Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective AugmentedWorldExpo
Consumers are now widely adopting wearable technology – consulting firm Deloitte predicted there will be 100 million wearable cameras, smartwatches, fitness trackers and other gadgets on the market by 2020. But with this mass adoption of wearable devices, comes a new data ecosystem that must be protected. Wearables are opening up new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Someone’s heart rate, blood pressure, finances, demographics and daily routine including exercise habits and commuting patterns are being collected and used to improve everyday life. That’s why embracing the protection of this new, intricate data ecosystem is imperative to the success of wearable industry. By effectively addressing the security vulnerabilities, privacy concerns and regulation issues that come with the evolving wearable industry, this brave new world can be enjoyed by all.
Augmented World Expo (AWE) is back for its seventh year in our largest conference and expo featuring technologies giving us superpowers: augmented reality (AR), virtual reality (VR) and wearable tech. Join over 4,000 attendees from all over the world including a mix of CEOs, CTOs, designers, developers, creative agencies, futurists, analysts, investors, and top press in a fantastic opportunity to learn, inspire, partner, and experience first hand the most exciting industry of our times. See more at http://AugmentedWorldExpo.com
Can smart devices solve crimes - or is IoT the new CCTV? An introduction to IoT privacy, security and the use of smart devices as evidence in criminal investigations.
From smart phones, to smart hairbrushes, smart water glasses and yes, even smart bins - we are surrounding ourselves with ever more powerful sensors. Connected devices now occupy our homes, our bodies, and public spaces. What happens when these devices are seized by police or become evidence in court?
In December 2016, prosecutors in Arkansas (US) filed a search warrant for data from Amazon Echo to help solve a murder chase. Amazon’s personal assistant device uses voice recognition to answer user’s questions. Just like Apple refused to help the FBI to unlock an iPhone belonging to one of the San Bernardino terrorists, Amazon also declined to give police any of the information that the Echo logged on its servers. Smart devices as evidence raise complex ethical and legal questions. We are building an Internet of Sensors at a time when we have very little evidence about what kinds of data our devices generate, collect, store or share. In this talk we will address the following questions:
• How can we ensure that devices don't generate and collect more data than they promise to?
• What does consent mean in a world of sensors?
• Algorithms and data anlytics are imperfect. How reliable is data from smart devices as evidence?
• How can manufacturers maintain their customers' privacy?
Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective AugmentedWorldExpo
Consumers are now widely adopting wearable technology – consulting firm Deloitte predicted there will be 100 million wearable cameras, smartwatches, fitness trackers and other gadgets on the market by 2020. But with this mass adoption of wearable devices, comes a new data ecosystem that must be protected. Wearables are opening up new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Someone’s heart rate, blood pressure, finances, demographics and daily routine including exercise habits and commuting patterns are being collected and used to improve everyday life. That’s why embracing the protection of this new, intricate data ecosystem is imperative to the success of wearable industry. By effectively addressing the security vulnerabilities, privacy concerns and regulation issues that come with the evolving wearable industry, this brave new world can be enjoyed by all.
Augmented World Expo (AWE) is back for its seventh year in our largest conference and expo featuring technologies giving us superpowers: augmented reality (AR), virtual reality (VR) and wearable tech. Join over 4,000 attendees from all over the world including a mix of CEOs, CTOs, designers, developers, creative agencies, futurists, analysts, investors, and top press in a fantastic opportunity to learn, inspire, partner, and experience first hand the most exciting industry of our times. See more at http://AugmentedWorldExpo.com
Can smart devices solve crimes - or is IoT the new CCTV? An introduction to IoT privacy, security and the use of smart devices as evidence in criminal investigations.
From smart phones, to smart hairbrushes, smart water glasses and yes, even smart bins - we are surrounding ourselves with ever more powerful sensors. Connected devices now occupy our homes, our bodies, and public spaces. What happens when these devices are seized by police or become evidence in court?
In December 2016, prosecutors in Arkansas (US) filed a search warrant for data from Amazon Echo to help solve a murder chase. Amazon’s personal assistant device uses voice recognition to answer user’s questions. Just like Apple refused to help the FBI to unlock an iPhone belonging to one of the San Bernardino terrorists, Amazon also declined to give police any of the information that the Echo logged on its servers. Smart devices as evidence raise complex ethical and legal questions. We are building an Internet of Sensors at a time when we have very little evidence about what kinds of data our devices generate, collect, store or share. In this talk we will address the following questions:
• How can we ensure that devices don't generate and collect more data than they promise to?
• What does consent mean in a world of sensors?
• Algorithms and data anlytics are imperfect. How reliable is data from smart devices as evidence?
