Player is loading...

Embed

Embed code

Transcriptions

Note: this content has been automatically generated.
00:00:01
good afternoon ladies and gentlemen please join me in welcoming yet today
00:00:06
an dying dewey this yeah you'll have the i am
00:00:20
professor at u. t. f. l.
00:00:26
yeah the
00:00:34
and the masses are i would change and innovation seemed content development of places the active effort
00:00:44
okay
00:00:47
actually the cyber security at it's all about uh what we have seen today
00:00:52
and it's nice to be a twenty vacation but as well or activity
00:00:56
yeah i would like to thank you for the for you to to me today as as you understood
00:01:00
oh train was willing to come today as well as their segments or from from my grand we have the chance
00:01:05
to have two replacement i on on the last minute so that's about cyber security actions thank you very much
00:01:11
and as we as we said and that there is definitely some
00:01:14
some threats and spots is a part of that as well
00:01:18
and today what would like to discuss with all of you is that to
00:01:21
get a heinous uh regarding yeah your your and profession and and your
00:01:25
and know how in your difference organisation to understand how we could
00:01:30
take aspect is is and improve our security and our environment
00:01:34
to make passports organisation as as safe as possible within at this this new challenges
00:01:40
and to start with i would like to give the and the the talk to an actual caribou
00:01:44
we'll explain at you as well the founder of the c. forty t. that centre for the top transcended their phone
00:01:49
uh if you can give us some and and obviously some backgrounds about it and what is
00:01:53
uh what it half as an academic institution is doing for this unstable
00:01:58
okay thanks a lot and uh thanks for a biting me to participate in this a bundle
00:02:04
um it is true that uh trust as a general concept is something that is uh
00:02:11
the war of human activities interest is needed for
00:02:16
business but also for sports for um establishing your appropriate
00:02:21
to rules of interaction between a human beings
00:02:25
and a and people have established a techniques uh across
00:02:29
the centuries to choose to fortify a trust
00:02:33
now what happens is that with the development of digital musician
00:02:38
much of of the human activity is movie to or something that is into ploughed
00:02:44
it is the mediated by the internet and but are you sick try devices
00:02:49
and the tools of that were developed for to develop trust such
00:02:52
as up the language the legislation the institutions et cetera
00:02:57
do not matter cannot cannot be actually mapped to the digital world for a number
00:03:02
of reasons uh that uh are what uh i think it to it even
00:03:06
as a consequence we are witnessing nowadays uh uh
00:03:10
level of distrust the digital world that is white or or menu
00:03:15
and or sport activities or not immune to this evolution
00:03:19
it was a consequence we uh it's what you prefer that we we we have decided to set up centre
00:03:25
for the shock crossed reinforce draw some to develop the tools the technical tools notably to
00:03:31
reinforce a trust round to notions of a good program fee of block changes
00:03:36
a privacy protection and those who on no more specifically
00:03:41
in the case of the sport activities one of
00:03:44
the challenges that is uh uh that would have to
00:03:47
be faced with the fact that um the
00:03:52
there's going to be more and more accurate measurements of the rich human body of the human activity
00:03:57
uh by by lifestyle the tractors and the school through the progress of
00:04:03
personalise medici we should is it going to be much more
00:04:06
actuate a characterisation of for each of us from which that's a body point of view
00:04:13
in the future and this data ah have tremendous value because that a lot
00:04:18
about the level of health in which we are but equals goes review that
00:04:23
uh at a point in time the level of stress the mindset and uh and so on and so
00:04:29
the more uh there's going to be a precision a digit position of of of the sport
00:04:34
the more the challenge of protecting these data and making you use
00:04:38
of these data inappropriate context is going to become relevant
00:04:43
i think your shop yeah and i would have to do that to talk to uh to to match well one from from a criticism from the banking
00:04:49
and lyman which is known and and then the recognition of being safe and
