SlideShare une entreprise Scribd logo
1  sur  18
SECURITY & PRIVACY
Gary Trimnell – Technical Director
TOP TECH
OLD TECH?
“Artificial intelligence requires computer power in the same
way that aircraft require horsepower”
- Hans Moravec
WHY NOW?
Advancements
Affordability
Accessibility
2020
200
million
VR Headsets
10
million
Driverless Cars
400
million
Wearables
2020
50 BILLION
Connected Devices
SECURITY & PRIVACY
Why worry?
What needs to be done to protect our data?
How can we stay informed ?
Who’s responsibility?
MORE DATA
44 trillion gigabytes of data by 2020
1.7 megabytes per second per human being on the planet
DISCONNECT THE CONNECTED
Complexity = Code = Bugs
TRANSPORT
TOYS
CRIME AS A SERVICE
Hacking made easy; for kids for fun.
RULES AND RATINGS
ADVOCACY
CONSUMERS, DEVELOPERS & VENDORS
Greater transparency
Invest more in security
Culture shift
Secure by design
MACHINE V MACHINE
“Whereas the short-term impact of AI depends on who
controls it, the long-term impact depends on whether it can
be controlled at all”
- Stephen Hawking
SXSW IS…
the perfect balance of the possible & practical.
THANKS.
gary@e3.co.uk

Contenu connexe

Tendances

On the Horizon: Tech Trends for 2018
On the Horizon: Tech Trends for 2018On the Horizon: Tech Trends for 2018
On the Horizon: Tech Trends for 2018- Amit Gupta -
 
Sensorflare at Open Coffee Athens LXX - IoT (Feb 27, 2015)
Sensorflare at Open Coffee Athens LXX - IoT (Feb 27, 2015)Sensorflare at Open Coffee Athens LXX - IoT (Feb 27, 2015)
Sensorflare at Open Coffee Athens LXX - IoT (Feb 27, 2015)Open Coffee Greece
 
The Future of the Internet of Things
The Future of the Internet of Things The Future of the Internet of Things
The Future of the Internet of Things Dialexa
 
Mario Munich at AI Frontiers : Consumer robotics: embedding affordable AI in ...
Mario Munich at AI Frontiers : Consumer robotics: embedding affordable AI in ...Mario Munich at AI Frontiers : Consumer robotics: embedding affordable AI in ...
Mario Munich at AI Frontiers : Consumer robotics: embedding affordable AI in ...AI Frontiers
 
Perspectives of Telecommunications in CALA - ECI Telecom - 20/10/2016
Perspectives of Telecommunications in CALA - ECI Telecom - 20/10/2016Perspectives of Telecommunications in CALA - ECI Telecom - 20/10/2016
Perspectives of Telecommunications in CALA - ECI Telecom - 20/10/2016Renato Cruz
 
When the Internet of Things becomes the Security of Things
When the Internet of Things becomes the Security of ThingsWhen the Internet of Things becomes the Security of Things
When the Internet of Things becomes the Security of ThingsConfident Technologies
 
Iot and Smart Cities by emran
Iot and Smart Cities by emranIot and Smart Cities by emran
Iot and Smart Cities by emranEmran Hossain
 
CommunicAsia 2016 Daily - Day 3 (June 2, 2016)
CommunicAsia 2016 Daily - Day 3 (June 2, 2016)CommunicAsia 2016 Daily - Day 3 (June 2, 2016)
CommunicAsia 2016 Daily - Day 3 (June 2, 2016)Dr. Mazlan Abbas
 
CII Automotive 4.0 summit 24 September 2020 - RR Dasgupta
CII Automotive 4.0 summit 24 September 2020 - RR DasguptaCII Automotive 4.0 summit 24 September 2020 - RR Dasgupta
CII Automotive 4.0 summit 24 September 2020 - RR DasguptaR R Dasgupta
 
Internet of NO things
Internet of NO things Internet of NO things
Internet of NO things Demos Helsinki
 
Internet of Things (IoT) Past, Present, and Future
Internet of Things (IoT) Past, Present, and FutureInternet of Things (IoT) Past, Present, and Future
Internet of Things (IoT) Past, Present, and FutureLosant
 
Internet Of Things Uses & Applications In Various Industries | IOT
Internet Of Things Uses & Applications In Various Industries | IOTInternet Of Things Uses & Applications In Various Industries | IOT
Internet Of Things Uses & Applications In Various Industries | IOTPixelCrayons
 
De presentatie van Michel Gulpen tijdens de GDPR-avond.
De presentatie van Michel Gulpen tijdens de GDPR-avond. De presentatie van Michel Gulpen tijdens de GDPR-avond.
De presentatie van Michel Gulpen tijdens de GDPR-avond. Pure Minds
 
