Keynote Threat Modeling and Constitutional Law Jennifer Granick

Channel:
Subscribers:
4,690
Published on ● Video Link: https://www.youtube.com/watch?v=dPCvsBqu6Uc



Duration: 0:00
27 views
0


At Black Hat USA 2025, Jennifer Granick—Surveillance and Cybersecurity Counsel at the American Civil Liberties Union—takes the keynote stage to make a bold case: we are long overdue for a new threat model, one that sees government surveillance not as a background risk, but as a primary threat to constitutional privacy.

Granick draws from decades of experience defending hackers, fighting surveillance overreach, and engaging with the security community since DEFCON 3. She challenges the audience to reconsider outdated assumptions about how the Fourth Amendment is interpreted and applied. While technology has made it easier than ever for governments to collect data, the legal system hasn’t kept pace—and in many cases, fails to recognize the sheer scope and sensitivity of personal information exposed through modern services.

Her talk doesn’t just raise alarm; it calls for action. Granick suggests that while legal reform is sluggish—stymied by a lack of political will and lobbying power—there’s an urgent opportunity for the technical community to step up. From encryption to data minimization and anonymization, technologists have the tools to protect civil liberties even when the law falls short.

The session promises to be a wake-up call for engineers, designers, policymakers, and privacy advocates. Granick wants attendees to leave not only more informed, but motivated to build systems that limit the unnecessary collection, retention, and exposure of personal data.

Her keynote also surfaces a critical cultural shift: from the “Spot the Fed” days of DEFCON to a more nuanced understanding of government roles—welcoming collaboration where it serves the public good, but not at the expense of unchecked surveillance.

This conversation reframes privacy as a design problem as much as a legal one—and one that requires collective effort to address. If the law can’t fix it, the question becomes: will the technology community rise to the challenge?

___________Guest:

Jennifer Granick, Surveillance and Cybersecurity Counsel at American Civil Liberties Union | On LinkedIn: https://www.linkedin.com/in/jennifergranick/

Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.com/

Marco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com/

___________

Episode Sponsors

ThreatLocker: https://itspm.ag/threatlocker-r974

BlackCloak: https://itspm.ag/itspbcweb

Akamai: https://itspm.ag/akamailbwc

DropzoneAI: https://itspm.ag/dropzoneai-641

Stellar Cyber: https://itspm.ag/stellar-9dj3

___________

Resources

Keynote: Threat Modeling and Constitutional Law: https://www.blackhat.com/us-25/briefings/schedule/index.html#keynote-threat-modeling-and-constitutional-law-48276

Learn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25

ITSPmagazine Webinar: What’s Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year’s Hacker Conference — An ITSPmagazine Thought Leadership Webinar | https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference

Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage

Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 https://itspm.ag/evtcovbrf

Want Sean and Marco to be part of your event or conference? Let Us Know 👉 https://www.itspmagazine.com/contact-us

___________

KEYWORDS

marco ciappelli, jennifer granick, black hat usa, surveillance, privacy, encryption, constitution, threat modeling, cybersecurity, civil liberties, event coverage, on location, conference




Other Videos By ITSPmagazine


2025-08-09How Novel Is Novelty? Security Leaders Try To Cut Through the Cybersecurity Vendor Echo Chamber
2025-08-09How Novel Is Novelty? Security Leaders Try To Cut Through the Cybersecurity Vendor Echo Chamber |...
2025-08-09The Agentic AI Myth in Cybersecurity and the Humanity We Risk When We Stop Deciding for Ourselves...
2025-08-07How to Lose a CISO in 10 Words (or Less) | Straight Talk, Not Spin: Black Hat’s Hard Truths
2025-08-07How to Lose a CISO in 10 Words (or Less) | Straight Talk, Not Spin: Black Hat’s Hard Truths | On...
2025-08-07How to Lose a CISO in 10 Words (or Less) | Straight Talk, Not Spin: Black Hat’s Hard Truths | On...
2025-08-04Solving GRC Fatigue: How AI Is Helping Compliance Teams Do More With Less | E-V-E GRC Origin Story
2025-08-04Solving GRC Fatigue: How AI Is Helping Compliance Teams Do More With Less | An E-V-E GRC Brand Or...
2025-08-04Leading Without Losing Yourself | A Conversation with Avani Desai | The Soulful CXO Podcast with ...
2025-08-04Solving GRC Fatigue: How AI Is Helping Compliance Teams Do More With Less | An E-V-E GRC Brand Or...
2025-08-03Keynote Threat Modeling and Constitutional Law Jennifer Granick
2025-07-30Creative Storytelling in the Age of AI: When Machines Learn to Dream and the Last Stand of Human ...
2025-07-30Creative Storytelling in the Age of AI: When Machines Learn to Dream and the Last Stand of Human ...
2025-07-30Creative Storytelling in the Age of AI: When Machines Learn to Dream & the Last Stand of Creativity
2025-07-30Black Hat 2025: More Buzzwords, Same Breaches? | What’s Heating Up Before Black Hat 2025: Top Tre...
2025-07-30Black Hat 2025: More Buzzwords, Same Breaches? | What’s Heating Up Before Black Hat 2025: Top Tre...
2025-07-30Black Hat 2025: More Buzzwords, Same Breaches? | What’s Heating Up Before Black Hat 2025: Top Tre...
2025-07-30What’s Heating Up Before Black Hat 2025: Top Trends Set to Shake Up this Year’s Hacker Conference
2025-07-30Making Honeypots Useful Again: Identity Security, Deception, and the Art of Detection | A Convers...
2025-07-30Making Honeypots Useful Again: Identity Security, Deception, and the Art of Detection | A Convers...
2025-07-30Making Honeypots Useful Again: Identity Security, Deception, and the Art of Detection | Sean Metcalf