2
Topics
zStatus regarding “traditional” vulnerabilities
zSome “grand challenges”
zIT and counterterrorism
zSome legal and regulatory issues
zSecurity in open vs. closed systems
zDoes it make sense to hunt for security holes?
zAn economic perspective
zPresident’s Information Technology Advisory Committee on Cybersecurity
z