Group7midterm 200404081547
Group7midterm 200404081547Group7midterm 200404081547
Group7midterm 200404081547Rodel Septimo
 
Computer and Video Games
Computer and Video GamesComputer and Video Games
Computer and Video GamesMark Deuze
 
Mobile Today: The Landscape and Opportunities for Australian SMB and Entrepre...
Mobile Today: The Landscape and Opportunities for Australian SMB and Entrepre...Mobile Today: The Landscape and Opportunities for Australian SMB and Entrepre...
Mobile Today: The Landscape and Opportunities for Australian SMB and Entrepre...Alfred Lo
 

Tendances (20)

On the Horizon: Tech Trends for 2018
On the Horizon: Tech Trends for 2018On the Horizon: Tech Trends for 2018
On the Horizon: Tech Trends for 2018
 
AI for Telcos
AI for TelcosAI for Telcos
AI for Telcos
 
Sensorflare at Open Coffee Athens LXX - IoT (Feb 27, 2015)
Sensorflare at Open Coffee Athens LXX - IoT (Feb 27, 2015)Sensorflare at Open Coffee Athens LXX - IoT (Feb 27, 2015)
Sensorflare at Open Coffee Athens LXX - IoT (Feb 27, 2015)
 
The Future of the Internet of Things
The Future of the Internet of Things The Future of the Internet of Things
The Future of the Internet of Things
 
Mario Munich at AI Frontiers : Consumer robotics: embedding affordable AI in ...
Mario Munich at AI Frontiers : Consumer robotics: embedding affordable AI in ...Mario Munich at AI Frontiers : Consumer robotics: embedding affordable AI in ...
Mario Munich at AI Frontiers : Consumer robotics: embedding affordable AI in ...
 
Perspectives of Telecommunications in CALA - ECI Telecom - 20/10/2016
Perspectives of Telecommunications in CALA - ECI Telecom - 20/10/2016Perspectives of Telecommunications in CALA - ECI Telecom - 20/10/2016
Perspectives of Telecommunications in CALA - ECI Telecom - 20/10/2016
 
When the Internet of Things becomes the Security of Things
When the Internet of Things becomes the Security of ThingsWhen the Internet of Things becomes the Security of Things
When the Internet of Things becomes the Security of Things
 
Iot and Smart Cities by emran
Iot and Smart Cities by emranIot and Smart Cities by emran
Iot and Smart Cities by emran
 
CommunicAsia 2016 Daily - Day 3 (June 2, 2016)
CommunicAsia 2016 Daily - Day 3 (June 2, 2016)CommunicAsia 2016 Daily - Day 3 (June 2, 2016)
CommunicAsia 2016 Daily - Day 3 (June 2, 2016)
 
Future of IOT
Future of IOTFuture of IOT
Future of IOT
 
CII Automotive 4.0 summit 24 September 2020 - RR Dasgupta
CII Automotive 4.0 summit 24 September 2020 - RR DasguptaCII Automotive 4.0 summit 24 September 2020 - RR Dasgupta
CII Automotive 4.0 summit 24 September 2020 - RR Dasgupta
 
Internet of NO things
Internet of NO things Internet of NO things
Internet of NO things
 
Future of IOT
Future of IOTFuture of IOT
Future of IOT
 
Internet of Things (IoT) Past, Present, and Future
Internet of Things (IoT) Past, Present, and FutureInternet of Things (IoT) Past, Present, and Future
Internet of Things (IoT) Past, Present, and Future
 
Internet Of Things Uses & Applications In Various Industries | IOT
Internet Of Things Uses & Applications In Various Industries | IOTInternet Of Things Uses & Applications In Various Industries | IOT
Internet Of Things Uses & Applications In Various Industries | IOT
 
De presentatie van Michel Gulpen tijdens de GDPR-avond.
De presentatie van Michel Gulpen tijdens de GDPR-avond. De presentatie van Michel Gulpen tijdens de GDPR-avond.
De presentatie van Michel Gulpen tijdens de GDPR-avond.
 
Group7midterm 200404081547
Group7midterm 200404081547Group7midterm 200404081547
Group7midterm 200404081547
 
Group 7 (midterm)
Group 7 (midterm)Group 7 (midterm)
Group 7 (midterm)
 
Computer and Video Games
Computer and Video GamesComputer and Video Games
Computer and Video Games
 
Mobile Today: The Landscape and Opportunities for Australian SMB and Entrepre...
Mobile Today: The Landscape and Opportunities for Australian SMB and Entrepre...Mobile Today: The Landscape and Opportunities for Australian SMB and Entrepre...
Mobile Today: The Landscape and Opportunities for Australian SMB and Entrepre...
 

