From the Birth of the Internet to the Rise of AI: How These Pivotal Moments Are Shaping Our Future.

Highlights

From the Birth of the Internet to the Rise of AI: How These Pivotal Moments Are Shaping Our Future.

Endless scrolling, checking social media, logging into apps—these are part of our daily routine.But did you know that every second you pause, every click of a “like,” and every photo or caption you share is being recorded, becoming part of an algorithm that shapes your online identity?

As the line between the physical and virtual worlds blurs, heightened awareness is only the first step. How can we build solid online-hygiene habits amid an overdose of information and keep ourselves from being pulled under? Join us on the Taiwan School on Internet Governance Join Taiwan School on Internet Governance and rethink your relationship with technology.

Host: Ethan Liu

Speakers:

He Quan-De, Member, TWNIC Network Security Committee

Howard Jyan, Senior executive vice president, Deloitte Taiwan

Meeting Minutes

  1. National Cybersecurity Strategy Upgraded: From Policy Blueprint to Joint-Defense Mechanism

Overview

Confronted with escalating cyber threats and online attacks, the Taiwanese government no longer regards cybersecurity as merely a technical matter; it has elevated it to a national-security priority. In 2025 the government will roll out its “Cybersecurity as National Security 3.0” initiative, overseen by a new Cybersecurity Office under the Executive Yuan. The goal is to strengthen institutional resilience, boost interagency coordination, harden critical infrastructure, and adopt a holistic strategy that engages talent, industry, and civil society.

Key Points

  • Howard Jyan noted that Taiwan began crafting cybersecurity policy in 1992. After three major iterations, the country is entering its most integrated strategy yet. He stressed that resilience does not mean zero attacks—it means the capacity to detect, respond to, and swiftly recover from incidents.

 

  • This upgrade signals a transformation of Taiwan’s digital-governance model:

 

  1. From a technical silo to a policy-coordination center

 

  1. From a defensive stance to adaptive risk management

 

  1. From a hardware focus to institutional resilience and civic mobilization

 

  • He Quan-de added that the Cybersecurity Office also centralizes budget, manpower, and technical resources. Taiwan must brace for future challenges—AR/VR environments, the Internet of Things, and AI-driven attack models—that traditional defenses can’t handle alone. Early alignment with international standards is essential.

 

  1. Establishing the Cybersecurity Joint Response Center: Taiwan’s Digital-Defense HQ

Overview

Like the disaster-response centers activated for earthquakes or typhoons, Taiwan plans to launch a Cybersecurity Joint Response Center. It will integrate threat intelligence, incident reporting, and interagency coordination—becoming the nation’s digital command hub during cyber conflict.

Key Points

  • He Quan-de likened the center to the Executive Yuan’s natural-disaster command posts—only for a “digital hurricane.” It is, he said, “not just a tactical space but the backbone of national trust.”

 

  • Core functions:

 

○     24/7 monitoring of network anomalies

 

○     Aggregation of domestic and international threat intel (agencies, ISPs, security firms)

 

○     Emergency cross-agency resource coordination

 

○     Command authority over defense, law enforcement, and communications networks

 

○     Cyber-drill planning and response training

 

  • Taiwan faces not only local hackers and malware but also transnational espionage, supply-chain attacks, and AI-enabled intrusions. The center will be both a technical hub and the nation’s final safety net.

 

  1. Everyone Is a Cyber Warrior: Personal Security as the First Line of Defense

Overview

Hackers have shifted from institutional targets to any internet-connected device—home routers, IP cameras, mobile apps. The weakest link is often personal. The first line of defense isn’t in the cloud; it’s at your fingertips.

Key Points

  • Howard Jyan emphasized that everyday cyber hygiene is tied to national security. A default-password router or unpatched camera can become a botnet gateway; one global attack was traced to a single compromised home device.

 

  • He highlighted Insecam, a site exposing unsecured cameras, and urged users to verify their devices are not publicly visible.

 

  • He Quan-de added that citizen digital certificates, online banking, and other credentials are highly sensitive: “Just as driving requires traffic rules, being online requires digital hygiene.”

 

  • Three essential practices:

 

  1. Strong passwords plus two-factor authentication

 

  1. Never share credentials—even with assistants or family

 

  1. Regularly clear browsing data or use incognito mode

 

  1. Data-Privacy Risks in Social Media and AI: The Silent Storm

Overview

In today’s digital world, the biggest risk isn’t a master hacker—it’s your own click on “I Agree.” Games, quizzes, and social-media interactions may harvest data and profile you without your knowledge.

Key Points

  • Howard Jyan warned about “click-to-consent” traps such as Which Historical Figure Are You? that request sweeping access to profiles and friend lists. He cited the Cambridge Analytica scandal, where such data shaped political campaigns.

 

  • “Most data breaches aren’t stolen,” he said. “They’re volunteered.”

 

  • He Quan-de explained that AI systems tag, classify, and monetize user data—labeling people “likely buyer,” “emotionally reactive,” or “easily influenced.” “Once your data leaks,” he cautioned, “it doesn’t disappear—it lives forever.”

 

  1. AI: Partner or Weapon? Managing Everyday Risks

Overview

AI can be an invaluable assistant—writing, researching, brainstorming. Yet it can also become a stealth leak, funneling conversations and trade secrets into global data pools. In the AI era, security is about verifying what’s real and what’s not.

Key Points

  • Howard Jyan flagged the danger of AI hallucinations: large language models generating false or misleading content. A lawyer famously relied on ChatGPT, only to submit a brief citing fictitious cases.

 

  • He also noted data-residue risk—confidential information can persist in open AI platforms if not properly secured.

 

  • He Quan-de warned that misuse of AI is a growing corporate vulnerability. He urged companies to adopt internal AI policies: forbid sensitive-data input, disable chat logs, and favor on-premise models. “AI isn’t the danger,” he said. “Ignorance and complacency are.”

 

  1. Digital Literacy in the AI Era: From Family Habits to National Awareness

Overview

When toddlers use tablets and grandparents live on Line or Facebook, digital literacy becomes a civic necessity. A resilient digital society shifts its emphasis from technology upgrades to user awareness.

Key Points

  • He Quan-de called for comprehensive digital-hygiene education—home, school, workplace. He championed a “minimum data disclosure” norm: skip unnecessary forms, avoid shady links, and verify information before sharing. “We should teach cybersecurity,” he said, “the way we teach traffic safety.”

 

  • Howard Jyan proposed reverse education, letting children become cybersecurity coaches for older relatives. Seniors are frequent scam victims and disinformation conduits. He suggested a nationwide Cybersecurity Awareness Week and age-specific teaching kits.

 

Digital Resilience—A Collective Choice

Digital resilience isn’t a single statute or firewall; it’s the sum of daily habits, shared responsibility, and cultural awareness.

“AI is like the invention of the car—it will transform the world. But without traffic lights, it only brings disaster.”

—Howard Jyan, senior executive vice president , Deloitte Taiwan

From public policy to personal behavior, from corporate safeguards to household routines, the question isn’t if a digital storm will hit—it’s when, and whether we’ll meet it head-on.

Every strong password, every scam avoided, every reminder to a friend lays another brick in the wall of digital resilience.The battle isn’t distant; it’s already here—in every device, every click, every moment online.

We are not just digital users; we are digital citizens—and we are all guardians of this shared realm.