00:04:53
huh how do you uh kind of move forward as well knowing that
00:04:57
the the hundred presents the safety is not an option you have to to cope with risk as well so how do you create because you
00:05:03
about this innovation group uh within your your team so how do you work uh on on that that that's thank you yes so warm
00:05:11
i think there's a sense of what you know about this but ah so many seasons i think for
00:05:15
us to some thirty things that i'd like to share with you in the first is home
00:05:21
the uh the fastest in the sense that didn't know technologies can convey find definitions have some companies that just
00:05:27
maybe suisse in some sense say above on the tougher technology you know you know industries um and so
00:05:35
not necessarily a barometer for everything that has been in
00:05:38
manhattan vomit before um what's effective by society
00:05:43
and so what we're doing it does with his own
00:05:47
we i have started to move um what a lot of
00:05:51
our infrastructure enough have specific about how to manage the
00:05:55
marker for for where we are in terms of a site intently how willing to expansion concerted digits huge
00:06:05
uh_huh
00:06:08
yeah
00:06:10
and what we're not and we're not able to see what we're not willing to sit except things so warm
00:06:16
maybe yeah when you are frustrated has little bit biotechnology offices
00:06:22
who your home is if you're using your organisation saying
00:06:25
there are many opportunities in the clout than any pitching t.'s on to the to this new technology landscape
00:06:31
but um maybe we should not go there yet because the security landscape there is it'll be less
00:06:36
clear that made you can say just you technology of says that even criticism everybody right
00:06:42
and and that's the that's the first um aspect bitter like attach one and the second act aspect about like to touch upon is the
00:06:49
notion of foam of on
00:06:53
is the notion of oh how could he says they're inhibition of phone compliance how we own
00:06:58
citing the code have allows that are in the financial services industry and with both my stations
00:07:03
but financial services banking and and sport yeah aspiration or continuum industries
00:07:09
people want to um either because something which refuge in the financial services so they want to build
00:07:13
something to with this aside and with some with support five and on and share something together
00:07:19
and so because of aspiration make sure both of those industries of there is perhaps they
00:07:24
i shed security for uh if people want to talk to society people
00:07:27
want to talk it only on the other side offencive itself then
00:07:33
making it in a service pack is the financial industry interested usually oh making a a
00:07:38
a similar attack is the sporting organisation of a sporting event how cheap similar goals
00:07:44
it is not just that it is not just the the large external factor
00:07:47
which home perhaps could issues can share with disposable pronunciations it is how
00:07:53
we all knew monitor the fact for who the internal flights how many
00:07:58
home do the right thing as an organisation with with our farm house ha
00:08:03
oh but but from an for using also to to society at large
00:08:08
and it is that which which comes to come to the department resigned indirectly comprise comment which helps reinforce some of those on
00:08:15
security norms of an organisation most of whom dependent annotation which makes home i
00:08:21
think the security landscape a little bit less less hostile and so on
00:08:26
and that that would be the second aspect first the extent of fat the technology threat
00:08:31
because of the internal compliance and i think who sense of sense of an organisation
00:08:37
i think it's an it's an and you will uh had to say of of the yeah one of the
00:08:43
largest um as possible station uh you tell me that you have been hacked into doesn't and sixteen
00:08:49
yeah and you don't have the mean data bank could have to
00:08:52
protect your data and and so how do you had
00:08:56
cope with those new and set up a new risk and that are obviously part of fill your daily activities
00:09:03
uh well um as you said it's well not bank i wish you well bank but uh yeah the um
00:09:12
i think there's a paradigm shift in this part in the spring i
00:09:15
think uh all of you have filed men's because they talking about
00:09:20
a date on this is something we have discussed actually as part of the technical gore uh l.
