SlideShare uma empresa Scribd logo
1 de 13
B U I L D I N G T O W A R D S T H E N E W
S E C U R I T Y & P R I V A C Y
L A N D S C A P E
W H E R E D O W E G O F R O M H E R E ?
JULIE TSAI, CYBERSECURITY LEADER
STANFORD CYBERSECURITY & PRIVACY FESTIVAL
STANFORD UNIVERSITY — OCT. 20, 2021
W H A T ’ S H A R D E R N O W
• Virtual+Physical Attack Surface Expansion
• Human-made
• Digital active surface Is Everywhere Now
• Active threat networks
• Overarching reliance & exposure on technology
• Many of the hardest vulnerabilities are where the
technology and humans intersect
• Social engineering - phishes, impersonation
• Tailgating
• Exception processes
• Where resourcing can’t cover enforcement
W H A T ’ S H A R D E R N O W I I
• People’s Health Information Disclosure is
Becoming Normalized as Society’s Price of Entry
• Will CDC/Public Health indicators become like
financial indicators (prime interest rate) which
dictate the climate of restrictions and disclosure
requirements to participate in professional,
social, and public life?
• Requires new expectations on privacy, or new
ways of accommodating public needs with
preserving private civil liberties
N A T U R A L I Z I N G D I G I T A L T R U S T
• The intuitive things that we do to determine
• Who We Trust
• What Context We Trust
• The Extent We Trust
…. How does this get abstracted into the digital
realm?
… We have so much data but all we can do is convert
concepts of trust and relationships into probabilities,
decision-making into quantified risk thresholds.
… Is this sufficient? Do we lose or gain in the
process?
I F Y O U O N L Y K N O W M E O N L I N E ,
W I L L Y O U E V E R R E A L L Y K N O W M E ?
1. Coves and Commons - and Real Caves
2. Circles of trust in real life become more like arenas
and graffiti walls in the digital world
3. The imperfections and forgiveness - inference - of
human memory. Natural coarse-graining*
4. Adjustments to current state - intuitive
adaptation/expectation to real-time change (or its
lack thereof)
5. Synthesis of all the human information - physical
presence (or energy), subjective tone, expression,
focus and aversion, character and potential
I T ’ S A L L A B O U T
IDENTITY
P H Y S I C A L A N D E P H E M E R A L -
E A C H H A V E T H E I R P L A C E
Physical Digital
Realtime Efficiency Asynchronous Efficiency
Persistent Artifacts Ephemeral Artifacts
Linear Scale Exponential Scale
Data Is an Attribute Data Has Its Own Value
Point-in-Time Data Value Drifts Point-in-Time Data Value Persists
Large Amounts of Integrated Data Discrete Atomic Data
“ S T R O N G A U T H E N T I C A T I O N ” M F A / 2 F A
More
Ephemeral
More
Immutable
Something
You Know
Something
You Have
Something
You Are
C A L L T O A C T I O N Q U E S T I O N S I
•How can we use technology in a private & secure way?
• Networked technology is pervasive in every arena
• Increasing reliance during pandemic times
•How do we encourage meaningful innovation in this
area?
•Does secure and private use of technology require that
consumers also transform into stewards of their data?
C A L L T O A C T I O N Q U E S T I O N S I I
• How could we design technology in a way that
tailoring for the consumer doesn’t require giving
away permanent ID
• Something I Am - Temporary ID/Attributes
• Something that loses value/meaning in the long
term
• Biometrics that vary and aren’t highly specific
• Does the integrity of identity require it be specific
to the human
C A L L T O A C T I O N Q U E S T I O N S I I I
Can We Value, Measure, and Design for
Attribution Fade (or Decay) for better privacy?
S I M P L E E N O U G H T O L I V E W I T H
Technology hard enough to manage by its makers
Can it be understood be its consumers?
Can it be managed if it’s not understood?
R E F E R E N C E S & I M A G E C R E D I T S
• “Coarse-graining” - see http://markburgess.org/blog_reactive.html
• Tatto fader - see https://twitter.com/avid/status/1354263865773723649?lang=de

Mais conteúdo relacionado

Semelhante a Building Towards the New Security & Privacy Landscape: Where Do We Go From Here?

