SlideShare uma empresa Scribd logo
1 de 19
Baixar para ler offline
Prof. Mark Skilton
Professor of Practice, Information Systems Management
Warwick Business School, UK
m.r.skilton@warwick.ac.uk
The rise of data - Digital economy
Growing 30% of business is shifting online to
search and engage with consumers, markets and
transactions taking account of retail , mobile
and impact on supply channels (1)
80% of transport, real estate and hotelier
activity is processed through websites (2)
over 70% of companies and consumers are
experiencing cyber-privacy challenges (3), (4)
2Prof Mark Skilton Copy right 2014
The Digital Ecosystem
the digital media in social, networks, mobile
devices, sensors and the explosion of big data
and cloud computing networks is
interconnecting potentially everything
everywhere – amounting to a new digital
“ecosystem”
3Prof Mark Skilton Copy right 2014
Cyber Privacy
4Prof Mark Skilton Copy right 2014
A recent
Example..
Cyber Security
5Prof Mark Skilton Copy right 2014
A recent
Example..
Things may not be what they appear..
6Prof Mark Skilton Copy right 2014
In Cyber Security,..
Personas, impersonators,
Sales versus technical skills,
Service qualities ,….
What are you buying, using , who
from ?
Cyber rights
Rights are no longer
national
Erosion of Privacy
Instrumentality of key data
of the workspace
Globalization weakens
everyone’s privacy
7Prof Mark Skilton Copy right 2014
Example viewpoints
Age of the Information Panopticon
8Prof Mark Skilton Copy right 2014
Elevation, section and plan of
Jeremy Bentham's
Panopticon penitentiary,
drawn by Willey Reveley,
1791
Presidio Modelo prison,
Cuba, 2005
Internet and social
Networks 2014..
PCST - Digital Security Strategy
9Prof Mark Skilton Copy right 2014
Privacy
TrustConfidentiality
Security
Mechanisms
Tools
Standards
Optionality in / out
(privacy, cookies, ..)
Zone Boundary
and Domain
Policies
Encryption &
Access
Monitoring
Policies
Assurance
(Surveillance)
Employment law
Commercial
Intellectual Property
False dichotomies
10Prof Mark Skilton Copy right 2014
Privacy ≠ Security Zero sum
game
Positive sumPrivacy and Security
Privacy by Design
Privacy is “built in”
1. Proactive not Reactive; Preventative not Remedial
2. Privacy as the Default Setting
3. Privacy Embedded into Design
4. Full Functionality — Positive-Sum, not Zero-Sum
5. End-to-End Security — Full Lifecycle Protection
6. Visibility and Transparency — Keep it Open
7. Respect for User Privacy — Keep it User-Centric
The debate is over what is Fair information practices (EU
Commission , FTC Federal Trade Commission, FCC ….)
11Prof Mark Skilton Copy right 2014
(1) (2) (3) NYC School of Law,
Berkley Technology Law
Review 2013 , I&P
Commissioner Ontario 2011
Redefinition of Data in the Internet
of things
The Quantified Self & Quantified Life
13Prof Mark Skilton Copy right 2014
The rise of Digital Ecosystems
14Prof Mark Skilton Copy right 2014
The “Smart Hotel”
The rise of Digital Ecosystems
15Prof Mark Skilton Copy right 2014
The rise of Digital Ecosystems
16Prof Mark Skilton Copy right 2014
Role of IT Departments
17Prof Mark Skilton Copy right 2014
Digital
Non-Digital
Physical
Context
Data
Classification
Individuals
Communities
Associations
Access
Authentication
Authorization
Boundaries / Domains Audit / Compliance
Quality of Context Assurance
Legal, Contractual, Political,
Rights, Assertions, Privileges
Commercial, IP , Copyright ,
Brand, Image , Reputation
Privacy
Trust
Confidentiality
Security
Digital
Cyber
Strategy
Technical
Assurance
SLA - GuaranteesNon-Functional
Functional Qualities DR + BC + Resilience
Digital Cyber Strategy
All actors, components, relationships
Objects
change
Digital Risk
Severe
loss
steady Recovery
Role of the IT Department
18Prof Mark Skilton Copy right 2014
Privacy
Trust
Confidentiality
Security
Digital
Cyber
Strategy
Level and control of data disclosure
to unauthorized individuals, entities or processes
Level and control of data isolation
Level and control of individual or organization over
access and use of personal data by a 3rd party
Level and control of authorization
and restriction provided to a
individual or 3rd party to use of
personal data
Level and control of integrity
and persistence of data –
property of accuracy and
completeness
Level of non-repudiation
- ability to prove a claimed
event or action and its
originating entities
Level of conformity –
fulfilment of a requirement
Level of IP – Intellectual Property
containment and Identity Management
Level of monitoring and response
action to planned or unplanned
security incident – (e.g. DDOS)
- A process to determine the
status of a system
Level of perimeterization
Level and control of
authentication –
provision of assurance that a
claimed characteristic of an
entity is correct
Level and control of
authenticity –
property that an entity is what
it claims to be
Data protection, privacy and the IT
department – how to manage the
proliferation of data in your
organisation
Measuring cyber risk
Managing data security
Enabling innovation
19Prof Mark Skilton Copy right 2014

