With Hacker Summer Camp approaching next week, it's an exciting time for the cybersecurity community, as it encompasses three major conferences: DEF CON, Black Hat, and BSides in Las Vegas. These conferences are renowned for bringing together security experts, hackers, policymakers, and professionals to discuss and exchange ideas on cybersecurity and technology policy.

In a recent interview, Alex Botting and Jen Ellis from the Center for Cybersecurity Policy & Law sat down with Beau Woods and Harley Geiger, two experts in the cybersecurity field. Beau plays a vital role in DEF CON's Policy Department, focusing on facilitating productive conversations between hackers and policymakers; and Harley is a cybersecurity attorney and policy expert at Venable LLP, where he works on shaping technology policy.

For those who want to understand the benefit of bringing together policymakers and security experts, get the inside scoop of what to expect at this year’s events, and know how to make the most out of their time in Vegas, check out the newest Distilling Cyber Policy episode on Spotify, Apple, or Google

Tanvi Chopra

Read Next

Meeting the Homeland Drone Threat: A Table-Top Exercise Exposes the Gaps in Authorities and Resources

A tabletop exercise explored the threat posed by the malicious use of drones to the homeland, involving public and private sector participants responding to hypothetical attacks on an air base, electricity grid, and a local hockey game.

State, Fed Cyber Leaders Discuss Resilience in Light of Evolving Threat, Budget Landscapes

State and federal cyber leaders convened in Austin to discuss the Texas Cyber Command, utilizing Zero Trust strategies in an era of AI, and improving Federal to State cyber cooperation in an era of constricting resources and increased threats.

NIST: Analyzing Collusion Threats in the Semiconductor Supply Chain

Semiconductors power our modern technology and are often considered “the oil of the 21st century.” But producing these chips is not without challenges to the supply chain, including IP theft, counterfeiting, and reverse engineering.