CEPA
Photo: People pose in front of a display showing the word 'cyber' in binary code, in this picture illustration taken in Zenica December 27, 2014. A previously undisclosed hacking campaign against military targets in Israel and Europe is probably backed by a country that misused security-testing software to cover its tracks and enhance its capability, researchers said. Picture taken December 27, 2014. Credit: REUTERS/Dado Ruvic (BOSNIA AND HERZEGOVINA - Tags: SCIENCE TECHNOLOGY CRIME LAW)

Inside Cyber Diplomacy Redux: Episode III

Paul Ash, CEO of Christchurch Call Foundation, joins Jim Lewis and Chris Painter for a discussion on online safety.
By
September 19, 2025

CEPA’s Inside Cyber Diplomacy Redux podcast hosts foreign and tech policy leaders discussing the state of play in international cybersecurity policy. Engaging experts, innovators, and leaders around the globe, co-hosts Jim Lewis and Chris Painter shine a light on the international cybersecurity environment.  

In this episode, CEO of Christchurch Call Foundation Paul Ash discusses how to build coalitions that make technology safer. The Christchurch Call has found success working with governments, civil society, and tech stakeholders to move forward practical recommendations to counter terrorism and violent extremism online. The trio explores content moderation, regulatory approaches, and the impact of generative AI on extremist content. 

Guest:

  • Paul Ash, Chief Executive Officer, Christchurch Call Foundation 

Hosted by: 

  • Jim Lewis, Distinguished Fellow, Tech Policy, Center for European Policy Analysis 

Listen and subscribe on Spotify, Apple Podcasts, and wherever you get your podcasts. 

Listen Now

Never Miss an Episode
Subscribe wherever you get your podcasts to listen to our latest conversations.
Subscribe

Image Credit

Photo: People pose in front of a display showing the word 'cyber' in binary code, in this picture illustration taken in Zenica December 27, 2014. A previously undisclosed hacking campaign against military targets in Israel and Europe is probably backed by a country that misused security-testing software to cover its tracks and enhance its capability, researchers said. Picture taken December 27, 2014. Credit: REUTERS/Dado Ruvic (BOSNIA AND HERZEGOVINA - Tags: SCIENCE TECHNOLOGY CRIME LAW)