Similaire à Insights from SXSW

Security & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing TechnologySecurity & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing TechnologyJohn D. Johnson
 
Ericsson Technology Review, issue #1, 2016
Ericsson Technology Review, issue #1, 2016Ericsson Technology Review, issue #1, 2016
Ericsson Technology Review, issue #1, 2016Ericsson
 
Ericsson Technology Review: Technology trends 2018 - Five technology trends a...
Ericsson Technology Review: Technology trends 2018 - Five technology trends a...Ericsson Technology Review: Technology trends 2018 - Five technology trends a...
Ericsson Technology Review: Technology trends 2018 - Five technology trends a...Ericsson
 
The Current and Future State of Internet of Things: Unveiling the Opportunities
The Current and Future State of Internet of Things: Unveiling the OpportunitiesThe Current and Future State of Internet of Things: Unveiling the Opportunities
The Current and Future State of Internet of Things: Unveiling the OpportunitiesGoutama Bachtiar
 
Evolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoTEvolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoTMd.Imtiaz Ahmed
 
The Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial RevolutionThe Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial RevolutionAbaram Network Solutions
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Digital Intox, Digital Detox
Digital Intox, Digital DetoxDigital Intox, Digital Detox
Digital Intox, Digital DetoxAndré Blavier
 
What Can We Expect From Upcoming Developments In IoT.pdf
What Can We Expect From Upcoming Developments In IoT.pdfWhat Can We Expect From Upcoming Developments In IoT.pdf
What Can We Expect From Upcoming Developments In IoT.pdfTechugo
 
Middle East IoT Workshop
Middle East IoT WorkshopMiddle East IoT Workshop
Middle East IoT WorkshopHaider Iqbal
 
Unraveling the Critical Technology Elements: Navigating the Digital Landscape
Unraveling the Critical Technology Elements: Navigating the Digital LandscapeUnraveling the Critical Technology Elements: Navigating the Digital Landscape
Unraveling the Critical Technology Elements: Navigating the Digital Landscapegreendigital
 
Internet of Things : Stats and Facts
Internet of Things : Stats and FactsInternet of Things : Stats and Facts
Internet of Things : Stats and FactsPixel Crayons
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9alvin chin
 
Emerging trends in computer science and related technologies
Emerging trends in computer science and related technologiesEmerging trends in computer science and related technologies
Emerging trends in computer science and related technologiesSidraAfreen
 

Similaire à Insights from SXSW (20)

Security & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing TechnologySecurity & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing Technology
 
Ericsson Technology Review, issue #1, 2016
Ericsson Technology Review, issue #1, 2016Ericsson Technology Review, issue #1, 2016
Ericsson Technology Review, issue #1, 2016
 
Ericsson Technology Review: Technology trends 2018 - Five technology trends a...
Ericsson Technology Review: Technology trends 2018 - Five technology trends a...Ericsson Technology Review: Technology trends 2018 - Five technology trends a...
Ericsson Technology Review: Technology trends 2018 - Five technology trends a...
 
The Current and Future State of Internet of Things: Unveiling the Opportunities
The Current and Future State of Internet of Things: Unveiling the OpportunitiesThe Current and Future State of Internet of Things: Unveiling the Opportunities
The Current and Future State of Internet of Things: Unveiling the Opportunities
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
Evolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoTEvolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoT
 
Digital Ecosystem
Digital EcosystemDigital Ecosystem
Digital Ecosystem
 
The Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial RevolutionThe Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial Revolution
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
IOTCYBER
IOTCYBERIOTCYBER
IOTCYBER
 
Where 5 g meets iot!!!
Where 5 g meets iot!!!Where 5 g meets iot!!!
Where 5 g meets iot!!!
 
Digital Intox, Digital Detox
Digital Intox, Digital DetoxDigital Intox, Digital Detox
Digital Intox, Digital Detox
 
Imec Masterclass UCLL
Imec Masterclass UCLLImec Masterclass UCLL
Imec Masterclass UCLL
 
What Can We Expect From Upcoming Developments In IoT.pdf
What Can We Expect From Upcoming Developments In IoT.pdfWhat Can We Expect From Upcoming Developments In IoT.pdf
What Can We Expect From Upcoming Developments In IoT.pdf
 
Montclair share preso
Montclair share presoMontclair share preso
Montclair share preso
 
Middle East IoT Workshop
Middle East IoT WorkshopMiddle East IoT Workshop
Middle East IoT Workshop
 
