19 Apr DATA PRIVACY AND CYBER SECURITY: DEFENDING TOMORROW’S NETWORK
Prepare for Breach: Rethinking Cybersecurity in Tomorrow’s Online World – Trade secret: As security pros know, it’s no longer a question of if organizations will get hacked, but when: So why are we so surprised and outraged at all the ransomware and cyberattacks happening today? In fact, cyber crime is today’s fastest-growing form of criminal activity, even as government agencies and businesses are increasingly going online – and we now in a world where threat actors can launch hundreds of thousands of digital attacks at systems without a second thought (only one of which ever needs to connect to compromise targets) and most hacks/data breaches go undetected for months before anything is noticed. Given that surveys show most organizations don’t even have cyber response plans in place, it’s time to start asking ourselves: How can we accept that cyber threats/breaches are the new norm – and start thinking about threat containment as much as prevention. Several clients have asked us to help provide thought leadership and insight with regard to defending against digital disruption.
Defending Your Digital DNA: In an Age Without Privacy (and Where Your Body is Your ID) How Will You Protect Your Identity? – Welcome to the era of biometrics – an age where companies are using your face, voice, physical characteristics, speech patterns, fingerprints, and more to securely ID you – and in which your very appearance and mannerisms (given the number of hacks, data breaches, and possibilities for ID theft, deepfake videos, surveillance, etc.) have the potential to be weaponized. Some social networks are now collecting voice and faceprints, and tons of apps are encouraging us to share pictures of ourselves ostensibly for purposes of entertainment (which are then altered to be digitally aged or otherwise manipulated). But is it wise to be sharing all this information with companies, especially on the Internet where it lives on forever and can be hacked or compromised like any other form of data? You can use this info to identify people, access their bank accounts, track their movement, share unwanted information with government agencies, etc. Myriad partners have asked us to conduct market research and consider: What are we giving up each time we (virtually) give away a piece of ourselves?