UX STRAT Asia 2020: Veena Sonwalkar, frog
UX STRAT Asia 2020: Veena Sonwalkar, frogUX STRAT Asia 2020: Veena Sonwalkar, frog
UX STRAT Asia 2020: Veena Sonwalkar, frogUX STRAT
 
Webinar The Role of Trust in Digital policy 2016
Webinar The Role of Trust in Digital policy 2016Webinar The Role of Trust in Digital policy 2016
Webinar The Role of Trust in Digital policy 2016Desiree Miloshevic
 
Letter of Intent - Open Society Fellowship
Letter of Intent - Open Society FellowshipLetter of Intent - Open Society Fellowship
Letter of Intent - Open Society FellowshipSloane Joie Trugman
 
Data in international development (extended)
Data in international development (extended)Data in international development (extended)
Data in international development (extended)zararah
 
Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Dave Holland
 
Why me? Why Online? Social Media and Public Health
Why me? Why Online? Social Media and Public HealthWhy me? Why Online? Social Media and Public Health
Why me? Why Online? Social Media and Public HealthNancy Wright White
 
Spark the Change Montreal 2021 - Under Pressure - Jon Husband
Spark the Change Montreal 2021 - Under Pressure - Jon HusbandSpark the Change Montreal 2021 - Under Pressure - Jon Husband
Spark the Change Montreal 2021 - Under Pressure - Jon HusbandSpark the Change Montréal
 
Comm 101 digital nation reflection-LUTHER
Comm 101 digital nation reflection-LUTHERComm 101 digital nation reflection-LUTHER
Comm 101 digital nation reflection-LUTHERprofluther
 
Big Data and the Future of Money 2014
Big Data and the Future of Money 2014Big Data and the Future of Money 2014
Big Data and the Future of Money 2014Daniel Austin
 
The End of Information Technology: Introducing Hypersense & Human Technology
The End of Information Technology: Introducing Hypersense & Human TechnologyThe End of Information Technology: Introducing Hypersense & Human Technology
The End of Information Technology: Introducing Hypersense & Human TechnologyMartin Geddes
 
Making Decisions in a World Awash in Data: We’re going to need a different bo...
Making Decisions in a World Awash in Data: We’re going to need a different bo...Making Decisions in a World Awash in Data: We’re going to need a different bo...
Making Decisions in a World Awash in Data: We’re going to need a different bo...Micah Altman
 
Final Destination: Creating a better afterlife for our digital treasures.
Final Destination: Creating a better afterlife for our digital treasures.Final Destination: Creating a better afterlife for our digital treasures.
Final Destination: Creating a better afterlife for our digital treasures.Melissa Falconett
 
Transformations in interaction
Transformations in interactionTransformations in interaction
Transformations in interactionYavuz Paksoy
 
Geolocation Prediction in Art and other Industries - Katerina Lydon
Geolocation Prediction in Art and other Industries - Katerina LydonGeolocation Prediction in Art and other Industries - Katerina Lydon
Geolocation Prediction in Art and other Industries - Katerina LydonKaterina Lydon
 
Digital Citizenship--National Liberty Museum
Digital Citizenship--National Liberty MuseumDigital Citizenship--National Liberty Museum
Digital Citizenship--National Liberty MuseumMary Beth Hertz
 
Lara Srivastava TAFI workshop
Lara Srivastava TAFI workshopLara Srivastava TAFI workshop
Lara Srivastava TAFI workshopblogzilla
 

Semelhante a Building Towards the New Security & Privacy Landscape: Where Do We Go From Here? (20)

UX STRAT Asia 2020: Veena Sonwalkar, frog
UX STRAT Asia 2020: Veena Sonwalkar, frogUX STRAT Asia 2020: Veena Sonwalkar, frog
UX STRAT Asia 2020: Veena Sonwalkar, frog
 
Webinar The Role of Trust in Digital policy 2016
Webinar The Role of Trust in Digital policy 2016Webinar The Role of Trust in Digital policy 2016
Webinar The Role of Trust in Digital policy 2016
 
IT and Systems Security - The Bigger Picture
IT and Systems Security - The Bigger PictureIT and Systems Security - The Bigger Picture
IT and Systems Security - The Bigger Picture
 
Letter of Intent - Open Society Fellowship
Letter of Intent - Open Society FellowshipLetter of Intent - Open Society Fellowship
Letter of Intent - Open Society Fellowship
 
Cyber Portents and Precursors
Cyber Portents and PrecursorsCyber Portents and Precursors
Cyber Portents and Precursors
 
Data in international development (extended)
Data in international development (extended)Data in international development (extended)
Data in international development (extended)
 
Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...
 
