CYBERSECURITY AND PRIVACY WITH FREDERIKE KALTHEUNER: WHAT IS NEEDED


What is needed

Frederike Kaltheuner, Data Exploitation programme lead at Privacy International, talks about profiling, data harvesting, prediction, automated systems, AI, informed decision and the Cambridge Analytica scandal.

Kaan Buğra Kundakçı

End-user education addresses the most unpredictable cyber-security factor: people. Anyone can accidentally introduce a virus to an otherwise secure system by failing to follow good security practices. Teaching users to delete suspicious email attachments, not plug in unidentified USB drives, and various other important lessons is vital for the security of any organization.

Nikoleta Stavros

Application security focuses on keeping software and devices free of threats. A compromised application could provide access to the data its designed to protect. Successful security begins in the design stage, well before a program or device is deployed.

Svetlana Barbieri

As information has transformed into a huge business asset for modern companies, it has come at a price: Data is now a target for hackers seeking sensitive information about enterprises and their customers. This new online data security focus has forced businesses to invest in resources that protect trade secrets and other company information.

Haris Dimitra

Surely, there is data exploatation in much bigger dimention than we can imagine, but I am not sure what we can do about it. It is absolutely terrifying that some AI can make predictions on us, based on our face. Big data is not enough for this AI learning process to make accurate predictions, in my opinion.

Waclaw Piatek

In an open network such as the Internet, message privacy, particularly for e-commerce transactions, requires encryption. The most common approach on the Web is through a public key infrastructure (PKI). For e-mail, many people use Pretty Good Privacy (PGP), which lets an individual encrypt a message or simply send a digital signature that can be used to verify that the message was not tampered with en route.

Tatum Okorie

Like it or not, strong security has become a required utility — the cost of doing business. If you must do something (such as cybersecurity) to achieve business success, you may as well do it well.

Elsa Hollis Bianco

The employment outlook for cyber security jobs is very good with cybersecurity rapidly becoming one of the most lucrative careers in Information Technology (IT). What makes these jobs such good options? It could be the fact that there are more cybersecurity job openings than there are people to fill them or the fact that they these jobs pay wages about three times the national average. It’s most likely a combination of both as well as the fact that these jobs can be challenging and extremely rewarding.

Alonso Barela

Many organizations still do not (or cannot) spend the resources needed to understand or fix their vulnerabilities. When they see software as safety-critical, other concerns (e.g., costs, schedules) may limit their efforts to improve systems security. Moreover, fallible humans design, maintain, use, and repair systems in ways that may unintentionally expose and facilitate ease of break-in.

Jamison Shields

Despite considerable investments of resources and intellect, cybersecurity continues to pose serious challenges to national security, business performance, and public well-being. Modern developments in computation, storage, and connectivity to the Internet have brought into even sharper focus the need for a better understanding of the overall security of the systems we depend on.

Christin Bustamante

In response to Mellisa Mckennon

I have a couple: 

  • chief information security officer: this individual implements the security program across the organization and oversees the IT security department's operations.
  • security engineer: this individual protects company assets from threats with a focus on quality control within the IT infrastructure.

Hi Mellisa,

I can suggest two more: security architect: this individual is responsible for planning, analyzing, designing, testing, maintaining and supporting an enterprise's critical infrastructure, and security analyst: this individual has several responsibilities that include planning security measures and controls, protecting digital files, and conducting both internal and external security audits.

Mellisa Mckennon

In response to future hacker

As the cyberthreat landscape continues to grow and emerging threats, such as the internet of things, require hardware and software skills, it is estimated that there are 1 million unfilled cybersecurity jobs worldwide. IT professionals and other computer specialists are needed in security jobs.  Can you list some of those jobs?

I have a couple: 

  • chief information security officer: this individual implements the security program across the organization and oversees the IT security department's operations.
  • security engineer: this individual protects company assets from threats with a focus on quality control within the IT infrastructure.
future hacker

As the cyberthreat landscape continues to grow and emerging threats, such as the internet of things, require hardware and software skills, it is estimated that there are 1 million unfilled cybersecurity jobs worldwide. IT professionals and other computer specialists are needed in security jobs.  Can you list some of those jobs?

Aisha Kamila Kuhn

When an organization has a strong sense of network security and an effective incident response plan, it is better able to prevent and mitigate these attacks. For example, end user protection defends information and guards against loss or theft while also scanning computers for malicious code.

Valerija Vroomen

One of the most problematic elements of cybersecurity is the constantly evolving nature of security risks. The traditional approach has been to focus resources on crucial system components and protect against the biggest known threats, which meant leaving components undefended and not protecting systems against less dangerous risks.

Kai Kaipo

These are some really terrifying news, actually. This surveillance that has been exposed to us is really harming our personal rights. I am wondering if I still have some personal privacy ..

Please login or register to leave a response.