Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Technology
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts112/v4/51/56/f0/5156f0ce-da99-1a20-0ea5-de02d874a713/mza_5243180606540800628.jpg/600x600bb.jpg
Cyber From The Start
Center for Strategic and International Studies
13 episodes
8 months ago
The Cyber from the Start podcast unveils the roots of today’s cybersecurity policies for critical infrastructure, surveillance, espionage, warfare and privacy. James A. Lewis interviews the people who helped lay the foundations for these policies before cybersecurity gained the mass attention it has today.
Show more...
Technology
Tech News
RSS
All content for Cyber From The Start is the property of Center for Strategic and International Studies and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
The Cyber from the Start podcast unveils the roots of today’s cybersecurity policies for critical infrastructure, surveillance, espionage, warfare and privacy. James A. Lewis interviews the people who helped lay the foundations for these policies before cybersecurity gained the mass attention it has today.
Show more...
Technology
Tech News
https://megaphone.imgix.net/podcasts/489ae9ba-49d4-11ea-bca3-438eddf50491/image/uploads_2F1581098660551-l6610lxc8pd-a12f62491975549f0837642d78b62453_2FPodcast_CyberFromTheStart_FINAL.jpg?ixlib=rails-4.3.1&max-w=3000&max-h=3000&fit=crop&auto=format,compress
Building Cybersecurity with Eli Sugarman Part 2
Cyber From The Start
19 minutes
5 years ago
Building Cybersecurity with Eli Sugarman Part 2
In this episode, Jim Lewis continues talking with Eli Sugarman, program officer at the William and Flora Hewlett Foundation about the future of cybersecurity.
Cyber From The Start
The Cyber from the Start podcast unveils the roots of today’s cybersecurity policies for critical infrastructure, surveillance, espionage, warfare and privacy. James A. Lewis interviews the people who helped lay the foundations for these policies before cybersecurity gained the mass attention it has today.