Why me? Why Online? Social Media and Public Health
Why me? Why Online? Social Media and Public HealthWhy me? Why Online? Social Media and Public Health
Why me? Why Online? Social Media and Public Health
 
Spark the Change Montreal 2021 - Under Pressure - Jon Husband
Spark the Change Montreal 2021 - Under Pressure - Jon HusbandSpark the Change Montreal 2021 - Under Pressure - Jon Husband
Spark the Change Montreal 2021 - Under Pressure - Jon Husband
 
Comm 101 digital nation reflection-LUTHER
Comm 101 digital nation reflection-LUTHERComm 101 digital nation reflection-LUTHER
Comm 101 digital nation reflection-LUTHER
 
The Microchip
The Microchip The Microchip
The Microchip
 
Big Data and the Future of Money 2014
Big Data and the Future of Money 2014Big Data and the Future of Money 2014
Big Data and the Future of Money 2014
 
The End of Information Technology: Introducing Hypersense & Human Technology
The End of Information Technology: Introducing Hypersense & Human TechnologyThe End of Information Technology: Introducing Hypersense & Human Technology
The End of Information Technology: Introducing Hypersense & Human Technology
 
Making Decisions in a World Awash in Data: We’re going to need a different bo...
Making Decisions in a World Awash in Data: We’re going to need a different bo...Making Decisions in a World Awash in Data: We’re going to need a different bo...
Making Decisions in a World Awash in Data: We’re going to need a different bo...
 
Final Destination: Creating a better afterlife for our digital treasures.
Final Destination: Creating a better afterlife for our digital treasures.Final Destination: Creating a better afterlife for our digital treasures.
Final Destination: Creating a better afterlife for our digital treasures.
 
Transformations in interaction
Transformations in interactionTransformations in interaction
Transformations in interaction
 
Geolocation Prediction in Art and other Industries - Katerina Lydon
Geolocation Prediction in Art and other Industries - Katerina LydonGeolocation Prediction in Art and other Industries - Katerina Lydon
Geolocation Prediction in Art and other Industries - Katerina Lydon
 
Society 5.0: A Vital Symbiosis
Society 5.0: A Vital SymbiosisSociety 5.0: A Vital Symbiosis
Society 5.0: A Vital Symbiosis
 
Digital Citizenship--National Liberty Museum
Digital Citizenship--National Liberty MuseumDigital Citizenship--National Liberty Museum
Digital Citizenship--National Liberty Museum
 
Lara Srivastava TAFI workshop
Lara Srivastava TAFI workshopLara Srivastava TAFI workshop
Lara Srivastava TAFI workshop
 

Mais de Julie Tsai

pbc_devsecops_eastereggs.2022oct06.jt.pptx
pbc_devsecops_eastereggs.2022oct06.jt.pptxpbc_devsecops_eastereggs.2022oct06.jt.pptx
pbc_devsecops_eastereggs.2022oct06.jt.pptxJulie Tsai
 
Everything you know is wrong: How Computer-Ing While Leading People Will Be Y...
Everything you know is wrong: How Computer-Ing While Leading People Will Be Y...Everything you know is wrong: How Computer-Ing While Leading People Will Be Y...
Everything you know is wrong: How Computer-Ing While Leading People Will Be Y...Julie Tsai
 
Carrot hammer olivebranch.devopseast.20.2019nov08
Carrot hammer olivebranch.devopseast.20.2019nov08Carrot hammer olivebranch.devopseast.20.2019nov08
Carrot hammer olivebranch.devopseast.20.2019nov08Julie Tsai
 
Build It and They Will Come-Pliant
Build It and They Will Come-PliantBuild It and They Will Come-Pliant
Build It and They Will Come-PliantJulie Tsai
 
API Security: Assume Possible Interference
API Security: Assume Possible InterferenceAPI Security: Assume Possible Interference
API Security: Assume Possible InterferenceJulie Tsai
 