Unraveling the Critical Technology Elements: Navigating the Digital Landscape
Unraveling the Critical Technology Elements: Navigating the Digital LandscapeUnraveling the Critical Technology Elements: Navigating the Digital Landscape
Unraveling the Critical Technology Elements: Navigating the Digital Landscape
 
Internet of Things : Stats and Facts
Internet of Things : Stats and FactsInternet of Things : Stats and Facts
Internet of Things : Stats and Facts
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
 
Emerging trends in computer science and related technologies
Emerging trends in computer science and related technologiesEmerging trends in computer science and related technologies
Emerging trends in computer science and related technologies
 

Plus de Bristol Media

Why creative leaders experience more #WTF moments in the digital age and what...
Why creative leaders experience more #WTF moments in the digital age and what...Why creative leaders experience more #WTF moments in the digital age and what...
Why creative leaders experience more #WTF moments in the digital age and what...Bristol Media
 
VR comes of age. Why VR is relevant now and what it means for the future
VR comes of age. Why VR is relevant now and what it means for the futureVR comes of age. Why VR is relevant now and what it means for the future
VR comes of age. Why VR is relevant now and what it means for the futureBristol Media
 
Thriving in a reputation economy. The relevance of your online brand
Thriving in a reputation economy.  The relevance of your online brandThriving in a reputation economy.  The relevance of your online brand
Thriving in a reputation economy. The relevance of your online brandBristol Media
 
Building compelling experiences for the connected world
Building compelling experiences for the connected worldBuilding compelling experiences for the connected world
Building compelling experiences for the connected worldBristol Media
 
Ten lessons from behavioural science for people in creative service businesses
Ten lessons from behavioural science for people in creative service businessesTen lessons from behavioural science for people in creative service businesses
Ten lessons from behavioural science for people in creative service businessesBristol Media
 
Getting past the first date. How nurturing creativity together makes a new cl...
Getting past the first date. How nurturing creativity together makes a new cl...Getting past the first date. How nurturing creativity together makes a new cl...
Getting past the first date. How nurturing creativity together makes a new cl...Bristol Media
 
The next wave of innovation in social media
The next wave of innovation in social mediaThe next wave of innovation in social media
The next wave of innovation in social mediaBristol Media
 
Making more with what you own
Making more with what you ownMaking more with what you own
Making more with what you ownBristol Media
 
The internet already has too much content. How should creativity respond?
The internet already has too much content. How should creativity respond?The internet already has too much content. How should creativity respond?
The internet already has too much content. How should creativity respond?Bristol Media
 
Leadership in the age of innovation
Leadership in the age of innovationLeadership in the age of innovation
Leadership in the age of innovationBristol Media
 
How networks keep you healthy in the age of overload
How networks keep you healthy in the age of overloadHow networks keep you healthy in the age of overload
How networks keep you healthy in the age of overloadBristol Media
 
How can profit and purpose go hand in hand?
How can profit and purpose go hand in hand?How can profit and purpose go hand in hand?
How can profit and purpose go hand in hand?Bristol Media
 
Uncorporate - how to grow a ceative business without losing your soul
Uncorporate - how to grow a ceative business without losing your soulUncorporate - how to grow a ceative business without losing your soul
Uncorporate - how to grow a ceative business without losing your soulBristol Media
 
How the National Trust is transforming - 500 web editors and a five year plan
How the National Trust is transforming - 500 web editors and a five year planHow the National Trust is transforming - 500 web editors and a five year plan
How the National Trust is transforming - 500 web editors and a five year planBristol Media
 
Living Services - the third era of digital
Living Services - the third era of digitalLiving Services - the third era of digital
Living Services - the third era of digitalBristol Media
 
Strategy - what the @*%! is it anyway?
Strategy - what the @*%! is it anyway?Strategy - what the @*%! is it anyway?
Strategy - what the @*%! is it anyway?Bristol Media
 
How to retain your best clients
How to retain your best clientsHow to retain your best clients
How to retain your best clientsBristol Media
 
B2B marketing. B2C marketing. It's all the same isn't it?
B2B marketing. B2C marketing.  It's all the same isn't it?B2B marketing. B2C marketing.  It's all the same isn't it?
B2B marketing. B2C marketing. It's all the same isn't it?Bristol Media
 

Plus de Bristol Media (20)

Why creative leaders experience more #WTF moments in the digital age and what...
Why creative leaders experience more #WTF moments in the digital age and what...Why creative leaders experience more #WTF moments in the digital age and what...
Why creative leaders experience more #WTF moments in the digital age and what...
 
