SlideShare a Scribd company logo
If data will be all over the
space, who will take care
of protecting it
Rosario B. Casas
@rosariobc
@vramericas
Julia Costin
@ITGirl_ITWorld
@Americas_cyber
STARTING THE CONVERSATION
1
Cyber State
TOMORROW’S DIGITAL REALITY
DIGITAL OR PHYSICAL WORLD
“Digital and physical worlds collide as
augmented reality moves from science fiction
into everyday consumer and business life,
opening up new opportunities for digital
marketers.”
TALENT GAP
The demand for cybersecurity professionals over the past five
years grew over 3.5 faster than the demand for other IT jobs and
about 12 times faster than for all other jobs.
Cybersecurity is increasingly vital as more and more people are
connected by the Internet, businesses are dependent on cloud-
based and big data services, and governments are facing
increased web-based attacks related to terrorism, espionage or
other areas.
COLLABORATION
TALENT GAP
According to (ISC)² Cybersecurity Workforce Study 2018
2
Challenges
EARLY MOMENT
• Quick prototyping and product release
• Cyber experts waiting for a mature industry to define
standards and policies
• “they have not looked at the security/privacy issues
in VR/ AR, as the technology has not matured yet
and the use of technology is not widespread
amongst consumers”
DATA COLLECTION
• Legitimate users may be unaware that their personal
data may have been captured and, then, leaked
PERSONAL DATA AND
PREFERENCES
• Location, social ties, verbal communication, product
preferences, sensitive information, etc.
• Physical daily environment and interactions
NON VERBAL DATA
• with VR - companies collect non-verbal behavior
(user’s posture, eye-tracking, gestures, facial
expressions, etc.)
*** spending 20 minutes in a VR simulation leaves
about 2 million unique recordings of body language
NON VERBAL DATA
What can Non-Verbal behavior tell us about a person?
• Mental State
• Health Information
• Emotions
• Learning behavior - determine future behavior
• Body language - data can be used to estimate students’
test scores, determine emotions, etc.
BIOMETRIC IDENTIFIERS
• Data generated by automatic measurements of an
individual’s’ biological characteristics, such as fingerprint,
voiceprint, eye retinas, irises, or other unique biological
patterns or characteristics that can be used to identify a
specific individual.
3
Take away
• Digital blackmail
• Hackers access to this data could lead to digital replicas/
digital clones of you being created and used to
impersonate you for malicious reasons.
• Many times, VR/AR systems haven't implemented
encryption for network connects
• Many VR/AR systems rely on third-party apps or
integrations -
TALENT GAP
ISACA Info graph State of Cybersecurity 2019 Resources and Threats.
COLLABORATION FOR THE
FUTURE
QUESTIONS
Rosario B. Casas
@rosariobc
@vramericas
Julia Costin
@ITGirl_ITWorld
@Americas_cyber

More Related Content

What's hot

Extending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office PerimeterExtending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office Perimeter
Veriato
 
Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.
Dr. Michael Agbaje
 
Itgs
ItgsItgs
Itgs
tpgml4546
 
IT Ethics
IT EthicsIT Ethics
IT Ethics
Keith Putnam
 
Isc(2) eastbay-lenin aboagye
Isc(2) eastbay-lenin aboagyeIsc(2) eastbay-lenin aboagye
Isc(2) eastbay-lenin aboagye
Lenin Aboagye
 
Security in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) EcosystemSecurity in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) Ecosystem
rahulbindra
 
Cyber security and Homeland security
Cyber security and Homeland securityCyber security and Homeland security
Cyber security and Homeland security
ADGP, Public Grivences, Bangalore
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
Mohit Dholakiya
 
Mobile Computing: QR Codes & Cloud Apps
Mobile Computing: QR Codes & Cloud Apps Mobile Computing: QR Codes & Cloud Apps
Mobile Computing: QR Codes & Cloud Apps ayoungkin
 
ThingsConAMS 2017 - Mirko Ross - Internet of Shit Fails
ThingsConAMS 2017 - Mirko Ross - Internet of Shit FailsThingsConAMS 2017 - Mirko Ross - Internet of Shit Fails
ThingsConAMS 2017 - Mirko Ross - Internet of Shit Fails
ThingsConAMS
 
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le..."Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
Dataconomy Media
 
