top of page

Publications, Presentations, and Press - Melanie Teplinsky

CYBERSECURITY PUBLICATIONS

  • "We Need a Cybersecurity Paradigm Change," The Hill, February 15, 2022 (co-authored with Franklin Kramer and Robert Butler), available online at https://thehill.com/opinion/cybersecurity/594296-we-need-a-cybersecurity-paradigm-change/.

  • "Cyber Security for Innovative Small and Medium Enterprises and Academia," Atlantic Council Report, January 2022 (co-authored with Franklin Kramer and Robert Butler).   

  • “Cyber Security and Tailored Deterrence,” Readings in American Foreign Policy, Glenn P. Hastedt (Rowman & Littlefield, 2017) reprinted from Atlantic Council, January 2014 (co-authored with Franklin Kramer).

  • “Cybersecurity and the Cyberthreat Deterrence Trend,” Recent Trends in National Security Law, (Aspatore Books, 2015).

  • “Cyber Sanctions After Sony,” The Hill, February 5, 2015 (co-authored with Franklin Kramer), available online at http://thehill.com/blogs/congress-blog/technology/231779-cyber-sanctions-after-sony.

  • “Stronger Locks and Taller Fences Won’t Stop Cybercrime,” 1776, November 2014, available online at http://1776dc.com/news/2014/11/19/stronger-locks-and-taller-fences-wont-stop-cybercrime/.

  • “Fiddling on the Roof: Recent Developments in Cybersecurity,” American University Business Law Review, Spring 2013, available online at http://www.aublr.org.

  • “Mapping the Cybersecurity Landscape,” American University Law Review, Spring 2013 (co-authored with Jorge Contreras and Laura DeNardis).

  • “Critical Infrastructure Protection Policy in the US,” Cybercrime: A Multidisciplinary Approach, Ghosh & Turrini (Berlin: Springer-Verlag, 2010).

  • “Spurring the Private Sector: Indirect Federal Regulation of Cybersecurity in the US,” Cybercrime: A Multidisciplinary Approach, Ghosh & Turrini (Berlin: Springer-Verlag, 2010) (co-authored with Stewart Baker).

  • “The Legal Significance of Information Assurance Standards,” The Executive’s Desk Book on Corporate Risks and Responses for Homeland Security, 2003 (co-authored with Stewart Baker).

  • “The Response to Cyberattacks: Balancing Security and Cost,” The International Lawyer, Vol. 36, No. 1, Spring 2002 (co-authored with Peter Lichtenbaum).

  • “Should a Corporation Report a Breach to Law Enforcement?” Secure Business Quarterly, Third Quarter, 2001 (co-authored with Maury Shenk).

Christian Science Monitor Columns (2015-2017)

PRESENTATIONS AND PRESS

  • Featured Guest, "We're In! Inside the Bightest Minds in Cybersecurity," A Synack Podcast Production, Episode 25, released December 2022 (recorded Spring 2022), available online at https://www.synack.com/were-in-synack-podcast/.

  • Panelist, "Follow the Money: Current Issues in Crypto and Ransomware," TLS Webinar Series - Combating Ransomware, American University Washington College of Law, November 23, 2021.

  • Featured Guest, "Our Curious Amalgam," ABA Antitrust Section Podcast (exploring the "Right to Be Forgotten"), March 2020.

  • Panelist, “Can Companies and the Government Really Work Together on Cybersecurity?” Association of Corporate Council (ACC) Foundation Cybersecurity Summit, January 2019.

  • Moderator, “The Fusion of Drones and Artificial Intelligence: Benefits, Threats, and Law Pertaining to National Security,” National Security Law Brief Symposium, American University Washington College of Law, November 6, 2018.

  • “Exploiting Domestic Legal Frameworks to Raise Costs to Cyber Adversaries,” Atlantic Council Private Workshop, Washington, D.C., April 4, 2018.

  • Presenter, AU Cybersecurity Faculty Workshop, American University, July 13, 2017.

  • Panelist on NPR’s Midday, May 9, 2017, available online at http://wypr.org/post/online-privacy-trump-era.

  • Moderator, “Cybertheft Panel,” Cybersecurity in an Age of Uncertainty: U.S.-Israel Perspectives, American University’s Center for Israel Studies, March 20-21, 2017.

  • Moderator, Cyberspace and Hacking: Meeting the Challenges of the Digital Age, National Security Law Brief Spring Symposium, American University Washington College of Law, March 1, 2017.

  • Radio Interview, NPR’s All Things Considered, “Is Trump Tweeting from a Secure Smartphone?  The White House Won’t Say” February 3, 2017, available online at http://www.npr.org/sections/alltechconsidered/2017/02/03/513256171/is-trump-tweeting-from-a-secure-smartphone-the-white-house-wont-say.

  • Quoted in “Executive Order on Cyber Likely Coming Today,” Politico, January 31, 2017, available online at http://www.politico.com/tipsheets/morning-cybersecurity/2017/01/executive-order-on-cyber-likely-coming-today-218501

  • Co-Chair, “Leveling the Playing Field: Exploring Private Sector Responses to Cyber Theft,” Atlantic Council Private Workshop, Washington, D.C., June 17, 2016.

  • Quoted in “Experts: Obama’s Color-Coded Rankings Oversimplify Cybersecurity Threats,” The Christian Science Monitor, July 26, 2016, available online at http://www.csmonitor.com/World/Passcode/2016/0726/Experts-Obama-s-color-coded-rankings-oversimplify-cybersecurity-threats

  • Quoted in “The FBI’s Court Order Against Apple May Violate the First Amendment,” Center for American Progress, February 25, 2016, available online at https://thinkprogress.org/the-fbis-court-order-against-apple-may-violate-the-first-amendment-e085a5d8c702#.qo5qvw78a.