00:09:25
a. l. today with the other one tarnished federations and now people in spot acknowledge that
00:09:32
uh no data is cooled and uh content is king this is something here
00:09:38
and we need to you i would say even though we all know the bank we need
00:09:41
to acknowledge value that we had the painful expenses you mentioned uh of the hack
00:09:48
and um then people started realising which he wasn't the culture before that actually the
00:09:55
but they tell a wee ho was very important and could calls uh as a
00:10:00
lot of of how so what are we doing as as popping a organisation
00:10:06
to um to protect that will self i think it's
00:10:10
it's starting with education and starting understanding what is
00:10:13
the value of the data and and now i think it's easier for people to understand that
00:10:19
data can be used for uh no it's important for mass engagement
00:10:24
they dated is important for isn't presentation data is important for
00:10:30
anti dumping and and find as well um so data is
00:10:35
mall then default mulder and possibly fifty years ago or twenty years
00:10:39
ago or even ten years ago very important for sports organisations
00:10:44
we don't have the culture or um the money to have an entire department to um
00:10:52
not to protect to to build systems and so on and protect that was off and i think the the the
00:10:58
first that we we took in um when the s. it oration is to understand what well dealing with no
00:11:04
to be able to contain risk in each understand what your billing it i think
00:11:11
it i think the situation false positives is quite difficult because not only you have to deal we've
00:11:17
what we call side often and and when i was walking and not advertising or
00:11:22
no we had the pleasure to do with um a crypt a virus for
00:11:26
example and everyone is facing that type of problems including sports federation
00:11:31
but on top of that we need to deal with what we called a activist all group of interest
00:11:37
um but we also have to the we've which is fairly new uh we've well i could cite doctor
00:11:44
um what we experience for example at the winter olympics where people who
00:11:49
hit the um no some of the systems um they have no
00:11:55
they will not asking for money and we didn't even know who they
00:11:59
were and we also investigating that um so it's changing again
00:12:04
um no the way we need to think outside of subtracted so wait we
00:12:09
need to understand that what all the risk in some of who can
00:12:15
we would like to distract what what we are doing and we need to understand that then you
00:12:21
the signals that you need to understand is you need to assess
00:12:25
what do you need to protect while your most valuable assets
00:12:29
what all the hormones you would get if you get that
00:12:33
type of page of something else because you can all
00:12:37
cover everything so you have to focus first menu all limited when you have limited
00:12:41
funds need to understand what you need to uh go one protect us
00:12:46
so the need to identify assets and the second thing you need to do is you need to focus on
00:12:53
i'm not vulnerabilities because it can be quite wide but well
00:12:58
the most likely facts and we discussed the corpse of
00:13:01
of people who can uh could attack a spot for
00:13:04
action so understanding fights going for the most likely
00:13:09
uh occurrence of a a side door which is is what we need to focus on
00:13:14
and the last part i can mention in term of what would be the
00:13:17
simple step in term of how you outside of socrates think of us
00:13:23
security by design make the right decision to stop we've well then spending going a lot of money
00:13:31
to um no uh to me to get some advice you have created by building a about system
00:13:38
and um no i can give you a very simple examples well i'm not too technical
00:13:45
uh no as we need to be smart and we know and we
00:13:49
need to on price uh for example uh software as a service
00:13:54
uh as a um a something which is all felt was in in our centigrade
00:14:00
and in our case for example wanted to benefit one um software as a service but we
00:14:06
find out the actually the number of people who needed to access that software is limited so we
00:14:11
decided not to expose that typically and protect that who um um
00:14:17
if it can uh uh for the p. and so we
00:14:21
that way we made i will sell more secure all well still benefiting
00:14:27
that that infrastructure and there's a lot of um i would say
00:14:31
simple technique technical decisions you can lie to avoid finding yourself enough
00:14:37
i would position so if you don't want to spend
00:14:39
a lot of money at patch insistence you need to make those decisions uh stuff then
00:14:46
thank you and secured by design actually that's uh you activity day job and i meg
00:14:51
actors to being then either insert some and then one of the leading us
00:14:54
and how a group such as as yours is
00:14:57
getting with those new setup menu security announce
00:15:01
a either from the neophyte acknowledge side what what is your view on that one
00:15:06
so uh never asking is a is a very old company we
00:15:09
we we started off in the the old analogue uh era
00:15:14
uh we became twenty five years ago uh uh entered
00:15:19
into the devaluation became our content security a provider
00:15:25
to not become also when parallel cyber security a provider