VR comes of age. Why VR is relevant now and what it means for the future
VR comes of age. Why VR is relevant now and what it means for the futureVR comes of age. Why VR is relevant now and what it means for the future
VR comes of age. Why VR is relevant now and what it means for the future
 
Braving the way
Braving the wayBraving the way
Braving the way
 
Thriving in a reputation economy. The relevance of your online brand
Thriving in a reputation economy.  The relevance of your online brandThriving in a reputation economy.  The relevance of your online brand
Thriving in a reputation economy. The relevance of your online brand
 
Building compelling experiences for the connected world
Building compelling experiences for the connected worldBuilding compelling experiences for the connected world
Building compelling experiences for the connected world
 
Ten lessons from behavioural science for people in creative service businesses
Ten lessons from behavioural science for people in creative service businessesTen lessons from behavioural science for people in creative service businesses
Ten lessons from behavioural science for people in creative service businesses
 
Getting past the first date. How nurturing creativity together makes a new cl...
Getting past the first date. How nurturing creativity together makes a new cl...Getting past the first date. How nurturing creativity together makes a new cl...
Getting past the first date. How nurturing creativity together makes a new cl...
 
The next wave of innovation in social media
The next wave of innovation in social mediaThe next wave of innovation in social media
The next wave of innovation in social media
 
Making more with what you own
Making more with what you ownMaking more with what you own
Making more with what you own
 
The internet already has too much content. How should creativity respond?
The internet already has too much content. How should creativity respond?The internet already has too much content. How should creativity respond?
The internet already has too much content. How should creativity respond?
 
Leadership in the age of innovation
Leadership in the age of innovationLeadership in the age of innovation
Leadership in the age of innovation
 
How networks keep you healthy in the age of overload
How networks keep you healthy in the age of overloadHow networks keep you healthy in the age of overload
How networks keep you healthy in the age of overload
 
How can profit and purpose go hand in hand?
How can profit and purpose go hand in hand?How can profit and purpose go hand in hand?
How can profit and purpose go hand in hand?
 
Uncorporate - how to grow a ceative business without losing your soul
Uncorporate - how to grow a ceative business without losing your soulUncorporate - how to grow a ceative business without losing your soul
Uncorporate - how to grow a ceative business without losing your soul
 
How the National Trust is transforming - 500 web editors and a five year plan
How the National Trust is transforming - 500 web editors and a five year planHow the National Trust is transforming - 500 web editors and a five year plan
How the National Trust is transforming - 500 web editors and a five year plan
 
Living Services - the third era of digital
Living Services - the third era of digitalLiving Services - the third era of digital
Living Services - the third era of digital
 
Strategy - what the @*%! is it anyway?
Strategy - what the @*%! is it anyway?Strategy - what the @*%! is it anyway?
Strategy - what the @*%! is it anyway?
 
Social Never Sleeps
Social Never SleepsSocial Never Sleeps
Social Never Sleeps
 
How to retain your best clients
How to retain your best clientsHow to retain your best clients
How to retain your best clients
 
B2B marketing. B2C marketing. It's all the same isn't it?
B2B marketing. B2C marketing.  It's all the same isn't it?B2B marketing. B2C marketing.  It's all the same isn't it?
B2B marketing. B2C marketing. It's all the same isn't it?
 

Dernier

The Evolution of Internet : How consumers use technology and its impact on th...
The Evolution of Internet : How consumers use technology and its impact on th...The Evolution of Internet : How consumers use technology and its impact on th...
The Evolution of Internet : How consumers use technology and its impact on th...sowmyrao14
 
McDonald's: A Journey Through Time (PPT)
McDonald's: A Journey Through Time (PPT)McDonald's: A Journey Through Time (PPT)
McDonald's: A Journey Through Time (PPT)DEVARAJV16
 
DIGITAL MARKETING STRATEGY_INFOGRAPHIC IMAGE.pdf
DIGITAL MARKETING STRATEGY_INFOGRAPHIC IMAGE.pdfDIGITAL MARKETING STRATEGY_INFOGRAPHIC IMAGE.pdf
DIGITAL MARKETING STRATEGY_INFOGRAPHIC IMAGE.pdfmayanksharma0441
 
Master the Art of Digital Recruitment in Asia.pdf
Master the Art of Digital Recruitment in Asia.pdfMaster the Art of Digital Recruitment in Asia.pdf
Master the Art of Digital Recruitment in Asia.pdfHigher Education Marketing
 
Miss Immigrant USA Activity Pageant Program.pdf
Miss Immigrant USA Activity Pageant Program.pdfMiss Immigrant USA Activity Pageant Program.pdf
Miss Immigrant USA Activity Pageant Program.pdfMagdalena Kulisz
 
