George C. Marshall Institute: Controlling Cyber Conflict? Arms Control, International Norms, and Strategic Restraint

I shall be moderating a panel discussion on “Controlling Cyber Conflict? Arms Control, International Norms, and Strategic Restraint,” on behalf of the George C. Marshall Institute, on Tuesday, 21 June, at the National Press Club in Washington, DC.

Details are as follows, and I hope to see you there!

Tuesday, June 21, 2011
8:30 a.m.-11 a.m.
National Press Club, 529 14th St, NW, 13th Floor, Washington, DC

On June 21, the George C. Marshall Institute will host a panel discussion brings together expert panelists to discuss and explore how cyber conflict can be mitigated. Is the cyberspace domain amenable to arms control solutions, and what would such solutions look like, or are the development of international norms more appropriate? On the other hand, given the unique nature of the cyber domain is strategic restraint by individual actors, as well as the resilient character of the domain itself, enough to mitigate the worst excesses of any cyber conflict? The aim of the discussion would be to generate a broad yet informed debate that can better inform policy makers on the issues at stake.

The panelists are as follows:

  • Dr. John B. Sheldon, Professor, School of Advanced Air & Space Studies, Maxwell AFB, Alabama, and Marshall Institute Fellow – Moderator
  • Mr. Robert J. Butler, Deputy Assistant Secretary of Defense for Cyber Policy, Office of the Secretary of Defense, Department of Defense. (Invited)
  • Mr. David E. Hoffman, Contributing Editor to Foreign Policy and The Washington Post, and Pulitzer Prize-winning author of The Dead Hand: The Untold Story of the Cold War Arms Race and its Dangerous Legacy (Doubleday, 2009).
  • Dr. Christopher A. Ford, Hudson Institute, Washington, DC
  • Dr. James A. Mulvenon, Defense Group Inc., Washington, DC
  • Professor Martha Finnemore, George Washington, University, Washington, DC

For reservations, email info@marshall.org or call 571-970-3180.

Leave a comment

Filed under Arms Control, Cyberpower, Cyberspace, Cyberwar, Speaking Engagements, Theory of Cyberpower

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s