Discussion Post 1: Find a Cybersecurity-related current event, activity, or development in the news. In your discussion post, briefly summarize the event and reflect on its significance. You should use any legitimate news source (television, internet, periodicals, etc.) to support your topical input. Questions to address might include: How does the event relate to issues addressed in class? How might similar situations be mitigated? What is the broader impact of the event (e.g., nationally, globally, etc.) Include a link to the story or a citation so that others may read the story. Discussion Post 2: As Congress actively works different versions of Cybersecurity bills in both the Senate and the House of Representatives, what are the obstacles to coming together for a joint resolution bill that could be sent to, and signed, by the President of the United States? Discussion Post 3: After reading all of the techniques, the one that may have the potential for massive political disruption is the Deep Fakes technique. When the US Director of National Intelligence tells congress that he is essentially in fear regarding the impact of a successful deep fake from a nation-state or terrorist organization, and that there is no real defense in place — that should be a top issue of concern. So, let’s discuss our thoughts on how to handle Deep Fakes. What can a nation-state do to respond to high quality uses of this technology? What would we do if someone was able to impersonate the leader of another nation supposedly starting a war, or our own president giving a speech that is extraordinary in nature against a social class or another nation?

