2023 Agenda
- Jump to:
- At a Glance
- Day 1
- Day 2
- Print-friendly Format
Day 1 - Wednesday, March 29, 2023
7:30 |
Registration and Continental Breakfast |
8:45 |
Co-Chairs’ Opening Remarks |
9:00 |
FIRESIDE CHAT: U.S. Encryption Controls and China |
9:45 |
Managing the Real-Life Aftermath of the U.S. Semiconductor and Advanced Computing Rule: Practical Insights on Supply Chain and the Compliance Path Ahead |
10:45 |
Extended Networking Break |
11:15 |
Practitioner Recommendations for Next Generation Global Multilateral Export Control Regimes |
12:15 |
Luncheon |
1:30 |
Complying with BIS’ Advanced Computing Controls on China: Decoding Licensing, Impacted ICs, and Gap Analysis |
2:30 |
Navigating the Finer Points of Category 5, Part Two, the Final “Cyber Rule” |
3:30 |
Networking Break |
4:00 |
Optimizing Your Encryption Compliance Program: Revisiting Your Organization’s Risk Profile and Detecting Weak Spots |
5:00 |
Close of Day One |
Day 2 - Thursday, March 30, 2023
7:30 |
Registration and Continental Breakfast |
8:55 |
Co-Chairs’ Opening Remarks |
9:00 |
Russia Sanctions and their Intersection with Encryption Controls |
10:00 |
Quantum Computing and Cryptography: Perspectives on the Next Wave of End-to-End Encryption |
10:45 |
Networking Break |
11:00 |
FIRESIDE CHATSanctioning Source Code Versus Privacy |
11:30 |
The Intersection of Export Controls, Sanctions, Human Rights, and Surveillance: Due Diligence Best Practices for Managing Legal and Reputational Risks |
12:15 |
India: SCOMET Developments, Encryption Terms of Conditions and Trade Control Updates |
1:00 |
Luncheon |
2:15 |
Cloud Encryption and Sharing and Storing of Cloud Data: Mitigating Data Privacy and International Tech Transfer Risk |
3:00 |
Combatting Ransomware and Deepfakes |
3:45 |
Closing Roundtable Discussion: More Takeaways for 2023 and Beyond |
4:00 |
Close of Conference |
Day 1 - Wednesday, March 29, 2023
7:30 |
Registration and Continental Breakfast |
8:45 |
Co-Chairs’ Opening Remarks![]() Anne Marie Griffin ![]() Roszel C. Thomsen II |
9:00 |
FIRESIDE CHAT: U.S. Encryption Controls and China![]() Thea D. Rozman Kendler Moderator:![]() Brandon L. Van Grack |
9:45 |
Managing the Real-Life Aftermath of the U.S. Semiconductor and Advanced Computing Rule: Practical Insights on Supply Chain and the Compliance Path Ahead![]() Joshua Fitzhugh ![]() C. Devi Bengfort Keller ![]() Christina Zanette ![]() Matt Bell
|
10:45 |
Extended Networking Break |
11:15 |
Practitioner Recommendations for Next Generation Global Multilateral Export Control Regimes![]() Emily Benson ![]() Mathilde Latour ![]() Richard Tornberg
|
12:15 |
Luncheon |
1:30 |
Complying with BIS’ Advanced Computing Controls on China: Decoding Licensing, Impacted ICs, and Gap Analysis![]() Veronica Palacios ![]() Mark Renfeld
|
2:30 |
Navigating the Finer Points of Category 5, Part Two, the Final “Cyber Rule”![]() Michael F. Angelo ![]() Doron Hindin The long-anticipated “cyber rule” and debated export controls on intrusion software have balanced U.S. foreign policy and national security concerns with the need for maintaining a regulatory framework that allows for legitimate cybersecurity transactions. The language of the interim rule reflected several years of negotiations codified in the multilateral 1996 Wassenaar Arrangement and incorporated significant U.S. stakeholder input received by BIS over the years through its various attempts to propose the controls. How should industry be applying this rule? What questions should they be asking outside counsel to ensure compliance?
|
3:30 |
Networking Break |
4:00 |
Optimizing Your Encryption Compliance Program: Revisiting Your Organization’s Risk Profile and Detecting Weak Spots![]() Jason Rhoades ![]() Garisma Kadakia ![]() Michelle Aragon ![]() Ajay Kuntamukkala
|
5:00 |
Close of Day One |
Day 2 - Thursday, March 30, 2023
7:30 |
Registration and Continental Breakfast |
8:55 |
Co-Chairs’ Opening Remarks![]() Anne Marie Griffin ![]() Roszel C. Thomsen II |
9:00 |
Russia Sanctions and their Intersection with Encryption Controls![]() Michael S. Casey ![]() Sven De Knop ![]() Brian J. Egan ![]() Kevin J. Wolf
|
10:00 |
Quantum Computing and Cryptography: Perspectives on the Next Wave of End-to-End Encryption![]() Dr. Venu Ranganathan ![]() Jai Singh Arun ![]() Dr. Amit Elazari ![]() Anne Marie Griffin As computers become more powerful, more resources become available via the cloud, and existing cryptographic systems such as PKI are already susceptible to exploitation, it is only a matter of time before data protection is weakened on a global scale. Where does the future of quantum computing stand as well as quantum-based cryptography? |
10:45 |
Networking Break |
11:00 |
FIRESIDE CHATSanctioning Source Code Versus Privacy![]() Paul Ahern Following two cyber-attacks on digital transaction tools that provide privacy for cryptocurrency transactions, the U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) has sanctioned these “currency mixers”. Is sanctioning the source-code behind these digital tools in the name of national security more important than personal privacy? |
11:30 |
The Intersection of Export Controls, Sanctions, Human Rights, and Surveillance: Due Diligence Best Practices for Managing Legal and Reputational Risks![]() Kevin Cuddy ![]() Brooks Allen
|
12:15 |
India: SCOMET Developments, Encryption Terms of Conditions and Trade Control Updates![]() Rohit Jain ![]() Garima Prakash
|
1:00 |
Luncheon |
2:15 |
Cloud Encryption and Sharing and Storing of Cloud Data: Mitigating Data Privacy and International Tech Transfer Risk![]() Chris Timura ![]() Daniel Fisher-Owens How are organizations protecting cloud data and what are the most important key encryption features?
|
3:00 |
Combatting Ransomware and Deepfakes![]() David Aaron ![]() Tom Winterhalter Even if your organization has not been the targeted victim of a ransomware or deepfake attack, you have likely felt their impact. The cascade of attacks has caused a ripple effect through value chains, straining almost every organization’s ability to deliver their services and products. What can you do to disrupt the ransomware/deepfake business model?
|
3:45 |
Closing Roundtable Discussion: More Takeaways for 2023 and Beyond![]() Roszel C. Thomsen II |
4:00 |
Close of Conference |