TOPICS INCLUDE:
• Jurisdiction
• Threat assessment
• Information assurance
• Decentralized systems
• Recovery and response
• Lessons for design and engineering
• Trust boundaries
• Robust structures
• Strategy and uncertainty
CONFERENCE OVERVIEW
The remarkable success of open, flexible, and decentralized systems, such as the Internet, the Web, or the global financial system, arises because they scale and evolve so effectively. But our approaches for making systems robust against a variety of risks, including attacks, free riders, and other behaviors that impact systems and their users, have traditionally depended on boundaries and central control. We struggle with the hard questions of ensuring resiliency while retaining the benefits.
Traditionally, efforts to protect personal and corporate information have focused on protecting the containers and physical IT assets at a location. This job is naturally suited to governments. But as information becomes detached from physical and fixed containers, the responsibility for keeping information reliable and information systems resilient no longer matches the physical boundaries and topologies of nations. While countries are protecting themselves from cyber-attacks, who protects cyberspace itself? And, if network businesses win by cultivating the best set of options against an unknowable future, what tools help them manage fear as they embrace uncertainty and risk?