00:15:30
uh i heard content is king so obviously um this is one on this to the here
00:15:36
and now we're um data is king as well um can you hear that evan or
00:15:42
uh content generating entity such as illegal or sports
00:15:46
organisation also has issues relating to data
00:15:50
uh we can also we mine uh about the fancy bears thinking
00:15:55
that uh from the uh well the anti dumping organisation
00:16:00
uh association so everything's very mixing we try to put our
00:16:04
skills as his that we have developed over the years
00:16:08
at the service of both the consent orders at the broadcasters as well or for
00:16:12
the major security hands of the banking industry's state organisations for december situation
00:16:21
um now um there's no one seemed about that uh you know
00:16:27
attack vectors are complex uh we speak of multi jurisdictional attackers
00:16:32
and obviously technology is a is a plastic both the content space where
00:16:37
so we'll watch a marking solution you could identify streams been used by the parents
00:16:42
to broadcast a parrot services enhance once you identify them shut them down
00:16:48
uh all the kind of more aggressive customers i available you can also
00:16:52
include consents encrypted signals uh to to better protect them from attackers
00:16:59
but sometimes and even more with the latest apart techniques that this to suffice in itself
00:17:07
hence the legal aspects little being aspects to try to improve to try to complete
00:17:14
the evil of protection that uh we could offer to uh to objects
00:17:19
uh typically sits on a country where we think uh we are the best in class too many demands
00:17:26
uh i think as an example for copyright protection is still a in
00:17:31
the class that that's the classic probably sitting at the last row
00:17:35
the classroom so that's where uh that he can or can try to
00:17:39
improve the situation to the benefit of the white holders for example
00:17:44
thank you bye scale and i would like to open the the the
00:17:47
question and to the public if you have a any and
00:17:53
ooh
00:17:57
i do have uh some some question actually and one thing that was kind of a obvious from from
00:18:03
what i understood and there is obviously the the technology side uh which is definitely a key elements
00:18:09
yeah but they seven the human side and and from what we we have seen we cannot do with uh one without the other
00:18:14
and so how do you cope with this part which is so
00:18:18
important twin beds and a safety factor in our habits
00:18:22
within your organisation within the way we we deal with security to make sure that the
00:18:27
human elements is a key part of of succeeding in this new cyber war
00:18:32
and maybe i dunno basket and jump yes you would like to start with the trust factor that you would be to put in place
00:18:37
he is probably an elements uh show very clearly uh there will be
00:18:44
there is are needed to improve on it to increase the level of uh
00:18:49
perception and understanding of what is going on in the digital world
00:18:54
at the population level at large and notably at the love for people to make use of a sport tractors
00:19:01
we see a continuum right between the people who are maybe teenagers
00:19:06
and get equipped with a a wearable devices to measure
00:19:10
their performance in there with their friends and things of that kind that will these data a little bit louder
00:19:17
then two people we're decide to boot will so precise may be seen as we get to
00:19:22
the d. n. a. sequence with these additional very intimate detail out that or actually elected
00:19:29
and then the uh uh uh uh another initiative that it
00:19:32
should be mentioned as well in this framework is what
00:19:35
some uh health insurance companies do nowadays which
00:19:40
and they'd say look if you accept
00:19:42
we're these brass let's uh everyday and prove that you walk your ten thousand
00:19:48
uh you know steps daily then you get to
00:19:51
fifty percent discount on your printed right
00:19:55
so again it's it's it's it's the same kind of a phenomenon
00:20:00
of intimate data being collected it being delivered as such
00:20:05
to whoever is willing to make use of these data what people don't relies very few people know what actually
00:20:11
that though waste a shoe me this is a good idea right which is unclear because it's a way
00:20:17
it's it's a flight on the the solidarity uh uh the little
00:20:21
population but issue me a you want to do that
00:20:25
dot techniques that very well known it could order of yeah that that that are not very complicated
00:20:30
that a lot that makes make it possible to prove
00:20:34
or this level of activity without having to reveal
00:20:38
where this activity to place right it's too with a few modifications
00:20:44
it would be possible to to achieve that it will void exposing everyone's life
00:20:49
because as soon as you expose all the places where you go
00:20:53
essentially your life becomes an open book to those all the people with the perjury to to to read these data
00:21:00
so the ways to prevent this in just to prove that activity uh to
00:21:04
place a that way to protect the data but the problem is
00:21:08
what is going to be the incentive to make this happen right it's incentive to be idle through legislation
00:21:15
right for example the net at the in the connection with the u.
