IoT - Need for Privacy and Encryption
Susan Landau, in a recent event titled Listening In: Cybersecurity in an Insecure Age at New America, called attention to the need for discussion on “Security vs. Security” instead of “Security vs. Privacy”, as has been the norm while talking about the Internet of Things (IoT). In her book with the same title, she uses her legislative knowledge and historical perception together with her descriptions of cyber attack to emphasize the need to protect data.
Landau stresses the need to understand the detailed working of contemporary communications technologies to match up against the techniques nation-state attackers, organized criminals and other bad actors use to defeat security. She insists that encryption is the preferred method, instead of building front/back doors into security that others will eventually gain access to. Advocating the widespread use of the 2-factor authentication, she considers it, along with automatic security updates and ephemeral communication, as essential steps to safeguard data.
The author suggests limiting the shelf-life if the device is not updated regularly. Landau, who doubts the efficiency of blockchain technology with 2-factor authentication in alleviating security challenges, explains that despite the advantages of anonymous devices, they might not be particularly useful with security devices, making the trend unlikely to become popular among IoT devices. Laws regarding safety need to be framed generally, she reiterates, for if a system cannot be updated for security protection, it has a limited shelf-life. Landau ends her talk by reiterating the need for privacy and encryption.
Big Data: Blessing or a Boon?
By Nancy S. Wolk, CIO, Alcoa - Global Business Services
By John Kamin, EVP and CIO, Old National Bancorp
By Gregg T. Martin, VP & CIO, Arnot Health
By Elliot Garbus, VP-IoT Solutions Group & GM-Automotive...
By Bryson Koehler, EVP & CIO, The Weather Company, an IBM...
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Lowell Gilvin, Chief Process Officer, Jabil
By Dennis Hodges, CIO, Inteva Products
By Gerri Martin-Flickinger, CIO, Adobe Systems
By Walter Carvalho, VP& Corporate CIO, Carnival Corporation
By Mary Alice Annecharico, SVP & CIO, Henry Ford Health System
By Bernd Schlotter, President of Services, Unify
By Bob Fecteau, CIO, SAIC
By Kushagra Vaid, GM, Server Engineering, Microsoft
By Steve Beason, Enterprise CTO, Scientific Games
By Steve Bein, VP-GIS, Michael Baker International
By Jason Alan Snyder, CTO, Momentum Worldwide
By Jim Whitehurst, CEO, Red Hat
By Alberto Ruocco, CIO, American Electric Power