Past Events

ILI Hosts
ILI Hosts "Combating Global Coronavirus: Assessment of Past Lessons & Future Outlook"
Date: Tuesday, April 14th, 2020 2:00 PM-4:00 PM Host: International Law Institute Opening Remarks: Prof. Don Wallace, Chairman at the International Law Institute Moderator: Prof. Yonah Alexander, Director of the Inter-University Center for Terrorism Studies, Senior Fellow at th...
ILI Hosts “Combating Global Coronavirus: From Isolation to Int'l Cooperation” Conference
ILI Hosts “Combating Global Coronavirus: From Isolation to Int'l Cooperation” Conference
On March 26, 2020, the International Law Institute was proud to support and co-host with the Inter-University Center for Terrorism Studies [IUCTS] its conference on “Combating Global Coronavirus: From Isolation to International Cooperation” held as part of Special Ambassador’s Forum series. T...
IUCTS Feb 6 2020 Middle East Security Challenges: Past Lessons and Future Outlook
IUCTS Feb 6 2020 Middle East Security Challenges: Past Lessons and Future Outlook
Speaker: Ambassador Stuart Eizenstat Opening remarks: Professor Don Wallace Jr. International Law Institute and Inter University Center for Terrorism Studies
2019 Global Terrorism Index
2019 Global Terrorism Index
Featuring Col. Serge Stroobants, Director of Operations for Europe and MENA at the Institute for Economics and Peace (Brussels). December 16, 2019 (2:00-3:30 PM) Co-Sponsors: Inter-University Center for Terrorism Studies Inter-University Center for Legal Studies, at the International Law Institut...
Application of Blockchains to DoD Microelectronics Supply Chain
Application of Blockchains to DoD Microelectronics Supply Chain
In this presentation Nikhil Shenoy will review Colvin Run's microelectronics blockchain product and review the application of blockchains to the DoD microelectronic supply chain. This talk will focus on the importance of the U.S. semiconductor industry and review problems and facing the current micr...
ICTS Event, Technology and Security, November 18, 2019
ICTS Event, Technology and Security, November 18, 2019
“Understanding how technology evolves is essential for the United States to continue to maintain global leadership, as well as to ensure economic prosperity and national security. Dr. Daniel Gerstein, a leading technology expert, discuss his new book “The Story of Technology: How We Got Here and...

Thursday, August 16th, 2018
Time: 2:00pm-3:00pm
Location: Potomac Institute for Policy Studies
901 N. Stuart St. Suite 1200
Arlington, VA 22203

Speaker: Kevin Zawicki, Director of Customer Solutions, Guardtime Federal, LLC

The promise of an immutable public trust anchor is a driving force behind the excitement to apply Distributed Ledger Technology (DLT) blockchains to many business processes. Unfortunately, some key features of DLTs make them unattractive to, and potentially unusable for, certain customers. Fortunately, there are other "blockchain" technologies available that can be used to provide a desired immutable public trust anchor without some of the challenges associated with DLTs. Mr. Zawicki will discuss use cases showing how one of these alternate technologies effectively leverages a public trust anchor in a federated execution business process to allow distributed verification, assuring end-to-end integrity of the data, the business process, and even the product.

Prior to joining Guardtime Federal in 2015, Mr. Zawicki spent 20 years in various capacities working in acquisition for the DoD. He started as a program analyst at the Ballistic Missile Defense Organization, then moved to the Air Force's B-2 program. He began taking on System Administration duties for local networks and eventually transitioned to full-time IT support for the Directorate of Special Programs, Air Force Acquisition. For the last 12 years of his tenure, he served as the IT Lead for the Air Force Rapid Capabilities Office.

Mr. Zawicki has a Bachelor of Mechanical Engineering from the University of Delaware and a Master of Engineering from Carnegie Mellon University.

About the Hardware Security Symposium Speaker Series

Microelectronics are key components in our defense systems, and assuring that they are both readily available and secure is critical for US national security. Hardware-based threats can have serious impacts on military or critical infrastructure, and hardware vulnerabilities include malicious insertions, Trojan horses, counterfeit parts, and rapid obsolescence. While the USG has made large investments in software-focused cybersecurity, hardware-based approaches have not received as much attention. The Hardware Security Symposium Speaker Series brings together leading experts in Trusted microelectronics from academia, government, and Industry, to discuss hardware security threats, and ways to mitigate them.

Mr. Zawicki will present in person. Attendees are encouraged to join us at the Potomac Institute. For those unable to attend in person, dial-in information will be sent upon confirmation of your RSVP.

RSVP is required. Please send your name and affiliation to Chloe Hite at This email address is being protected from spambots. You need JavaScript enabled to view it.