I look forward, with great anticipation, to engaging with some of the best cyber security industry innovators atCyber Week 2017 in Tel Aviv later this month (June 25-29). This year’s conference comes at a time when the industry is increasingly challenged.
Data breaches are commonplace. But it often appears that when a significant breach makes the headlines, it causes a few days of intense work and concern, and then fades from memory.
What doesn’t fade are the associated costs for consumers and companies—thousands, millions, and potentially billions of dollars (does anyone want to guess when the first $1B breach will occur)? Some costs are internal and not always visible from the outside. When a large organization experiences a data breach, a crisis response team must typically inform affected customers and handle external communications. Much time is expended communicating with internal stakeholders to mitigate the data loss and reduce the risk of further damage. The organization’s security team expends resources to identify the root cause, quarantine the affected systems, and implement a remediation plan. Longer term, reputations suffer, sales and profits diminish, people lose jobs, additional costs such as security hardware and software purchases emerge.
The external costs of the breach may be high and visible, particularly if negligence was involved. In those cases, courts determine fault and liability. Investigations into the breach often involve an analysis of the existing security controls and preventative measures. A court may not find the breached organization liable for the customer or third-party injuries, often due to the difficulty of proving the harm. When harm is measurable and proven, punishments are often substantial – especially where existing security controls were clearly inadequate.
For example, an attack against a large retailer recently resulted in an $18.5 million payout as well as commitments to hire an executive overseeing an information security program and a third-party conducting security assessments. Next year, when the General Data Protection Regulation (GDPR) takes effect in Europe, organizations may face fines that are the greater of up to 20 Million Euros or 4% of annual sales. In the case of the retailer, this could have amounted to almost $3 billion!
At Cyber Week 2017, I will engage with conference attendees, industry leaders, and government officials on global security issues. My specific keynotes include the transformative potential of blockchain, understanding the upcoming challenges in automotive cybersecurity, and a tech talk on Moore’s Law and its implications to cybersecurity.
Blockchain technology can hugely enhance the security of online transactions while preventing misuse of financial data. My blockchain discussion won’t focus on client or server architecture, but rather on blockchain’s potential to change how data, assets, and information are currently exchanged. Intel’s contributions here include Sawtooth, an innovative enterprise-grade solution for building, deploying, and running distributed ledgers. Sawtooth is part of the Hyperledger Project.
Moore’s Law has stood strong through decades of development. Also, I’ll be speaking about how Moore’s Law can help companies implement stronger data protection and improved cybersecurity. It’s all about continuing to make those amazing transistors work for us in the security space.
Data breaches are a real threat to our quality of life, safety, and security, and that threat is rapidly growing! I am challenging everyone to be proactive in securing our personal and professional data. Please join me and other top industry experts in researching and implementing robust measures to stop bad actors in their tracks and make our world secure.
For more such intel IoT resources and tools from Intel, please visit the Intel® Developer Zone
Other Popular Deals
- The 10 best job hunting apps on AndroidTop 10 Android launchers (June 2017)
- The 10 scariest horror games on AndroidAndroid app stores: 5 best alternatives to Google Play Store
- Best Android apps for rooted devices18 apps for a memorable Valentine's Day
- Top 15 Android games that you should playThe 20 best looking games for mobile phones
- 8 Android apps to tickle your funny bone17 must have apps for any Android device (plus alternatives)
- 5 apps to get the Android Lollipop look on your smartphoneTake control of your Android device with these apps
- 7 weird and strange apps for your Smartphone10 neat Google apps you may not know of
- Perfect Viewer10 essential Indian apps for Android devices