The Basics: Reviewing & Producing ESI Evidence
The Basics: Reviewing & Producing ESI EvidenceThe Basics: Reviewing & Producing ESI Evidence
The Basics: Reviewing & Producing ESI Evidence
Aaron Vick
 
ITGS
ITGSITGS
Mozilla wot dwika v5
Mozilla wot dwika  v5Mozilla wot dwika  v5
Mozilla wot dwika v5
Dwika Sudrajat
 
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
Rushabh Shah
 
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityKeeping up with the Revolution in IT Security
Keeping up with the Revolution in IT Security
Distil Networks
 
Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)
Rakshit Sharma
 
HIPAA Compliance For Emerging Technologies
HIPAA Compliance For Emerging TechnologiesHIPAA Compliance For Emerging Technologies
HIPAA Compliance For Emerging Technologies
Synerzip
 

What's hot (20)

Extending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office PerimeterExtending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office Perimeter
 
Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.
 
GuardianGabriel
GuardianGabrielGuardianGabriel
GuardianGabriel
 
Itgs
ItgsItgs
Itgs
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
IT Ethics
IT EthicsIT Ethics
IT Ethics
 
Isc(2) eastbay-lenin aboagye
Isc(2) eastbay-lenin aboagyeIsc(2) eastbay-lenin aboagye
Isc(2) eastbay-lenin aboagye
 
Security in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) EcosystemSecurity in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) Ecosystem
 
Cyber security and Homeland security
Cyber security and Homeland securityCyber security and Homeland security
Cyber security and Homeland security
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Mobile Computing: QR Codes & Cloud Apps
Mobile Computing: QR Codes & Cloud Apps Mobile Computing: QR Codes & Cloud Apps
Mobile Computing: QR Codes & Cloud Apps
 
ThingsConAMS 2017 - Mirko Ross - Internet of Shit Fails
ThingsConAMS 2017 - Mirko Ross - Internet of Shit FailsThingsConAMS 2017 - Mirko Ross - Internet of Shit Fails
ThingsConAMS 2017 - Mirko Ross - Internet of Shit Fails
 
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le..."Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
 
The Basics: Reviewing & Producing ESI Evidence
The Basics: Reviewing & Producing ESI EvidenceThe Basics: Reviewing & Producing ESI Evidence
The Basics: Reviewing & Producing ESI Evidence
 
ITGS
ITGSITGS
ITGS
 
Mozilla wot dwika v5
Mozilla wot dwika  v5Mozilla wot dwika  v5
Mozilla wot dwika v5
 
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
 
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityKeeping up with the Revolution in IT Security
Keeping up with the Revolution in IT Security
 
Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)
 
HIPAA Compliance For Emerging Technologies
HIPAA Compliance For Emerging TechnologiesHIPAA Compliance For Emerging Technologies
HIPAA Compliance For Emerging Technologies
 

Similar to Rosario B. Casas ( www.vramericas.com): If data will be all over the space, who will take care of protecting it

How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things? How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things?
Mercatus Center
 
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Adam Thierer
 
Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile Technology
Tom Eston
 
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)Adam Thierer
 
Big Data and Information Security
Big Data and Information SecurityBig Data and Information Security
Big Data and Information Security
ijceronline
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect id
David Kelts, CIPT
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21
Robert Stribley
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
IJERA Editor
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
IJERA Editor
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
Jim Brashear
 
Privacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin NeviasPrivacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin Nevias
Kevin Nevias
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
Sravan Ankaraju
 
IoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureIoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the future
Facundo Mauricio
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
Don Lovett
 
Big Data and You
Big Data and YouBig Data and You
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
mkeane
 
Big Data and Privacy
Big Data and PrivacyBig Data and Privacy
Big Data and Privacy
mjsale781
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
Jennifer Polack
 
Class_onlineprivacy.ppt
Class_onlineprivacy.pptClass_onlineprivacy.ppt
Class_onlineprivacy.ppt
Arvind Bhisikar
 

Similar to Rosario B. Casas ( www.vramericas.com): If data will be all over the space, who will take care of protecting it (20)

How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things? How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things?
 