Mais conteúdo relacionado

Mais procurados

Drainware Corporate
Drainware CorporateDrainware Corporate
Drainware Corporate
Jose Palanco
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16
James Rutt
 

Mais procurados (20)

Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-status
 
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
 
Digital workplace security for gen z
Digital workplace security for gen zDigital workplace security for gen z
Digital workplace security for gen z
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions
 
Hacking, Privacy and Security in a Hyperconnected Society
Hacking, Privacy and Security in a Hyperconnected SocietyHacking, Privacy and Security in a Hyperconnected Society
Hacking, Privacy and Security in a Hyperconnected Society
 
Palo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity PredictionsPalo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity Predictions
 
Cyber security and Homeland security
Cyber security and Homeland securityCyber security and Homeland security
Cyber security and Homeland security
 
Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)
 
El Futuro de la Cibersegu
El Futuro de la CiberseguEl Futuro de la Cibersegu
El Futuro de la Cibersegu
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government Agencies
 
Ethics, Professionalism and Other Emerging Technologies
Ethics, Professionalism and Other Emerging TechnologiesEthics, Professionalism and Other Emerging Technologies
Ethics, Professionalism and Other Emerging Technologies
 
Drainware Corporate
Drainware CorporateDrainware Corporate
Drainware Corporate
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16
 
Cyber Security Companies
Cyber Security CompaniesCyber Security Companies
Cyber Security Companies
 
Security economics
Security economicsSecurity economics
Security economics
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
ZION: Security and Internet of Things
ZION: Security and Internet of ThingsZION: Security and Internet of Things
ZION: Security and Internet of Things
 
Infographic - Key Issues CIO's and CISO's Face
Infographic - Key Issues CIO's and CISO's FaceInfographic - Key Issues CIO's and CISO's Face
Infographic - Key Issues CIO's and CISO's Face
 
Internet of Things (IoT
Internet of Things (IoTInternet of Things (IoT
Internet of Things (IoT
 

Destaque

The connected economy mark skilton july 15 bright talk v2
The connected economy mark skilton july 15   bright talk v2The connected economy mark skilton july 15   bright talk v2
The connected economy mark skilton july 15 bright talk v2
Mark Skilton
 
Big data and digital ecosystem mark skilton jan 2014 v1
Big data and digital ecosystem mark skilton jan 2014 v1Big data and digital ecosystem mark skilton jan 2014 v1
Big data and digital ecosystem mark skilton jan 2014 v1
Mark Skilton
 
New Business Models in the Digital Ecosystem
New Business Models in the Digital EcosystemNew Business Models in the Digital Ecosystem
New Business Models in the Digital Ecosystem
NUS-ISS
 
Business models and ecosystems
Business models and ecosystemsBusiness models and ecosystems
Business models and ecosystems
Michael Weiss
 

Destaque (20)

Identifying successful business models to drive monetization of your cloud se...
Identifying successful business models to drive monetization of your cloud se...Identifying successful business models to drive monetization of your cloud se...
Identifying successful business models to drive monetization of your cloud se...
 