00:21:19
g. d. p. also you know this huge registration that is actually
00:21:23
entering it uh you know parisian in uh actually next week unit throughout the the you
00:21:28
and that will have the deep infants was all the swiss legislation right but those worldwide that is a big big change
00:21:34
so that's one solution it joe solution is it through to the market in such a way that
00:21:40
uh there is enough sensitivity a mock the customers relies that one solution
00:21:47
provides better protection that others she's and we see already somehow
00:21:51
being years of of this kind of revolution in
00:21:54
the behaviour of the i. t. giants z. with how
00:21:58
much effort companies such as the apple or microsoft
00:22:03
uh try to differentiate themselves from this if it's book and it is you don't know we'll we'll do
00:22:10
a a care about your data and we will take all the precautions i will even if needed
00:22:15
uh go to fought against the us government's writings of that kind
00:22:19
so we see we see this evolution of all of the perception of the market
00:22:24
there is kind of a dichotomy between the the guy file which we obviously and sometimes blame for the power and
00:22:30
and the supremacy yeah on on on on the other hand uh the way that we're using and cutting
00:22:35
now a cloud a base platform and through amazon web services
00:22:40
yeah so so there is like this this than and they will and and uh and ensure that we have to to cope with
00:22:45
yeah and and how many to to you had you you you will
00:22:49
make sure that your organisation uh is accepting those new setup
00:22:54
understanding that it's it's a control change and we have to cope with with last corporation from outside of a corporation
00:23:00
about taking care of a security how how did you cope with that how do you
00:23:03
make sure that's his mindset then in the banking industry that is accepting that
00:23:07
so taking example of them beating to the clout as the case might some
00:23:12
not respected possibilities and i get it for eight hours like this isn't
00:23:16
um we have some data in um some of services to pout kind of
00:23:20
think about as well because i have some of the applications in it
00:23:24
that you um
00:23:27
to make sure the dome however even when moving database organisations in today's providers
00:23:34
we make sure that we still may have complete control of it i think even the
00:23:38
keys the encryption keys the data and with the data is encrypted on those services
00:23:43
database think it it was so warm in in in storage to on on on the service and it says that on the keys
00:23:50
if we decided we no longer trusted that platform we disable the keys and well it's it's that
00:23:56
well that would be one of the examples of the unit we have a second example
00:24:01
would be that that platform is not accessible to and from the internet there
00:24:06
is a physical cable connecting credit suisse difficult environment so that yes it is managed
00:24:11
by an external party bit the on the actual data flow is very control
00:24:18
once back over giuseppe regarding the yeah i g. d. p. r. which is anything in nine to false next week
00:24:22
how innovation that as a i have is coping with that what does it mean for you
00:24:28
as a spot of innovation and and how do you kind of change and and and that uh your nation
00:24:33
for that um well i think uh if someone has room as a restricted to uh make that uh
00:24:39
to be compliant in within like a
00:24:44
if we take it to the next a championship of the uh it's i i think it's uh um no we
00:24:51
i i you you were talking about the human element and before i think
00:24:56
people still find to understand um how did you guys impacting what they are doing
00:25:02
and they are all some people still misunderstanding how accountable they all
00:25:08
and pushing the responsibility on their out then does is is is not a
00:25:12
solution because a lot of what needs to change is process related
00:25:19
um so again after i think the um you cannot g. t. are you need
00:25:26
to to the g. d. f. l. inclined we've different sets of data or
00:25:30
and we are far ties in what we need to do for
00:25:33
example of just the everything which is related to medical
00:25:37
data is a party to for us and we need to make sure that we do the right thing it doesn't
00:25:44
no we haven't started with g. g. r. uh so with it it it was
00:25:48
a consent fall but would say that g. d. p. r. use um possibly
00:25:55
giving you the the structure of on the type of things you need to do and uh so that's
00:26:00
uh that's something uh we are building at the i did that fees is looking at parties
00:26:06
the other things we are looking in a in relation with g. d. p. r. e. c.