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
 
Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile Technology
 
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
 
Big Data and Information Security
Big Data and Information SecurityBig Data and Information Security
Big Data and Information Security
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect id
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
 
Privacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin NeviasPrivacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin Nevias
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
Internet of Things TCLG Oct 23 2014
Internet of Things TCLG Oct 23 2014Internet of Things TCLG Oct 23 2014
Internet of Things TCLG Oct 23 2014
 
IoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureIoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the future
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
 
Big Data and You
Big Data and YouBig Data and You
Big Data and You
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
 
Big Data and Privacy
Big Data and PrivacyBig Data and Privacy
Big Data and Privacy
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Class_onlineprivacy.ppt
Class_onlineprivacy.pptClass_onlineprivacy.ppt
Class_onlineprivacy.ppt
 

More from AugmentedWorldExpo

Bill Meyer (Virtual Science Center): Turning Kids on to STEM by Letting Them ...
Bill Meyer (Virtual Science Center): Turning Kids on to STEM by Letting Them ...Bill Meyer (Virtual Science Center): Turning Kids on to STEM by Letting Them ...
Bill Meyer (Virtual Science Center): Turning Kids on to STEM by Letting Them ...
AugmentedWorldExpo
 
Nick Klingensmith (Microsoft): Increasing Immersion with the MR Lighting Tools
Nick Klingensmith (Microsoft): Increasing Immersion with the MR Lighting ToolsNick Klingensmith (Microsoft): Increasing Immersion with the MR Lighting Tools
Nick Klingensmith (Microsoft): Increasing Immersion with the MR Lighting Tools
AugmentedWorldExpo
 
Rokid: Design a seamless solution for AR glasses
Rokid: Design a seamless solution for AR glassesRokid: Design a seamless solution for AR glasses
Rokid: Design a seamless solution for AR glasses
AugmentedWorldExpo
 
How AR is Transforming the Online Retail Experience
How AR is Transforming the Online Retail ExperienceHow AR is Transforming the Online Retail Experience
How AR is Transforming the Online Retail Experience
AugmentedWorldExpo
 
Chloe Doyeon Kim (MAXST): The Current and Future State of MAXST Platform
Chloe Doyeon Kim (MAXST): The Current and Future State of MAXST PlatformChloe Doyeon Kim (MAXST): The Current and Future State of MAXST Platform
Chloe Doyeon Kim (MAXST): The Current and Future State of MAXST Platform
AugmentedWorldExpo
 
AWE USA 2019: Owning Augmented Space
AWE USA 2019: Owning Augmented SpaceAWE USA 2019: Owning Augmented Space
AWE USA 2019: Owning Augmented Space
AugmentedWorldExpo
 
Victor Sun (Shadow Creator): How to turn Mixed Reality “headset” into “glasses”?
Victor Sun (Shadow Creator): How to turn Mixed Reality “headset” into “glasses”?Victor Sun (Shadow Creator): How to turn Mixed Reality “headset” into “glasses”?
Victor Sun (Shadow Creator): How to turn Mixed Reality “headset” into “glasses”?
AugmentedWorldExpo
 
Chris Pickett (DigiLens): XR is Hard: Here’s Why
Chris Pickett (DigiLens): XR is Hard: Here’s WhyChris Pickett (DigiLens): XR is Hard: Here’s Why
Chris Pickett (DigiLens): XR is Hard: Here’s Why
AugmentedWorldExpo
 
Antti Sunnari (Dispelix Ltd): Full-color, single-waveguide near-eye displays ...
Antti Sunnari (Dispelix Ltd): Full-color, single-waveguide near-eye displays ...Antti Sunnari (Dispelix Ltd): Full-color, single-waveguide near-eye displays ...
Antti Sunnari (Dispelix Ltd): Full-color, single-waveguide near-eye displays ...
AugmentedWorldExpo
 
Jian Liang (HiScene): AR for Industry in China: From Concepts to Real Applica...
Jian Liang (HiScene): AR for Industry in China: From Concepts to Real Applica...Jian Liang (HiScene): AR for Industry in China: From Concepts to Real Applica...
Jian Liang (HiScene): AR for Industry in China: From Concepts to Real Applica...
AugmentedWorldExpo
 
Augmented reality meets Television -Ellen DeGeneres' Game of Games AR App
Augmented reality meets Television -Ellen DeGeneres' Game of Games AR AppAugmented reality meets Television -Ellen DeGeneres' Game of Games AR App
Augmented reality meets Television -Ellen DeGeneres' Game of Games AR App
AugmentedWorldExpo
 
