Weaponization of the Internet
Ted Schlein, General Partner, Kleiner Perkins
Nathaniel Gleicher, Head of Cyber Security, Facebook
Del Harvey, Vice President, Trust and Safety, Twitter
Robert Joyce, Senior Advisor, National Security Agency
Peter Warren Singer, Strategist, New America
The internet promised all an equal voice in public discourse, but bots and rogue advertising are being used to manipulate public opinion, critically threatening public dialog. Globally, nation states, partisan agencies and political parties have grabbed the internet & social media reins to spread disinformation. This panel explores issues involved in controlling the internet, censorship and the impact on democracy.
Видео Weaponization of the Internet канала RSA Conference
Nathaniel Gleicher, Head of Cyber Security, Facebook
Del Harvey, Vice President, Trust and Safety, Twitter
Robert Joyce, Senior Advisor, National Security Agency
Peter Warren Singer, Strategist, New America
The internet promised all an equal voice in public discourse, but bots and rogue advertising are being used to manipulate public opinion, critically threatening public dialog. Globally, nation states, partisan agencies and political parties have grabbed the internet & social media reins to spread disinformation. This panel explores issues involved in controlling the internet, censorship and the impact on democracy.
Видео Weaponization of the Internet канала RSA Conference
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![The 5 Most Dangerous New Attack Techniques and How to Counter Them](https://i.ytimg.com/vi/xz7IFVJf3Lk/default.jpg)
![Insights from NSA’s Cybersecurity Threat Operations Center](https://i.ytimg.com/vi/C7hHSdp6JhI/default.jpg)
![Think and Act Like a Hacker to Protect Your Company’s Assets](https://i.ytimg.com/vi/kZ99jvX3Elo/default.jpg)
![The Fallacy of the "Zero-Trust Network"](https://i.ytimg.com/vi/tFrbt9s4Fns/default.jpg)
![Three Things the Security Industry Isn’t Talking About (but Should Be)](https://i.ytimg.com/vi/L-7I6cshYz4/default.jpg)
![From Dystopia to Opportunity: Stories from the Future of Cybersecurity](https://i.ytimg.com/vi/8EctTjAuKq4/default.jpg)
![](https://i.ytimg.com/vi/qtoHcO-7MOg/default.jpg)
![Managing Cyber-risk: Unlocking the Mystery of the Boardroom](https://i.ytimg.com/vi/K9o67m3B_Ec/default.jpg)
![Top 5 Cybersecurity Trends of 2021](https://i.ytimg.com/vi/BP53jX7jAl0/default.jpg)
![The Five Most Dangerous New Attack Techniques and How to Counter Them](https://i.ytimg.com/vi/sibeN4U1fOg/default.jpg)
![11 Ways To Structure A Screenplay](https://i.ytimg.com/vi/_D7fxkvsUUw/default.jpg)
![The Real Reason to be Afraid of Artificial Intelligence | Peter Haas | TEDxDirigo](https://i.ytimg.com/vi/TRzBk_KuIaM/default.jpg)
![Security Operations 2018: What Is Working? What Is Not.](https://i.ytimg.com/vi/REHay69Q6SM/default.jpg)
![The FBI: At the Heart of Combating Cyberthreats](https://i.ytimg.com/vi/e_oyihIP_hM/default.jpg)
![Session 1: Politics and Populism: What is Populism?](https://i.ytimg.com/vi/RUNzEhKphno/default.jpg)
![Human Hacking: The Psychology Behind Cybersecurity | Dr. Erik J. Huffman | TEDxColoradoSprings](https://i.ytimg.com/vi/FrNLE1Ixgak/default.jpg)
![Fireside Chat with the New NSA Cybersecurity Director](https://i.ytimg.com/vi/AVHQpWGHZ4s/default.jpg)
![Join the Mission to Prevent and Eradicate Cyberthreats](https://i.ytimg.com/vi/saRvhzZRgyc/default.jpg)
![Defining our Future: The Internet of Things](https://i.ytimg.com/vi/v6D7U2yg4kc/default.jpg)
![Hacking Exposed: Global Threat Brief](https://i.ytimg.com/vi/ocHYBcidxXs/default.jpg)