Talent Management for mba 3rd sem useful
Talent Management for mba 3rd sem usefulTalent Management for mba 3rd sem useful
Talent Management for mba 3rd sem usefulAtifaArbar
 
The 10 Most Influential CMO's Leading the Way of Success, 2024 (Final file) (...
The 10 Most Influential CMO's Leading the Way of Success, 2024 (Final file) (...The 10 Most Influential CMO's Leading the Way of Success, 2024 (Final file) (...
The 10 Most Influential CMO's Leading the Way of Success, 2024 (Final file) (...CIO Business World
 
Michael Kors marketing assignment swot analysis
Michael Kors marketing assignment swot analysisMichael Kors marketing assignment swot analysis
Michael Kors marketing assignment swot analysisjunaid794917
 
top marketing posters - Fresh Spar Technologies - Manojkumar C
top marketing posters - Fresh Spar Technologies - Manojkumar Ctop marketing posters - Fresh Spar Technologies - Manojkumar C
top marketing posters - Fresh Spar Technologies - Manojkumar CManojkumar C
 
Exploring Web 3.0 Growth marketing: Navigating the Future of the Internet
Exploring Web 3.0 Growth marketing: Navigating the Future of the InternetExploring Web 3.0 Growth marketing: Navigating the Future of the Internet
Exploring Web 3.0 Growth marketing: Navigating the Future of the Internetnehapardhi711
 
Fiverr's Product Marketing Interview Assignment
Fiverr's Product Marketing Interview AssignmentFiverr's Product Marketing Interview Assignment
Fiverr's Product Marketing Interview AssignmentFarrel Brest
 
Codes and Conventions of Film Magazine Covers.pptx
Codes and Conventions of Film Magazine Covers.pptxCodes and Conventions of Film Magazine Covers.pptx
Codes and Conventions of Film Magazine Covers.pptxGeorgeCulica
 
Digital Marketing in 5G Era - Digital Transformation in 5G Age
Digital Marketing in 5G Era - Digital Transformation in 5G AgeDigital Marketing in 5G Era - Digital Transformation in 5G Age
Digital Marketing in 5G Era - Digital Transformation in 5G AgeDigiKarishma
 
What are the 4 characteristics of CTAs that convert?
What are the 4 characteristics of CTAs that convert?What are the 4 characteristics of CTAs that convert?
What are the 4 characteristics of CTAs that convert?Juan Pineda
 
Exploring The World Of Adult Ad Networks.pdf
Exploring The World Of Adult Ad Networks.pdfExploring The World Of Adult Ad Networks.pdf
Exploring The World Of Adult Ad Networks.pdfadult marketing
 
Common Culture: Paul Willis Symbolic Creativity
Common Culture: Paul Willis Symbolic CreativityCommon Culture: Paul Willis Symbolic Creativity
Common Culture: Paul Willis Symbolic CreativityMonishka Adhikari
 
Jai Institute for Parenting Program Guide
Jai Institute for Parenting Program GuideJai Institute for Parenting Program Guide
Jai Institute for Parenting Program Guidekiva6
 
The Impact of Digital Technologies
The Impact of Digital Technologies The Impact of Digital Technologies
The Impact of Digital Technologies bruguardarib
 
Most Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdf
Most Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdfMost Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdf
Most Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdfCIO Business World
 
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一s SS
 

Dernier (20)

The Evolution of Internet : How consumers use technology and its impact on th...
The Evolution of Internet : How consumers use technology and its impact on th...The Evolution of Internet : How consumers use technology and its impact on th...
The Evolution of Internet : How consumers use technology and its impact on th...
 
McDonald's: A Journey Through Time (PPT)
McDonald's: A Journey Through Time (PPT)McDonald's: A Journey Through Time (PPT)
McDonald's: A Journey Through Time (PPT)
 
DIGITAL MARKETING STRATEGY_INFOGRAPHIC IMAGE.pdf
DIGITAL MARKETING STRATEGY_INFOGRAPHIC IMAGE.pdfDIGITAL MARKETING STRATEGY_INFOGRAPHIC IMAGE.pdf
DIGITAL MARKETING STRATEGY_INFOGRAPHIC IMAGE.pdf
 
Master the Art of Digital Recruitment in Asia.pdf
Master the Art of Digital Recruitment in Asia.pdfMaster the Art of Digital Recruitment in Asia.pdf
Master the Art of Digital Recruitment in Asia.pdf
 
Miss Immigrant USA Activity Pageant Program.pdf
Miss Immigrant USA Activity Pageant Program.pdfMiss Immigrant USA Activity Pageant Program.pdf
Miss Immigrant USA Activity Pageant Program.pdf
 
Talent Management for mba 3rd sem useful
Talent Management for mba 3rd sem usefulTalent Management for mba 3rd sem useful
Talent Management for mba 3rd sem useful
 
The 10 Most Influential CMO's Leading the Way of Success, 2024 (Final file) (...
The 10 Most Influential CMO's Leading the Way of Success, 2024 (Final file) (...The 10 Most Influential CMO's Leading the Way of Success, 2024 (Final file) (...
The 10 Most Influential CMO's Leading the Way of Success, 2024 (Final file) (...
 
