In the early days of the Internet, technical innovation shaped its future. Today, issues of economics, market dynamics, incentives, and some fundamental aspects of networked systems shape the future. This talk will summarize eleven forces that are shaping the future of the Internet, and make an argument that we are at a point of inflection in the character of the Internet, as profound as the change in the 1990’s when the Internet was commercialized.
Hardly a week goes by without a report about another cyberattack. With almost every major organization having been victim, including most government organizations, such as Equifax, Target, Sony, NSA, and the US Office of Personnel Management, you might ask: "Why are these problems not being fixed? Who is in charge here?" The answer is that nobody is in charge, and that is the secret of the Intenet's success. The governance structure of the Internet is bottom-up, not top-down. However, certain sorts of problems are hard to solve in a bottom-up governance regime. In this session we will discuss the history of Internet governance, different points of view about the future of Internet governance, and how different aspects of cyber-security depend on different actors for their solution. We will use a case study of a current security challenge to illustrate how problems get solved in a fluid space of governance organizations.
Hardly a week goes by without a report about another cyberattack. With almost every major organization having been victim, including most government organizations, such Target, Sony, NSA, US Office of Personnel Management, why would you expect your organization to be immune? By many projections, the worse is yet to come. Although much progress is being made in improving hardware and software, studies have reported that between 50-70% of all cyberattacks are aided or abetted by insiders (usually unintentionally), so understanding the cybersecurity governance and organizational culture is increasingly important. In this session, we will discuss the managerial, organizational, and strategic aspects of cybersecurity with an emphasis on the protection of the nation's critical infrastructure.
2016 MIT Information and Communication Technologies Conference