Search

2026 Cybercrime, Data Protection, and Transnational Cooperation

Overview

Cybersecurity is often thought to involve protecting one’s identity and sensitive information when online, but this is not nearly the full extent of the risk. Critical information and infrastructure can be vulnerable to attack by malicious actors, resulting in the loss or compromise of critical data, publication of sensitive materials, damage or destruction of systems, or other severe consequences.

The Cybercrime, Data Protection, and Transnational Cooperation seminar provides a thorough overview of cybercrime in its many forms, including in the context of prevention and transnational cooperation, as well as the prosecution of cybercrime. Prosecution can pose a variety of challenges, as it often involves bringing together multiple people across multiple departments and jurisdictions. Drawing from U.S. policy, legislative, institutional and prosecutorial experience, this seminar will integrate the selected topics through lectures, case studies and class discussion. Participants will also engage in in-depth study of cybercrime prevention, investigation, and prosecution while developing their skills.

The covered material will be of interest to policy makers, regulators, business leaders, government officials, prosecutors, criminal justice personnel, judges, attorneys, and academics, specifically in developing economies where cybercrime is emerging or may pose a particular threat.

Certification 

Upon successful completion of the seminar, each participant will be awarded a Certificate of Completion. Successful completion requires that a participant diligently attend all seminar sessions promptly and on time throughout the seminar, read all assignments, and participate in all group discussions and exercises. If a number of sessions are missed without proper reason, the ILI reserves the right to withhold certification.

Format

This seminar is currently offered in-person. Special requests to attend online must be submitted by email as early as possible. Requests will be considered on a case-by-case basis, taking into account the overall experience of each participant and the larger group. In-person seminars, even when being joined online, run from 9:30 am – 4:00 pm Washington, D.C., time.

Course Outline

Cybercrime

  • Defining and describing cybercrime, and understanding the systems involved
  • Hacking: Privacy, integrity, accessibility, and application
  • Bots, malware, spam, identity theft, phishing and other vulnerabilities and exploits
  • The Client/Server model: Peer-to-Peer (Gigatribe, BitTorrent, etc.); Darknets
  • Cloud Computing
  • Combating Cross-Border Cybercrime
  • Combating Cybercrime Locally, Regionally and Globally
  • Recent Developments

Managing Risk, Cyber Audits, Preventing Attacks, and Mitigating Damage

  • Data Protection
  • What systems can be affected and how are they vulnerable?
  • Internet of Things (IOT), Interconnected Systems (i.e. electrical grids, traffic control systems) and Devices (i.e. IP cameras and even smart locks)
  • Particular challenges for emerging economies

Prosecuting Cybercrime

  • Foundational elements
  • Challenges associated with prosecution
  • Investigating and preparing for trial
  • Relationship to other crimes, including Human Trafficking and Financial Crimes
  • Cross border challenges
  • Developing a robust framework upon which countries and courts can cooperate to prosecute offenders
  • Coordinating and educating all parties, including the police, other investigators, prosecutors, judges and the public

International Cooperation and Cyberwarfare

  • The role of state actors and case study
  • EU General Data Protection Regulation (GDRP)
  • The Convention on Cybercrime
  • Mutual assistance and evidence sharing

Course Advisor

Jane Rudy is a Cybersecurity Policy Writer at MIT Lincoln Laboratory. In both defense and research environments, Jane’s work focuses on implementing secure systems under the Risk Management Framework. She has supported both tactical and strategic roles implementing technical and policy-based security controls. Jane holds a BA in Political Science and International Affairs as well as an MA in Cybersecurity, both from Northeastern University.

International Law Institute
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.