Michael Kors marketing assignment swot analysis
Michael Kors marketing assignment swot analysisMichael Kors marketing assignment swot analysis
Michael Kors marketing assignment swot analysis
 
top marketing posters - Fresh Spar Technologies - Manojkumar C
top marketing posters - Fresh Spar Technologies - Manojkumar Ctop marketing posters - Fresh Spar Technologies - Manojkumar C
top marketing posters - Fresh Spar Technologies - Manojkumar C
 
Exploring Web 3.0 Growth marketing: Navigating the Future of the Internet
Exploring Web 3.0 Growth marketing: Navigating the Future of the InternetExploring Web 3.0 Growth marketing: Navigating the Future of the Internet
Exploring Web 3.0 Growth marketing: Navigating the Future of the Internet
 
Fiverr's Product Marketing Interview Assignment
Fiverr's Product Marketing Interview AssignmentFiverr's Product Marketing Interview Assignment
Fiverr's Product Marketing Interview Assignment
 
Codes and Conventions of Film Magazine Covers.pptx
Codes and Conventions of Film Magazine Covers.pptxCodes and Conventions of Film Magazine Covers.pptx
Codes and Conventions of Film Magazine Covers.pptx
 
Digital Marketing in 5G Era - Digital Transformation in 5G Age
Digital Marketing in 5G Era - Digital Transformation in 5G AgeDigital Marketing in 5G Era - Digital Transformation in 5G Age
Digital Marketing in 5G Era - Digital Transformation in 5G Age
 
What are the 4 characteristics of CTAs that convert?
What are the 4 characteristics of CTAs that convert?What are the 4 characteristics of CTAs that convert?
What are the 4 characteristics of CTAs that convert?
 
Exploring The World Of Adult Ad Networks.pdf
Exploring The World Of Adult Ad Networks.pdfExploring The World Of Adult Ad Networks.pdf
Exploring The World Of Adult Ad Networks.pdf
 
Common Culture: Paul Willis Symbolic Creativity
Common Culture: Paul Willis Symbolic CreativityCommon Culture: Paul Willis Symbolic Creativity
Common Culture: Paul Willis Symbolic Creativity
 
Jai Institute for Parenting Program Guide
Jai Institute for Parenting Program GuideJai Institute for Parenting Program Guide
Jai Institute for Parenting Program Guide
 
The Impact of Digital Technologies
The Impact of Digital Technologies The Impact of Digital Technologies
The Impact of Digital Technologies
 
Most Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdf
Most Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdfMost Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdf
Most Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdf
 