Capgemini cloud expoeurope jan 25 2012 m skilton v1.4
Capgemini cloud expoeurope jan 25 2012 m skilton  v1.4Capgemini cloud expoeurope jan 25 2012 m skilton  v1.4
Capgemini cloud expoeurope jan 25 2012 m skilton v1.4
 
Knowing where the safe zone is ovum october 22 2013
Knowing where the safe zone is  ovum october 22 2013 Knowing where the safe zone is  ovum october 22 2013
Knowing where the safe zone is ovum october 22 2013
 
Visualization of an digital ecosystem capgemini m skilton v1
Visualization of an digital ecosystem    capgemini m skilton v1Visualization of an digital ecosystem    capgemini m skilton v1
Visualization of an digital ecosystem capgemini m skilton v1
 
Platform 3 kickoff april 4 2013 my thoughts mark skilton v2
Platform 3 kickoff april 4 2013 my thoughts  mark skilton v2Platform 3 kickoff april 4 2013 my thoughts  mark skilton v2
Platform 3 kickoff april 4 2013 my thoughts mark skilton v2
 
Role of data integration in enabling your digital business march 18 12 noon v1
Role of data integration in enabling your digital business march 18 12 noon v1Role of data integration in enabling your digital business march 18 12 noon v1
Role of data integration in enabling your digital business march 18 12 noon v1
 
Building a digital enterprise – some practitoner views M.Skilton may 2015 v2
Building a digital enterprise – some practitoner views M.Skilton may 2015 v2Building a digital enterprise – some practitoner views M.Skilton may 2015 v2
Building a digital enterprise – some practitoner views M.Skilton may 2015 v2
 
Exploring potential of ng cost of infrastructure m skilton sept 23 2014 v1
Exploring potential of ng cost of infrastructure m skilton sept 23 2014 v1Exploring potential of ng cost of infrastructure m skilton sept 23 2014 v1
Exploring potential of ng cost of infrastructure m skilton sept 23 2014 v1
 
Creating value in the digital economy Prof Mark Skilton May 2014
Creating value in the digital economy Prof Mark Skilton  May 2014 Creating value in the digital economy Prof Mark Skilton  May 2014
Creating value in the digital economy Prof Mark Skilton May 2014
 
The rise of digital ecosystems m skilton june 11 2014 conected suplychain li...
The rise of digital ecosystems  m skilton june 11 2014 conected suplychain li...The rise of digital ecosystems  m skilton june 11 2014 conected suplychain li...
The rise of digital ecosystems m skilton june 11 2014 conected suplychain li...
 
Solution deck capgemini cloud assessment
Solution deck capgemini cloud assessmentSolution deck capgemini cloud assessment
Solution deck capgemini cloud assessment
 
Digital transformation and the role of cloud computing Capgemini Mark Skilt...
Digital transformation and the role of cloud computing   Capgemini Mark Skilt...Digital transformation and the role of cloud computing   Capgemini Mark Skilt...
Digital transformation and the role of cloud computing Capgemini Mark Skilt...
 
