Loading…
This event has ended. Create your own event → Check it out
This event has ended. Create your own
Columbia University’s Data Science Institute Presents:
DATA SCIENCE DAY

Authors/Collaborators are listed in alphabetical order.



View analytic
Wednesday, April 6 • 10:50am - 11:15am
Innovations to Keep Data Secure

Sign up or log in to save this to your schedule and see who's attending!

Jason Healey | Building a Defensible Cyberspace
Cyber attacks top the list of national security threats and also pose a threat to our personal finances, as recent data breaches at banks, credit card companies and businesses have shown. One of the main reasons that cyber threats are escalating is that for decades it has been far easier to attack than defend. Columbia’s School for International and Public Affairs (SIPA) has convened a New York Cyber Task Force to bring together policymakers and technologists in academia, banks, and other industries, to determine how to reverse the problem so that a dollar of defense buys more than a dollar of attack. A defensible cyberspace has checks and balances and a broad set of stakeholders acting as stewards. It can adapt to changing conditions, recover quickly after failure and scale up solutions. I will discuss what technologies and policies have been most successful to date and what more is needed.

Tal Malkin | Secure Computation: Encrypted Search and Beyond
Secure computation is one of the most exciting achievements in cryptographic research in the last few decades. It allows mutually distrustful parties to jointly perform computations on private data without revealing any extraneous information. Once a theoretical field, secure computation is becoming increasingly more practical and relevant to real-world applications. I will discuss a private database management system that we have developed, Blind Seer. This system allows clients to perform a rich set of queries over an encrypted database while keeping the data and query hidden. Blind Seer runs efficiently on a 100-million record, 10-terabyte database — two to 10 times slower than running insecure MySQL queries on a non-encrypted database. 


Moderators
avatar for Austin Long

Austin Long

Associate Professor of International and Public Affairs, School of International and Public Affairs
Austin Long is an assistant professor, teaching security policy. Long previously worked as an associate political scientist for the RAND Corporation, serving in Iraq as an analyst and advisor to the Multinational Force Iraq and the U.S. military. He also worked as a consultant to MIT Lincoln Laboratory, on a study of technology and urban operations in counterinsurgency. Long is the author of Deterrence - From Cold War to Long War: Lessons... Read More →

Speakers
avatar for Jason Healey

Jason Healey

Senior Research Scholar, School of International and Public Affairs
Jason Healey is a Senior Research Scholar at Columbia University’s School for International and Public Affairs specializing in cyber conflict, competition and cooperation. Prior to this, he was the founding director of the Cyber Statecraft Initiative of the Atlantic Council where he remains a Senior Fellow. He is the editor of the first history of conflict in cyberspace, A Fierce Domain: Cyber Conflict, 1986 to 2012 and co-authored the... Read More →
avatar for Tal Malkin

Tal Malkin

Associate Professor of Computer Science, Columbia Engineering
Tal Malkin is an associate professor of Computer Science at Columbia University, where she directs the Cryptography Lab. She received her Ph.D. in Computer Science from the Massachusetts Institute of Technology in 2000, and joined Columbia after three years as a research scientist in the Secure Systems Research Department at AT&T Labs - Research. Her research interests are in cryptography, security, complexity theory, and related... Read More →


Wednesday April 6, 2016 10:50am - 11:15am
Roone Arledge Auditorium Lerner Hall, Columbia University 2920 Broadway, New York, NY 10040

Attendees (8)