So for things like this, the traditional parameter of cybersecurity management has been extended. We care about the integrity of information systems, but now information integrity outside of information systems is also something that we are concerned about, and we recently just had an online deliberative assembly about this very topic.

Keyboard shortcuts

j previous speech k next speech