Why the org_matters_shorter.jzt.2018sept25
Why the org_matters_shorter.jzt.2018sept25Why the org_matters_shorter.jzt.2018sept25
Why the org_matters_shorter.jzt.2018sept25Julie Tsai
 
Dev ops and_infrastructure_immunology_v0.4
Dev ops and_infrastructure_immunology_v0.4Dev ops and_infrastructure_immunology_v0.4
Dev ops and_infrastructure_immunology_v0.4Julie Tsai
 
Puppet HackDay/BarCamp New Delhi Exercises
Puppet HackDay/BarCamp New Delhi ExercisesPuppet HackDay/BarCamp New Delhi Exercises
Puppet HackDay/BarCamp New Delhi ExercisesJulie Tsai
 
Automate your systems with puppet, and change your life
Automate your systems with puppet, and change your lifeAutomate your systems with puppet, and change your life
Automate your systems with puppet, and change your lifeJulie Tsai
 

Mais de Julie Tsai (9)

pbc_devsecops_eastereggs.2022oct06.jt.pptx
pbc_devsecops_eastereggs.2022oct06.jt.pptxpbc_devsecops_eastereggs.2022oct06.jt.pptx
pbc_devsecops_eastereggs.2022oct06.jt.pptx
 
Everything you know is wrong: How Computer-Ing While Leading People Will Be Y...
Everything you know is wrong: How Computer-Ing While Leading People Will Be Y...Everything you know is wrong: How Computer-Ing While Leading People Will Be Y...
Everything you know is wrong: How Computer-Ing While Leading People Will Be Y...
 
Carrot hammer olivebranch.devopseast.20.2019nov08
Carrot hammer olivebranch.devopseast.20.2019nov08Carrot hammer olivebranch.devopseast.20.2019nov08
Carrot hammer olivebranch.devopseast.20.2019nov08
 
Build It and They Will Come-Pliant
Build It and They Will Come-PliantBuild It and They Will Come-Pliant
Build It and They Will Come-Pliant
 
API Security: Assume Possible Interference
API Security: Assume Possible InterferenceAPI Security: Assume Possible Interference
API Security: Assume Possible Interference
 
Why the org_matters_shorter.jzt.2018sept25
Why the org_matters_shorter.jzt.2018sept25Why the org_matters_shorter.jzt.2018sept25
Why the org_matters_shorter.jzt.2018sept25
 
Dev ops and_infrastructure_immunology_v0.4
Dev ops and_infrastructure_immunology_v0.4Dev ops and_infrastructure_immunology_v0.4
Dev ops and_infrastructure_immunology_v0.4
 
Puppet HackDay/BarCamp New Delhi Exercises
Puppet HackDay/BarCamp New Delhi ExercisesPuppet HackDay/BarCamp New Delhi Exercises
Puppet HackDay/BarCamp New Delhi Exercises
 
Automate your systems with puppet, and change your life
Automate your systems with puppet, and change your lifeAutomate your systems with puppet, and change your life
Automate your systems with puppet, and change your life
 

Último

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Último (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Building Towards the New Security & Privacy Landscape: Where Do We Go From Here?