Jennifer Cook (Dreamscape Immersive): Dreamscape Immersive Presentation
Jennifer Cook (Dreamscape Immersive): Dreamscape Immersive PresentationJennifer Cook (Dreamscape Immersive): Dreamscape Immersive Presentation
Jennifer Cook (Dreamscape Immersive): Dreamscape Immersive Presentation
AugmentedWorldExpo
 
AWE USA 2019: 2 Partners sharing 1 vision for smart operators
AWE USA 2019: 2 Partners sharing 1 vision for smart operatorsAWE USA 2019: 2 Partners sharing 1 vision for smart operators
AWE USA 2019: 2 Partners sharing 1 vision for smart operators
AugmentedWorldExpo
 
Phil LaFond (Bosch Automotive Service Solutions Inc.): Bosch Technical Traini...
Phil LaFond (Bosch Automotive Service Solutions Inc.): Bosch Technical Traini...Phil LaFond (Bosch Automotive Service Solutions Inc.): Bosch Technical Traini...
Phil LaFond (Bosch Automotive Service Solutions Inc.): Bosch Technical Traini...
AugmentedWorldExpo
 
Scott Montgomerie (Scope AR): AR’s Influence on the Workforce of Tomorrow: Jo...
Scott Montgomerie (Scope AR): AR’s Influence on the Workforce of Tomorrow: Jo...Scott Montgomerie (Scope AR): AR’s Influence on the Workforce of Tomorrow: Jo...
Scott Montgomerie (Scope AR): AR’s Influence on the Workforce of Tomorrow: Jo...
AugmentedWorldExpo
 
Hugo Swart (Qualcomm, Inc.): How 5G, Distributed Processing and Technology Ad...
Hugo Swart (Qualcomm, Inc.): How 5G, Distributed Processing and Technology Ad...Hugo Swart (Qualcomm, Inc.): How 5G, Distributed Processing and Technology Ad...
Hugo Swart (Qualcomm, Inc.): How 5G, Distributed Processing and Technology Ad...
AugmentedWorldExpo
 
Valentin Heun (PTC): One Reality - A 3rd generation AR User Interface
Valentin Heun (PTC): One Reality - A 3rd generation AR User InterfaceValentin Heun (PTC): One Reality - A 3rd generation AR User Interface
Valentin Heun (PTC): One Reality - A 3rd generation AR User Interface
AugmentedWorldExpo
 
Anton Ebert (Siemens Healthcare): Challenges and approaches on integrating a ...
Anton Ebert (Siemens Healthcare): Challenges and approaches on integrating a ...Anton Ebert (Siemens Healthcare): Challenges and approaches on integrating a ...
Anton Ebert (Siemens Healthcare): Challenges and approaches on integrating a ...
AugmentedWorldExpo
 
Sarah Hill (Healium by StoryUP Studios): Healing Stories Powered by Biometrics
Sarah Hill (Healium by StoryUP Studios): Healing Stories Powered by BiometricsSarah Hill (Healium by StoryUP Studios): Healing Stories Powered by Biometrics
Sarah Hill (Healium by StoryUP Studios): Healing Stories Powered by Biometrics
AugmentedWorldExpo
 
Iva Leon (ARVR Women and Allies): Building community with social VR
Iva Leon (ARVR Women and Allies): Building community with social VRIva Leon (ARVR Women and Allies): Building community with social VR
Iva Leon (ARVR Women and Allies): Building community with social VR
AugmentedWorldExpo
 

More from AugmentedWorldExpo (20)

Bill Meyer (Virtual Science Center): Turning Kids on to STEM by Letting Them ...
Bill Meyer (Virtual Science Center): Turning Kids on to STEM by Letting Them ...Bill Meyer (Virtual Science Center): Turning Kids on to STEM by Letting Them ...
Bill Meyer (Virtual Science Center): Turning Kids on to STEM by Letting Them ...
 
