1. Online

Average users can’t afford to devote time to security. Invisible security, which occurs automatically and transparently, may help. This session will explore examples consistent with this approach in existence today, including protective DNS and automatic updates, describing how invisible defenses may aid potential beneficiaries in health care, the defense industrial base, and the general public.

Participants: