Crypto War II: Protecting the Infrastructure

COLUMBUS, OHIO---On April 15, 2015, Interhack founder C. Matthew Curtin issues a call to action to security professionals: recognize the threat, take responsibility for defense, and exercise the right to use strong technology to protect the infrastructure.

During the 1990s, private security professionals and government agencies waged a battle over the control of cryptographic technology known generally as the Crypto Wars. Recent statements by the Director of the FBI James Comey, President Obama, and UK Prime Minister David Cameron indicate that we are headed into another Crypto War, where governments want to be able to compel private citizens and organizations to allow access to their information on the power of a warrant. With private organizations suffering expensive and embarrassing data breach incidents and government agencies working to undermine security in Internet standards and US companies' products, a path forward to protecting US critical infrastructure must be charted. This presentation highlights critical aspects of the 1990s Crypto Wars, and presents the proper role of government and private security professionals for securing the United States against its enemies.

Register for the event online at

About Central Ohio ISSA

Columbus chapter of this not-for-profit organization, and since 1989 we have been the voice of security in the metro area. Our 230+ members know that our forums will provide a venue for knowledge-share, networking, and career growth. When you attend one of our events you may find at your table a CISO of a Fortune 1000 firm, a security architect, a security analyst, a privacy officer, an attorney, and/or a security consultant. Diverse backgrounds, different points of view, a wide range of infosec experience and talent spanning every market vertical—all oriented towards addressing security issues faced by practitioners and leaders.

About Interhack

Interhack is a computer expert firm focused in cybersecurity and analysis of computer data. The firm uses teams of experts to conduct data breach analysis, incident response, penetration testing, application security assessment, vulnerability assessment, and other operations throughout North America. The firm's experts are often called to testify in matters ranging from computer crime to privacy and intellectual property theft to technology patent cases. Our experience includes civil, criminal, administrative, and legal adjudication, having been engaged by plaintiffs, defendants, and the courts directly. Interhack is on the web at