Nick Klingensmith (Microsoft): Increasing Immersion with the MR Lighting Tools
Nick Klingensmith (Microsoft): Increasing Immersion with the MR Lighting ToolsNick Klingensmith (Microsoft): Increasing Immersion with the MR Lighting Tools
Nick Klingensmith (Microsoft): Increasing Immersion with the MR Lighting Tools
 
Rokid: Design a seamless solution for AR glasses
Rokid: Design a seamless solution for AR glassesRokid: Design a seamless solution for AR glasses
Rokid: Design a seamless solution for AR glasses
 
How AR is Transforming the Online Retail Experience
How AR is Transforming the Online Retail ExperienceHow AR is Transforming the Online Retail Experience
How AR is Transforming the Online Retail Experience
 
Chloe Doyeon Kim (MAXST): The Current and Future State of MAXST Platform
Chloe Doyeon Kim (MAXST): The Current and Future State of MAXST PlatformChloe Doyeon Kim (MAXST): The Current and Future State of MAXST Platform
Chloe Doyeon Kim (MAXST): The Current and Future State of MAXST Platform
 
AWE USA 2019: Owning Augmented Space
AWE USA 2019: Owning Augmented SpaceAWE USA 2019: Owning Augmented Space
AWE USA 2019: Owning Augmented Space
 
Victor Sun (Shadow Creator): How to turn Mixed Reality “headset” into “glasses”?
Victor Sun (Shadow Creator): How to turn Mixed Reality “headset” into “glasses”?Victor Sun (Shadow Creator): How to turn Mixed Reality “headset” into “glasses”?
Victor Sun (Shadow Creator): How to turn Mixed Reality “headset” into “glasses”?
 
Chris Pickett (DigiLens): XR is Hard: Here’s Why
Chris Pickett (DigiLens): XR is Hard: Here’s WhyChris Pickett (DigiLens): XR is Hard: Here’s Why
Chris Pickett (DigiLens): XR is Hard: Here’s Why
 
Antti Sunnari (Dispelix Ltd): Full-color, single-waveguide near-eye displays ...
Antti Sunnari (Dispelix Ltd): Full-color, single-waveguide near-eye displays ...Antti Sunnari (Dispelix Ltd): Full-color, single-waveguide near-eye displays ...
Antti Sunnari (Dispelix Ltd): Full-color, single-waveguide near-eye displays ...
 
Jian Liang (HiScene): AR for Industry in China: From Concepts to Real Applica...
Jian Liang (HiScene): AR for Industry in China: From Concepts to Real Applica...Jian Liang (HiScene): AR for Industry in China: From Concepts to Real Applica...
Jian Liang (HiScene): AR for Industry in China: From Concepts to Real Applica...
 
Augmented reality meets Television -Ellen DeGeneres' Game of Games AR App
Augmented reality meets Television -Ellen DeGeneres' Game of Games AR AppAugmented reality meets Television -Ellen DeGeneres' Game of Games AR App
Augmented reality meets Television -Ellen DeGeneres' Game of Games AR App
 
Jennifer Cook (Dreamscape Immersive): Dreamscape Immersive Presentation
Jennifer Cook (Dreamscape Immersive): Dreamscape Immersive PresentationJennifer Cook (Dreamscape Immersive): Dreamscape Immersive Presentation
Jennifer Cook (Dreamscape Immersive): Dreamscape Immersive Presentation
 
AWE USA 2019: 2 Partners sharing 1 vision for smart operators
AWE USA 2019: 2 Partners sharing 1 vision for smart operatorsAWE USA 2019: 2 Partners sharing 1 vision for smart operators
AWE USA 2019: 2 Partners sharing 1 vision for smart operators
 
Phil LaFond (Bosch Automotive Service Solutions Inc.): Bosch Technical Traini...
Phil LaFond (Bosch Automotive Service Solutions Inc.): Bosch Technical Traini...Phil LaFond (Bosch Automotive Service Solutions Inc.): Bosch Technical Traini...
Phil LaFond (Bosch Automotive Service Solutions Inc.): Bosch Technical Traini...
 
Scott Montgomerie (Scope AR): AR’s Influence on the Workforce of Tomorrow: Jo...
Scott Montgomerie (Scope AR): AR’s Influence on the Workforce of Tomorrow: Jo...Scott Montgomerie (Scope AR): AR’s Influence on the Workforce of Tomorrow: Jo...
Scott Montgomerie (Scope AR): AR’s Influence on the Workforce of Tomorrow: Jo...
 