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一
 

Insights from SXSW

Notes de l'éditeur

  1. My name is Gary Trimnell and I am Technical Director for a digital agency called e3. I was really fortunate to be able to attend this years SXSW and as a techie I was of course interested in all of the really cool things that technology can do and how we can push them but am naturally drawn to the practical side. Today I am going to give a really brief overview of the topics of conversation that surrounded security and privacy at this years SXSW.
  2. So without a doubt the hot topics at this years SXSW were: Artificial Intelligence/Machine Learning Virtual Reality Connected Devices , the IoT.
  3. These are not brand new technologies that have only just emerged this year. AI for example was first founded as an academic discipline in the early 1950s. However between then and now there has been a couple of periods coined “AI Winters” where progress almost ground to a halt, this was primarily due to the funding stopping after the results failing to live up to the high expectations, and this was as a result of one fundamental problem, there simply wasn't enough compute power.
  4. So why are these technologies dominating this years SXSW? First and foremost there has been advancements in computing to provide the infrastructure and raw compute power necessary to process the vast amount of complex structured and unstructured data at scale which simply didn’t exist 50 years ago. Secondly the ubiquity of mobile devices in the modern age has driven the commoditisation of the technology that VR and IoT rely on such as High Definition screens, GPRS, Accelerometers making products more affordable. And finally there are a wealth of services being made available from companies like Google, Microsoft, IBM to allow the mass development community significantly lowering the barrier to entry and this is why we are seeing an explosion in there areas.
  5. And this is set to grow exponentially! By 2020 some are estimating that we will see …
  6. In total we could see anywhere up to 50 Billion Connected devices a little over 7 x the total world population This is 50 Billion devices that will be collecting information about us 50 billion potentially unsecure devices 99% of which could be completely unregulated
  7. With these sorts of predictions it isn’t hard to see why the other overarching key topic at SXSW was Security and Privacy. The key questions up for debate were : Why is Security important? How can we better protect our data? And who’s responsible.
  8. So why worry ,why does it need our attention? First and foremost we will continue to collecting and storing more and more personal information about ourseleves. The more data we collect the more we need to look at how to protect it.
  9. Products will get more complicated as more features are added to them. More complexity a piece of software is = more code = This in turn makes harder to maintain and secure. To put this into context the average iPhone APP will contain around 50,000 to 100,000 lines of code The modern high end car contains anywhere up to 100,000,000 lines of code Looking to the future of the fully autonomous car this will require a substantial amount more code to function. One way to mitigate this a little is to disconnect the connected devices: We will see the emergence of new protocols aimed at IoT that will allow connected devices to talk directly to each other without the need for them all to be directly attached to the WiFi network. Products also need to be developed so that individual features are isolated from each where they have no direct dependencies on each other.
  10. A couple of recent examples highlight this nesccesaity: Back in may 2015 a security researcher claimed to have taken control of some systems on board a United Airlines passenger plane he was on, getting as far as issuing a command that briefly changed the course of the plane. Another pair of hackers caused aJeep to crash in July 2015 by accessing. In both scenarios they claimed to have accessed critical controls via non dependant entertainment systems.
  11. Hello Barbie is another example hackers claimed they were able to get access to personal information through the toy. Use the microphone as surveillance device. And access the home Wi-Fi network and from there gain access to other internet connected devices in the house. What these examples do also do is highlight that the impact of someone gaining unauthorised access to these systems and devices in the future could have a far greater impact than being able to access some data.
  12. And now the ability to attack systems is being made easier than ever. A security expert called Adam Tyler gave a talk at SXSW in which he demonstrated just how easy this was and that ther has been a rise in these type of services being made available. He found a site through a simple search and within minutes created a ransomware bot by completing a simple form , ready for distribution. He also went on to say that you expect hacking to be carried out by highly intelligent experienced developers, in actual fact because the hardwork has been done and provided as a service, it is being carried out by children, for fun. There are currently 1 million new malicious software threats created daily , this number is only going to increase.
  13. What can we do to regulate and better inform consumers. Many of the clients that I work with expect us as an agency to have certain levels of accreditation like ISO 27001 and Cyber Essentials, to give them confidence that we have the necessary process and controls in place to manage information security. I think consumers will also become more savvy and look out for certain stamps of approval in the same way to distinguish products that have been more rigoursly tested. Biggest will be regulations that could have a financial impact, like EU General Data Protection Regulation will encourage vendors to consider security more when faced with a potential significant fine. And we could also see the introduction of self propagating rating system’s for IoT as we have seen in different sectors like SOLD Secure rating for locks. This will of course be driven by the market.
  14. What we will see more of is forums from which to discuss security concerns as they emerge driven by businesses, security experts and consumers alike. The IoT Security foundation was set-up at the end of last year and they are doing just that, they are an international, not-for profit, vendor neutral organisation. The their aim is to share best practice in order drive awareness and advocacy for the important issues surrounding the IoT and Security in order to raise user confidence and accelerate adoption.
  15. Lastly there was lots of debate at SXSW around who is responsible for security, ultimately this is the responsibility of everyone. Vendors will need to become more transparent about how consumer data is being used, what is being collected and how it will be secured in a clear and concise manner and not hidden with a 3000 word privacy policy , this will allow consumers to make more informed decisions on the risk versus reward. Nest do this really well, and they encourage consumers, developers and researchers to work with them to alert them if they find any vulnerabilities, supported by Googles vulnerability Reward Programme. We will see a culture shift in the way that many vendors operate to think more like a software agency and work closely with third party security experts to avoid PR disasters and invest more time and money into security to ensure that the products that they create are “Secure by design”.
  16. Is it inevitably in the long term that we will have to rely on research fields such as adversarial machine learning which sits at the intersection between machine learning and computer security. Applying these techniques to IoT to process the vast amount of data to determining safe device behaviour and general usage patterns, which can help to spot and block abnormal activity and potentially harmful behaviour in realtime. Eventually the responsibility may need to the machine thenselves shift to the machine themselves.
  17. SXSX confirmed that these technologies have the capability of significantly enhancing our lives but could also make it a whole lot harder which is why security & privacy cannot be sacrificed in the process, and this is why I think Security & Privacy will continue to be top of the agenda at next years SXSW.