Cloud computing has made the move from new concept to technology that your mother uses. We now are entrusting so many different types of data to the cloud from financial statements and credit card numbers to our music collection and private emails. Yet how secure is the cloud and how much control do we have over the data that we entrust to it? If that data is stolen, will we know and what can we do? Who has jurisdictional authority over the data we store and under what circumstances can it be given away? This panel will try to answer these questions and more as we explore the impact of the cloud and what it means for personal identity and security.
by Michael Bruemmer, Joseph DeMarco, Joe Ross, Terry Hemeyer and Monika Jedrzejowska
Over the past year, 90% of businesses have been hit by at least one IT security breach. What does this mean? Businesses should consider breaches a statistical certainty and be prepared. Breaches are not the only thing to worry about–most security incidents are not cyber-attacks, but process or other non-hacker issues, like employee activities outside the firm. And it’s not just an IT problem. The manner in how breaches occur, how companies respond and ensuing media coverage can destroy a brand, impacting the whole business. Today, leaders must know about technologies that enable companies to quickly respond and protect customers, plus communication techniques to ensure their brand weathers the storm. In this panel, you’ll hear from experts regarding crisis communications, legal issues and consumer concerns in the event of a breach. Learn how to be ready with a smart plan that includes proactive protection, company preparedness, customer communications and media outreach.
The benevolent Internet promotes expression, collaboration and experimentation. But the current legal scheme can make the Internet a place where digital tracks persist long after their intended use. In a world of d0xing and h8ing, we face a critical juncture for reconciling freedom of speech with privacy.
This panel will review of norms of online and offline conduct and suggest possible ways of striking a balance, without breaking the Internet along the way.
1. Reputation Bankruptcy may be an option to rehabilitate a ruined reputation in the reputation economy, and a solution to peer-to-peer privacy problems.
2. (Re)Contextualization has pros and cons as a remedy in a legal scheme when third-party online speech is treated differently from printed speech.
3. Disownership of Content: Should "disown this" features become the norm, allowing users to release content into the wild?
4. Ephemerality: Should certain types of content be designed to degrade over time?
9th–13th March 2012