
Managing Risk in the Age of Cyberterrorism
Setup
In an age of cyber warfare, where weapons are simply Internet-connected devices, are we prepared to face the evolving threat posed by state and non-state actors who would do us harm? As a recent attack in Ukraine has shown, hackers can and will cripple critical infrastructure by accessing control systems inside utilities. And we’ve seen time and again what happens when intruders gain access to critical networks, personal data, and intellectual property. What action should government, the private sector, and individuals be taking to prepare for the inevitability of cyberattacks, especially as the Internet of things complicates our interconnected lives?
- 2016 Festival
- Technology
- USA
- World
- Full transcript
Explore More
Technology
Meet Kistein Monkhouse, a 2022 Aspen Ideas: Health Fellow who's bridging gaps in patient/provider communication with a storytelling app that empowers people to own the narrati...

Meet Neale Batra, a 2022 Aspen Ideas: Health Fellow who's on a mission make the field of epidemiology more efficient, collaborative, and equitable through open-source software...

Meet Lucy He, a 2022 Aspen Ideas: Health Fellow who's using technology and policy change to address critical delays in patient care caused by the "prior authorization" process...
Can the data collected through smartphones, wearable sensors, and passive monitoring devices be turned into actionable knowledge about the environmental impacts on our health?...


From blockchain to back to school and virus-hunting to bridging divides, speakers at the 2021 Aspen Ideas Festival addressed issues in a new kind of world—one touched, and cha...

























Following the terror attacks on 9/11, attorney Kenneth Feinberg battled against cynicism, bureaucracy and politics to deliver monetary relief to victims’ families. He's featur...