2000–2200 Bocca di Lupo

Cyber threats do not lend themselves to traditional security doctrines. What data techniques can be applied from other disciplines to protect critical state and commercial systems against cyber-attacks?

Contributors

Jane Fountain , Distinguished Professor of Political Science and Public Policy, and Adjunct Professor of Computer Science, University of Massachusetts Amherst

Moderator and Host: Greg Baxter, Global Head of Digital Strategy, Citi