• How can manufacturers maintain their customers' privacy?
Some overview of basic results on representing financial derivative contracts in a strictly formal way. This provides a core for certified management and reasoning on complex financial contracts, at a later stage. -- Based on S. Peyton-Jones, J. M. Eber and P. Sewel's research
Syncrosome: Respiratory disease models for efficacy characterizationSyncrosome
You will find our preclinical in vivo models for your compounds in pneumology.
Syncrosome is a preclinical CRo running in vivo experiments in its own labs with its own animal facilities, working in GLP like conditions
As our digital records are likely to be cyber-breached several times and/or we all have to deal with legal proceedings, learn how to use digital forensics experts efficiently.
IoT & Big Data - A privacy-oriented view of the futureFacundo Mauricio
Understanding the future based on the current technology, with a focus on Big Data and Internet of Things (IoT). A discussion of privacy and personal information and how it affects us.
Some overview of basic results on representing financial derivative contracts in a strictly formal way. This provides a core for certified management and reasoning on complex financial contracts, at a later stage. -- Based on S. Peyton-Jones, J. M. Eber and P. Sewel's research
Syncrosome: Respiratory disease models for efficacy characterizationSyncrosome
You will find our preclinical in vivo models for your compounds in pneumology.
Syncrosome is a preclinical CRo running in vivo experiments in its own labs with its own animal facilities, working in GLP like conditions
As our digital records are likely to be cyber-breached several times and/or we all have to deal with legal proceedings, learn how to use digital forensics experts efficiently.
IoT & Big Data - A privacy-oriented view of the futureFacundo Mauricio
Understanding the future based on the current technology, with a focus on Big Data and Internet of Things (IoT). A discussion of privacy and personal information and how it affects us.
With the possibility of a security incident or breach, immediate decision making is required. It's imperative that organizations kick off immediately their IR Plan and bring all functions together.
The Incident Response Decision Tree can help you build your IR Plan or ensure that you have all decision makers ready.
Time is of the essence in an incident or breach. OpenText Risk & Compliance Advisory and DFIR Teams are available to help organization in their response. For more information on OpenText Security Consulting, visit: https://www.opentext.com/services/security
This presentation tell us about how computer forensic help to find criminals. What strategy is used by forensic specialist for finding a clue. How computer forensic play an important role in case study.
An introduction to the topic of ethics and big data ending with questions about how to teach data journalists. Part of the Berkman Center for Internet & Society's Study group "Teaching Data Storytelling for Civic Impact".
This presentation was given by Eric Vaughan to a meeting of the Security Special Interest Group (SIG) of the Software Developers (SD) Forum, in Palo Alto, CA, in July 2008.
By the end of May 2018 the General Data Protection Regulation (GDPR) will regulate all activities involving the personal data of EU citizens. It does not matter if you’re a European company or not; the new GDPR will bring substantial changes and compliance challenges for every organization that collects, processes, stores, and transfers personal data, anywhere in the world.
Companies have less than a year to implement appropriate technical and organizational measures and ensure compliance with the GDPR, before penalties can be levied beginning 25 May 2018.
2. Surveillance Background Intended vs. Unintended use of tech Examples Assumptions Utilitarian Analysis Kantian Analysis Conclusions Questions
3. Technology We Use Everyday! PC / Internet Consumer Card Programs Electronic Toll Collection (iPass) DVRs GPS /E911/Onstar Public Surveillance Cameras
5. What is REALLY being collected? PC / Internet Data is stored at ISP and other servers Consumer Card Programs Transactions and Products are stored Electronic Toll Collection (iPass) Date and Time of going through are stored on Government Servers DVRs Often no restrictions on data storage and access from marketers and advertisers GPS /E911/Onstar Ability to track people and send data to servers.. Some GPS is latent and can be turned on remotely Public Surveillance Cameras These devices are now being programmed to recognize “suspicious behavior “and alert proper authorities These include police and potentially government. Not sure about facial recognition
7. Who gets this information? Corporations Great for Marketing Opportunities Government Great for trying to identify Terrorists!!! BUT!
8. A system that knows it all! Total Information Awareness (TIA)
9. Who gets this information? Corporations Great for Marketing Opportunities Government Great for trying to identify Terrorists!!! BUT!
10.
11.
Editor's Notes
But this leaves the question, Where does the data go??? Currently there are 2 organizations“Commercial” and “Government”We all know that companies store everything that they can find about you. But how about the government. What about the 1 organization that REALLY knows pretty much all of your sensitive data. So, what happens when all of this information is combined? . Lets look at a program that was canceled a few years back. However parts of this program are still in development in other countries.