  • 1. B U I L D I N G T O W A R D S T H E N E W S E C U R I T Y & P R I V A C Y L A N D S C A P E W H E R E D O W E G O F R O M H E R E ? JULIE TSAI, CYBERSECURITY LEADER STANFORD CYBERSECURITY & PRIVACY FESTIVAL STANFORD UNIVERSITY — OCT. 20, 2021
  • 2. W H A T ’ S H A R D E R N O W • Virtual+Physical Attack Surface Expansion • Human-made • Digital active surface Is Everywhere Now • Active threat networks • Overarching reliance & exposure on technology • Many of the hardest vulnerabilities are where the technology and humans intersect • Social engineering - phishes, impersonation • Tailgating • Exception processes • Where resourcing can’t cover enforcement
  • 3. W H A T ’ S H A R D E R N O W I I • People’s Health Information Disclosure is Becoming Normalized as Society’s Price of Entry • Will CDC/Public Health indicators become like financial indicators (prime interest rate) which dictate the climate of restrictions and disclosure requirements to participate in professional, social, and public life? • Requires new expectations on privacy, or new ways of accommodating public needs with preserving private civil liberties
  • 4. N A T U R A L I Z I N G D I G I T A L T R U S T • The intuitive things that we do to determine • Who We Trust • What Context We Trust • The Extent We Trust …. How does this get abstracted into the digital realm? … We have so much data but all we can do is convert concepts of trust and relationships into probabilities, decision-making into quantified risk thresholds. … Is this sufficient? Do we lose or gain in the process?
  • 5. I F Y O U O N L Y K N O W M E O N L I N E , W I L L Y O U E V E R R E A L L Y K N O W M E ? 1. Coves and Commons - and Real Caves 2. Circles of trust in real life become more like arenas and graffiti walls in the digital world 3. The imperfections and forgiveness - inference - of human memory. Natural coarse-graining* 4. Adjustments to current state - intuitive adaptation/expectation to real-time change (or its lack thereof) 5. Synthesis of all the human information - physical presence (or energy), subjective tone, expression, focus and aversion, character and potential
  • 6. I T ’ S A L L A B O U T IDENTITY
  • 7. P H Y S I C A L A N D E P H E M E R A L - E A C H H A V E T H E I R P L A C E Physical Digital Realtime Efficiency Asynchronous Efficiency Persistent Artifacts Ephemeral Artifacts Linear Scale Exponential Scale Data Is an Attribute Data Has Its Own Value Point-in-Time Data Value Drifts Point-in-Time Data Value Persists Large Amounts of Integrated Data Discrete Atomic Data
  • 8. “ S T R O N G A U T H E N T I C A T I O N ” M F A / 2 F A More Ephemeral More Immutable Something You Know Something You Have Something You Are
  • 9. C A L L T O A C T I O N Q U E S T I O N S I •How can we use technology in a private & secure way? • Networked technology is pervasive in every arena • Increasing reliance during pandemic times •How do we encourage meaningful innovation in this area? •Does secure and private use of technology require that consumers also transform into stewards of their data?
  • 10. C A L L T O A C T I O N Q U E S T I O N S I I • How could we design technology in a way that tailoring for the consumer doesn’t require giving away permanent ID • Something I Am - Temporary ID/Attributes • Something that loses value/meaning in the long term • Biometrics that vary and aren’t highly specific • Does the integrity of identity require it be specific to the human
  • 11. C A L L T O A C T I O N Q U E S T I O N S I I I Can We Value, Measure, and Design for Attribution Fade (or Decay) for better privacy?
  • 12. S I M P L E E N O U G H T O L I V E W I T H Technology hard enough to manage by its makers Can it be understood be its consumers? Can it be managed if it’s not understood?
  • 13. R E F E R E N C E S & I M A G E C R E D I T S • “Coarse-graining” - see http://markburgess.org/blog_reactive.html • Tatto fader - see https://twitter.com/avid/status/1354263865773723649?lang=de

Notas do Editor

  1. foobarfoo
  2. foobarfoo
  3. We have attributes - so much data
  4. We have attributes - so much data 3. “Coarse-graining” - see http://markburgess.org/blog_reactive.html 4. Adjustments to current state - i.e. a photo depicts who we are at a point-in-time. If I don’t update this picture, I can use it for whatever period of time. But at a certain point it no longer serves as a digital confirmation, but an artifact like a watermark or other pattern of life. Whereas a human would rapidly confirm or not confirm the match is correct, accounting for age. Or a Secret question, “what is my favorite color?” what if it’s different tomorrow? 5.
  5. We have attributes - so much data 3. “Coarse-graining” - see http://markburgess.org/blog_reactive.html 4. Adjustments to current state - i.e. a photo depicts who we are at a point-in-time. If I don’t update this picture, I can use it for whatever period of time. But at a certain point it no longer serves as a digital confirmation, but an artifact like a watermark or other pattern of life. Whereas a human would rapidly confirm or not confirm the match is correct, accounting for age. Or a Secret question, “what is my favorite color?” what if it’s different tomorrow? 5.
  6. Point in-Time Data Value My password - in real life value only there if it works In P-i-T password dump may have persistent value
  7. Point in-Time Data Value My password - in real life value only there if it works In P-i-T password dump may have persistent value
  8. foobarfoo
  9. foobarfoo
  10. foobarfoo
  11. Point in-Time Data Value My password - in real life value only there if it works In P-i-T password dump may have persistent value