendix B: Planning Committee Biographies." National Academies of Sciences, Engineering, and Medicine. 2016. Data Breach Aftermath and Recovery for Individuals and Institutions: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/23559.
×

rev. ed. 2007). She has written numerous computer science and public policy papers and op-eds on cybersecurity and encryption policy and testified in Congress on the security risks of wiretapping and on cybersecurity activities at the National Institute of Standards and Technology’s Information Technology Laboratory. Dr. Landau currently serves on the Academies’ Computer Science and Telecommunications Board. A 2012 Guggenheim fellow, she was a 2010-2011 fellow at the Radcliffe Institute for Advanced Study, the recipient of the 2008 Women of Vision Social Impact Award, and also a fellow of AAAS and the ACM. She received her B.A. from Princeton University, her M.S. from Cornell University, and her Ph.D. from the Massachusetts Institute of Technology.

DEIRDRE K. MULLIGAN is an associate professor at the University of California, Berkeley, School of Information and formerly a clinical professor of law at the University of California, Berkeley, School of Law. She was the founding director of the Samuelson Law, Technology and Public Policy Clinic, which she led from 2001 to 2008. Before coming to Berkeley, she was staff counsel at the Center for Democracy and Technology in Washington, D.C. Professor Mulligan’s current research agenda focuses on information privacy and security. Current projects include qualitative interviews to understand the institutionalization and management of privacy within corporate America and the role of law in corporate information security policy and practice. Other areas of current research include digital rights management technology, privacy and security issues in sensor networks and visual surveillance systems, and alternative legal strategies to advance network security. Professor Mulligan is currently participating in a multistakeholder initiative, the Global Network Initiative, to advance and preserve freedom of expression and privacy through collaborative efforts aimed to resist government efforts that seek to enlist companies in acts of censorship and surveillance in violation of international human rights standards. During the summer of 2007, Professor Mulligan was a member of an expert team charged by the California Secretary of State to conduct a top-to-bottom review of the voting systems certified for use in California elections. This review investigated the security, accuracy, reliability, and accessibility of electronic voting systems used in California. Professor Mulligan was a member of the Academies’ Committee on Authentication Technology and Its Privacy Implications; the FTC’s Federal Advisory Committee on Online Access and Security, and the National Task Force on Privacy, Technology, and Criminal Justice Information. She was a vice chair of the California Bipartisan Commission on Internet Political Practices and chaired the Computers, Freedom, and Privacy Conference in 2004. She is currently a member of the California Office of Privacy Protection’s Advisory Council and a co-chair of Microsoft’s Trustworthy Computing Academic Advisory Board. She serves on the board of the California Voter Foundation and on the advisory board of the Electronic Frontier Foundation.

Suggested Citation:"Appendix B: Planning Committee Biographies." National Academies of Sciences, Engineering, and Medicine. 2016. Data Breach Aftermath and Recovery for Individuals and Institutions: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/23559.
×

PETER SWIRE joined the faculty of the Scheller College of Business, Georgia Institute of Technology, in the fall term of 2013 as the Nancy J. and Lawrence P. Huang Professor, in the Law and Ethics Program. At Georgia Tech, he has appointments by courtesy with the College of Computing and School of Public Policy. Professor Swire has been a leading privacy and cyber law scholar, government leader, and practitioner since the rise of the Internet in the 1990s. In 2013, he served as one of five members of President Obama’s Review Group on Intelligence and Communications Technology. Prior to that, he was co-chair of the global Do Not Track process for the World Wide Web Consortium. He is a senior fellow with the Future of Privacy Forum and a policy fellow with the Center for Democracy and Technology. Under President Clinton, Professor Swire was the Chief Counselor for Privacy in the Office of Management and Budget. He is the only person to date to have U.S. government-wide responsibility for privacy policy. In that role, his activities included being White House coordinator for the HIPAA medical privacy rules, chairing a White House task force on how to update wiretap laws for the Internet age, and helping negotiate the U.S.-European Union Safe Harbor agreement for transborder data flows. Under President Obama, he served as Special Assistant to the President for Economic Policy. Professor Swire is author of five books and numerous scholarly papers. He has testified often before Congress and been quoted regularly in the press. Professor Swire has served on privacy and security advisory boards for companies including Google, IBM, Intel, and Microsoft, and for 8 years he was a consultant with the global law firm of Morrison & Foerster, LLP. Professor Swire graduated from Princeton University (summa cum laude) and the Yale Law School, where he was an editor of the Yale Law Journal.

Suggested Citation:"Appendix B: Planning Committee Biographies." National Academies of Sciences, Engineering, and Medicine. 2016. Data Breach Aftermath and Recovery for Individuals and Institutions: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/23559.
×
Page 48
Suggested Citation:"Appendix B: Planning Committee Biographies." National Academies of Sciences, Engineering, and Medicine. 2016. Data Breach Aftermath and Recovery for Individuals and Institutions: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/23559.
×
Page 49
Suggested Citation:"Appendix B: Planning Committee Biographies." National Academies of Sciences, Engineering, and Medicine. 2016. Data Breach Aftermath and Recovery for Individuals and Institutions: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/23559.
×
Page 50
Suggested Citation:"Appendix B: Planning Committee Biographies." National Academies of Sciences, Engineering, and Medicine. 2016. Data Breach Aftermath and Recovery for Individuals and Institutions: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/23559.
×
Page 51
Next: Appendix C: Speaker Biographies »
Data Breach Aftermath and Recovery for Individuals and Institutions: Proceedings of a Workshop Get This Book
×
Buy Ebook | $14.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

In January 2016, the National Academies of Sciences, Engineering, and Medicine hosted the Workshop on Data Breach Aftermath and Recovery for Individuals and Institutions. Participants examined existing technical and policy remediations, and they discussed possible new mechanisms for better protecting and helping consumers in the wake of a breach. Speakers were asked to focus on data breach aftermath and recovery and to discuss ways to remediate harms from breaches. This publication summarizes the presentations and discussions from the workshop.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!