The connected economy mark skilton july 15 bright talk v2
The connected economy mark skilton july 15   bright talk v2The connected economy mark skilton july 15   bright talk v2
The connected economy mark skilton july 15 bright talk v2
 
Big data and digital ecosystem mark skilton jan 2014 v1
Big data and digital ecosystem mark skilton jan 2014 v1Big data and digital ecosystem mark skilton jan 2014 v1
Big data and digital ecosystem mark skilton jan 2014 v1
 
Sap cloud ecosystem
Sap cloud ecosystemSap cloud ecosystem
Sap cloud ecosystem
 
Closing the gap in your cloud ecosystem capgemini mark skilton v1
Closing the gap in your cloud ecosystem capgemini mark skilton v1Closing the gap in your cloud ecosystem capgemini mark skilton v1
Closing the gap in your cloud ecosystem capgemini mark skilton v1
 
Ecosistemas Tecnológicos: Innovando en la Educación Abierta
Ecosistemas Tecnológicos: Innovando en la Educación AbiertaEcosistemas Tecnológicos: Innovando en la Educación Abierta
Ecosistemas Tecnológicos: Innovando en la Educación Abierta
 
Cloud Computing for Enterprise Architects
Cloud Computing for Enterprise ArchitectsCloud Computing for Enterprise Architects
Cloud Computing for Enterprise Architects
 
New Business Models in the Digital Ecosystem
New Business Models in the Digital EcosystemNew Business Models in the Digital Ecosystem
New Business Models in the Digital Ecosystem
 
Business models and ecosystems
Business models and ecosystemsBusiness models and ecosystems
Business models and ecosystems
 

Semelhante a Digital security and the IT Department cw500 M Skilton May 22 2014 London v1

Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Andris Soroka
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015
sarah kabirat
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
Ulf Mattsson
 

Semelhante a Digital security and the IT Department cw500 M Skilton May 22 2014 London v1 (20)

Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017
 
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best PracticesSEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
 
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
 
SLVA - Privacy Framework and Approach
SLVA - Privacy Framework and ApproachSLVA - Privacy Framework and Approach
SLVA - Privacy Framework and Approach
 
What is Digital Property Rights by fluidscapes
What is Digital Property Rights by fluidscapesWhat is Digital Property Rights by fluidscapes
What is Digital Property Rights by fluidscapes
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
Infosec lecture-final
Infosec lecture-finalInfosec lecture-final
Infosec lecture-final
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
 
The New frontiers in Information Security
The New frontiers in Information SecurityThe New frontiers in Information Security
The New frontiers in Information Security
 
Isaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyIsaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacy
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
CRI Extract from "Cyber Lessons from the Front lines"
CRI Extract from "Cyber Lessons from the Front lines"CRI Extract from "Cyber Lessons from the Front lines"
CRI Extract from "Cyber Lessons from the Front lines"
 
Information security trends and concerns
Information security trends and concernsInformation security trends and concerns
Information security trends and concerns
 

Último

Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Sheetaleventcompany
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
ellan12
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
imonikaupta
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
Diya Sharma
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 

Último (20)

Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 

Digital security and the IT Department cw500 M Skilton May 22 2014 London v1

  • 1. Prof. Mark Skilton Professor of Practice, Information Systems Management Warwick Business School, UK m.r.skilton@warwick.ac.uk
  • 2. The rise of data - Digital economy Growing 30% of business is shifting online to search and engage with consumers, markets and transactions taking account of retail , mobile and impact on supply channels (1) 80% of transport, real estate and hotelier activity is processed through websites (2) over 70% of companies and consumers are experiencing cyber-privacy challenges (3), (4) 2Prof Mark Skilton Copy right 2014
  • 3. The Digital Ecosystem the digital media in social, networks, mobile devices, sensors and the explosion of big data and cloud computing networks is interconnecting potentially everything everywhere – amounting to a new digital “ecosystem” 3Prof Mark Skilton Copy right 2014
  • 4. Cyber Privacy 4Prof Mark Skilton Copy right 2014 A recent Example..
  • 5. Cyber Security 5Prof Mark Skilton Copy right 2014 A recent Example..
  • 6. Things may not be what they appear.. 6Prof Mark Skilton Copy right 2014 In Cyber Security,.. Personas, impersonators, Sales versus technical skills, Service qualities ,…. What are you buying, using , who from ?
  • 7. Cyber rights Rights are no longer national Erosion of Privacy Instrumentality of key data of the workspace Globalization weakens everyone’s privacy 7Prof Mark Skilton Copy right 2014 Example viewpoints
  • 8. Age of the Information Panopticon 8Prof Mark Skilton Copy right 2014 Elevation, section and plan of Jeremy Bentham's Panopticon penitentiary, drawn by Willey Reveley, 1791 Presidio Modelo prison, Cuba, 2005 Internet and social Networks 2014..
  • 9. PCST - Digital Security Strategy 9Prof Mark Skilton Copy right 2014 Privacy TrustConfidentiality Security Mechanisms Tools Standards Optionality in / out (privacy, cookies, ..) Zone Boundary and Domain Policies Encryption & Access Monitoring Policies Assurance (Surveillance) Employment law Commercial Intellectual Property
  • 10. False dichotomies 10Prof Mark Skilton Copy right 2014 Privacy ≠ Security Zero sum game Positive sumPrivacy and Security
  • 11. Privacy by Design Privacy is “built in” 1. Proactive not Reactive; Preventative not Remedial 2. Privacy as the Default Setting 3. Privacy Embedded into Design 4. Full Functionality — Positive-Sum, not Zero-Sum 5. End-to-End Security — Full Lifecycle Protection 6. Visibility and Transparency — Keep it Open 7. Respect for User Privacy — Keep it User-Centric The debate is over what is Fair information practices (EU Commission , FTC Federal Trade Commission, FCC ….) 11Prof Mark Skilton Copy right 2014 (1) (2) (3) NYC School of Law, Berkley Technology Law Review 2013 , I&P Commissioner Ontario 2011
  • 12. Redefinition of Data in the Internet of things
  • 13. The Quantified Self & Quantified Life 13Prof Mark Skilton Copy right 2014
  • 14. The rise of Digital Ecosystems 14Prof Mark Skilton Copy right 2014 The “Smart Hotel”
  • 15. The rise of Digital Ecosystems 15Prof Mark Skilton Copy right 2014
  • 16. The rise of Digital Ecosystems 16Prof Mark Skilton Copy right 2014
  • 17. Role of IT Departments 17Prof Mark Skilton Copy right 2014 Digital Non-Digital Physical Context Data Classification Individuals Communities Associations Access Authentication Authorization Boundaries / Domains Audit / Compliance Quality of Context Assurance Legal, Contractual, Political, Rights, Assertions, Privileges Commercial, IP , Copyright , Brand, Image , Reputation Privacy Trust Confidentiality Security Digital Cyber Strategy Technical Assurance SLA - GuaranteesNon-Functional Functional Qualities DR + BC + Resilience Digital Cyber Strategy All actors, components, relationships Objects change Digital Risk Severe loss steady Recovery
  • 18. Role of the IT Department 18Prof Mark Skilton Copy right 2014 Privacy Trust Confidentiality Security Digital Cyber Strategy Level and control of data disclosure to unauthorized individuals, entities or processes Level and control of data isolation Level and control of individual or organization over access and use of personal data by a 3rd party Level and control of authorization and restriction provided to a individual or 3rd party to use of personal data Level and control of integrity and persistence of data – property of accuracy and completeness Level of non-repudiation - ability to prove a claimed event or action and its originating entities Level of conformity – fulfilment of a requirement Level of IP – Intellectual Property containment and Identity Management Level of monitoring and response action to planned or unplanned security incident – (e.g. DDOS) - A process to determine the status of a system Level of perimeterization Level and control of authentication – provision of assurance that a claimed characteristic of an entity is correct Level and control of authenticity – property that an entity is what it claims to be
  • 19. Data protection, privacy and the IT department – how to manage the proliferation of data in your organisation Measuring cyber risk Managing data security Enabling innovation 19Prof Mark Skilton Copy right 2014