
Managing Risk in the Age of Cyberterrorism
Setup
In an age of cyber warfare, where weapons are simply Internet-connected devices, are we prepared to face the evolving threat posed by state and non-state actors who would do us harm? As a recent attack in Ukraine has shown, hackers can and will cripple critical infrastructure by accessing control systems inside utilities. And we’ve seen time and again what happens when intruders gain access to critical networks, personal data, and intellectual property. What action should government, the private sector, and individuals be taking to prepare for the inevitability of cyberattacks, especially as the Internet of things complicates our interconnected lives?
- 2016 Festival
- Technology
- USA
- World
- Full transcript
Explore More
Technology
Can the data collected through smartphones, wearable sensors, and passive monitoring devices be turned into actionable knowledge about the environmental impacts on our health?...


From blockchain to back to school and virus-hunting to bridging divides, speakers at the 2021 Aspen Ideas Festival addressed issues in a new kind of world—one touched, and cha...

























Following the terror attacks on 9/11, attorney Kenneth Feinberg battled against cynicism, bureaucracy and politics to deliver monetary relief to victims’ families. He's featur...