  • Speaker, “Overview of EU Data Protection Framework” Who Owns Your Content? Data Privacy and Intellectual Property in the Internet Age, American University IP Brief 4th Annual Symposium, American University Washington College of Law, February 18, 2016.

  • Guest, Steptoe Cyberlaw Podcast, Episode 98: “The Europocrisy Prize and PTSD from the Crypto Wars,” January 25, 2016.

  • Quoted in “Google Bets on Computers That Learn From Mistakes,” Voice of America News, November 12, 2015, available at http://www.voanews.com/content/google-bets-on-computers-that-learn-from-mistakes/3054503.html.

  • Panelist, “Conflict and Cooperation in Cyberspace: Threat or Promise?” American University School of International Service, October 14, 2015.

  • Moderator, “CyberRisk Wednesday: Rethinking Commercial Espionage,” Atlantic Council, Washington, D.C., July 29, 2015.

  • Panelist, “Crypto History: Diagramming the Crypto Wars Through the Present,” AccessNow Crypto Summit, Washington, D.C., July 15, 2015.

  • Panelist, “Protecting Vulnerable Information from Cyberattacks,” National Security Law Brief, American University Washington College of Law, February 19, 2015.

  • Panelist, “Cybersecurity,” Government Contracts 2014, Practicing Law Institute, Washington, D.C., September 18, 2014.

  • Panelist, “Offensive Cyber Operations or Cyber Self-Defense: A Simulation,” Cybersecurity Law Institute, Georgetown University Law Center, May 22, 2014.

  • Quoted in “U.S. Proposes Minimal Corporate Cybersecurity Standards,” Reuters, October 23, 2013, available at http://www.reuters.com/article/2013/10/22/net-us-usa-cybersecurity-standards-idUSBRE99L1LR20131022.

  • Panelist, “What Directors Need to Know About Technology and Cybersecurity,” National Association of Corporate Directors, September 11, 2013.

  • Co-Chair and Moderator, “Cybersecurity 2013: What Every CIO Should Know,” American University Kogod School of Business, Center for Information Technology and the Global Economy 2013 Executive Program, April 19, 2013.

  • Panelist, “Sweet Success of Life,” American University, Kogod Women in Business, April 16, 2013.

  • Quoted in “US: Hacking Attacks Are Constant Topic of Talks with China,” Charlotte Observer, February 2013, available at http://www.charlotteobserver.com/2013/02/19/3865093/us-hacking-attacks-are-constant.html.

  • Moderator, “The Law of Cyber Warfare: Can the Current Legal Regime Hack It?” American University Washington College of Law, November 8, 2012.

  • Moderator, “Chinese Cyber Espionage & the Global Cyberthreat: An Insider’s View,” American University School of International Service, October 26, 2012

  • Opening Remarks, “America the Virtual: Security, Privacy and Interoperability in an Interconnected World,” American University Law Review Annual Symposium, American University, October 25, 2012.

  • Participant (Invitation Only), “Cyber Offense Strategies: The Private Sector and Legal Implications,” Atlantic Council, October 15, 2012.

  • Panelist, "Digital Media Cyber Policy," Global Social Media Research Symposium, American University School of International Service, March 23, 2012.

  • Panelist, “Privacy Concerns Arising From Advances in Technology,” Whose Information Is It Anyway?  Health Information Privacy in the Digital Age, American University Washington College of Law, February 14, 2012.

  • Panelist, “Ethical, Privacy, and Budgetary Considerations of Personalized Medicine,” Drugs, DNA, and You: Personalized Medicine and Genomics in the 21st Century, American University Washington College of Law, February 15, 2011.  For transcript, see Berkman, Ben; Brandenburg, Stacey M.; Teplinsky, Melanie; Rosenkrans, Wayne; and Wiley, Lindsay (2011) "Panel 2: Ethical, Privacy and Budgetary Considerations of Personalized Medicine," Health Law and Policy Brief: Vol. 5: Iss. 2, Article 3, available at: http://digitalcommons.wcl.american.edu/hlp/vol5/iss2/3.

  • Invited Speaker, “The Role of Information Assurance Standards in Tort Law,” Software, Security and Liability Symposium, Seton Hall Law School, November 15, 2002.

  • “Cybersecurity Law: What’s at Stake,” Network World, July 29, 2002 (co-authored with Stewart Baker).

  • Panelist, “Defending the Fortress Against Cybercrime and Cyberfraud,” The Law of Cyberbanking and Electronic Commerce, Washington, D.C., February 7, 2002.

  • Quoted as cybersecurity expert in San Francisco Chronicle, New Jersey Star-Ledger, and other publications, Fall 2002.

  • Speaker, “Data Security in the Financial Sector,” International E-Commerce Conference, American Conference Institute, New York, April 2001.

  • Speaker, “WTO and E-Commerce,” International Law Institute, Washington, D.C., 2001.

  • Rapporteur, “Joint OECD-Private Sector Workshop on Electronic Authentication,” 1999.

  • “Unbundling: Rethinking Digital Identity in Cyberspace,” accepted for presentation at the International Association of Science and Technology for Development conference in 1999 (co-author).

  • “Digital Identity,” Legal/Technical Architectures of Cyberspace, Harvard Law School, December 6, 1998.

 

bottom of page