Hugo Swart (Qualcomm, Inc.): How 5G, Distributed Processing and Technology Ad...
Hugo Swart (Qualcomm, Inc.): How 5G, Distributed Processing and Technology Ad...Hugo Swart (Qualcomm, Inc.): How 5G, Distributed Processing and Technology Ad...
Hugo Swart (Qualcomm, Inc.): How 5G, Distributed Processing and Technology Ad...
 
Valentin Heun (PTC): One Reality - A 3rd generation AR User Interface
Valentin Heun (PTC): One Reality - A 3rd generation AR User InterfaceValentin Heun (PTC): One Reality - A 3rd generation AR User Interface
Valentin Heun (PTC): One Reality - A 3rd generation AR User Interface
 
Anton Ebert (Siemens Healthcare): Challenges and approaches on integrating a ...
Anton Ebert (Siemens Healthcare): Challenges and approaches on integrating a ...Anton Ebert (Siemens Healthcare): Challenges and approaches on integrating a ...
Anton Ebert (Siemens Healthcare): Challenges and approaches on integrating a ...
 
Sarah Hill (Healium by StoryUP Studios): Healing Stories Powered by Biometrics
Sarah Hill (Healium by StoryUP Studios): Healing Stories Powered by BiometricsSarah Hill (Healium by StoryUP Studios): Healing Stories Powered by Biometrics
Sarah Hill (Healium by StoryUP Studios): Healing Stories Powered by Biometrics
 
Iva Leon (ARVR Women and Allies): Building community with social VR
Iva Leon (ARVR Women and Allies): Building community with social VRIva Leon (ARVR Women and Allies): Building community with social VR
Iva Leon (ARVR Women and Allies): Building community with social VR
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

Rosario B. Casas ( www.vramericas.com): If data will be all over the space, who will take care of protecting it

  • 1. If data will be all over the space, who will take care of protecting it Rosario B. Casas @rosariobc @vramericas Julia Costin @ITGirl_ITWorld @Americas_cyber
  • 4.
  • 6. DIGITAL OR PHYSICAL WORLD “Digital and physical worlds collide as augmented reality moves from science fiction into everyday consumer and business life, opening up new opportunities for digital marketers.”
  • 7. TALENT GAP The demand for cybersecurity professionals over the past five years grew over 3.5 faster than the demand for other IT jobs and about 12 times faster than for all other jobs. Cybersecurity is increasingly vital as more and more people are connected by the Internet, businesses are dependent on cloud- based and big data services, and governments are facing increased web-based attacks related to terrorism, espionage or other areas.
  • 9. TALENT GAP According to (ISC)² Cybersecurity Workforce Study 2018
  • 11. EARLY MOMENT • Quick prototyping and product release • Cyber experts waiting for a mature industry to define standards and policies • “they have not looked at the security/privacy issues in VR/ AR, as the technology has not matured yet and the use of technology is not widespread amongst consumers”
  • 12. DATA COLLECTION • Legitimate users may be unaware that their personal data may have been captured and, then, leaked
  • 13. PERSONAL DATA AND PREFERENCES • Location, social ties, verbal communication, product preferences, sensitive information, etc. • Physical daily environment and interactions
  • 14. NON VERBAL DATA • with VR - companies collect non-verbal behavior (user’s posture, eye-tracking, gestures, facial expressions, etc.) *** spending 20 minutes in a VR simulation leaves about 2 million unique recordings of body language
  • 15. NON VERBAL DATA What can Non-Verbal behavior tell us about a person? • Mental State • Health Information • Emotions • Learning behavior - determine future behavior • Body language - data can be used to estimate students’ test scores, determine emotions, etc.
  • 16. BIOMETRIC IDENTIFIERS • Data generated by automatic measurements of an individual’s’ biological characteristics, such as fingerprint, voiceprint, eye retinas, irises, or other unique biological patterns or characteristics that can be used to identify a specific individual.
  • 18. • Digital blackmail • Hackers access to this data could lead to digital replicas/ digital clones of you being created and used to impersonate you for malicious reasons. • Many times, VR/AR systems haven't implemented encryption for network connects • Many VR/AR systems rely on third-party apps or integrations -
  • 19. TALENT GAP ISACA Info graph State of Cybersecurity 2019 Resources and Threats.
  • 21. QUESTIONS Rosario B. Casas @rosariobc @vramericas Julia Costin @ITGirl_ITWorld @Americas_cyber