00:26:11
engagement we've we fans no we we have been collecting for example
00:26:15
simple things as collecting interest fall tickets uh seems the germans on
00:26:21
well no well this is the way you know the the consent form people people
00:26:27
need to acknowledge that we are a store information about that and um and
00:26:34
so they also well not all things we need to do to be compliant of g. d. p. r.
00:26:39
uh and the um it's starting with a very simple things like changing
00:26:44
terms and conditions uh but also in showing that we have
00:26:48
very sexual system that we have a also way of
00:26:53
mark spring break she's one way we have um one of the things we have done is to
00:26:59
i'm a set that what we called a security manage services so basically
00:27:04
uh we have a team of uh no we have a network of
00:27:07
writing centre which is uh well subcontracting to vendor who is
00:27:12
looking at our assets on a twenty four hours a it's seven bases with a
00:27:18
very strict yesterday so that that's the type of things we have been
00:27:21
uh and shading to make sure that we know we are doing the right things from the security on it you know i think we need to do that
00:27:28
as that was mentioned before we need to protect ourself against purple thing no against
00:27:33
a side after hours than all the codes and we should think that this is something we do for
00:27:39
our self rather than just say oh i need to be compliant with something you know that's painful
00:27:46
asking uh any question from from the public to get in
00:27:55
and one one question to you a pascal regarding the the fact that you you mentioned
00:28:01
before and there is the technical elements that needs to be i organise and
00:28:05
set up in a way that is a protection protective uh you know for for
00:28:09
the system that you can element which is coming from enforcing some some roles
00:28:14
yeah how do you uh now i that's why this human false uh in this equation
00:28:18
and how do you cope with that when you you kind of move forward with an annotation to setup was a security missions
00:28:26
um so first professor we bore a set the buzzword g. p. r.
00:28:32
any these uh it does have an effect on the on the human factor we didn't uh decision makers within companies
00:28:39
because now it's not like they want to do something they have to do something
00:28:44
it's it's a phenomenon we we have served in the us uh they had some similar
00:28:48
regulation than these network information security directive that also forced large organisations to take measures
00:28:55
failing which they were we seen big fines um so obviously um you don't
00:29:01
need to uh some supplies uh organisations they have to do something
00:29:07
uh we forgot to human factor however uh obviously need
00:29:11
to prepare a staff for cyber security um incidence
00:29:17
so you have all these preventive measures um prepare
00:29:21
them to react building success for reactive measures
00:29:26
in the in the preventive work uh i would obviously make shore everyone is made of where
00:29:33
uh of what a cyber attack can be already know cyber
00:29:38
awareness and not click on the link uh nor have
00:29:42
tried this tactic necessary measures to avoid a winning if we
00:29:47
i phone clicking and we only cost or two
00:29:51
so v. c. to the work for for with yeah or for for c. so to actually
00:29:56
prepare is troops for for cyber security in for the uh gives the cyber attacks
00:30:02
uh if we take a uh we hear everyday about cyber attacks there's so many the news that it's not even a piece of news
00:30:08
now and uh and we can even realise that when it when you're a victim i mean we have to face became friends of
00:30:16
i don't really see this it doesn't have to be a user was a tutor count all of these have been hacked
00:30:22
over the last figures who cares i think to change your password uh
00:30:27
did you actually take measures as easy as this right yeah so i think there is a lot of work in terms of um
00:30:34
in terms of you know public awareness to be done eventually
00:30:38
they uh even station and without a strict regulations
00:30:43
those people or entities are providing the service did not take the measures
00:30:48
i think you cannot expect users to take them dance themselves
00:30:52
thank you very much and looking at the time i think we will conclude
00:30:56
by uh maybe two measures that will uh you will suggest to do
00:31:01
and from your experience and to to the audience what will be the the top yeah the first
00:31:05
measure you will take other thousand to measure will take to improve and that the cyber security within an organisation
00:31:12
with the normalisation religious bought you mean uh within a yeah yeah well i would i would assume so
00:31:17
so i would say um either it is an organisation that has to manage the data
00:31:22
as my my neighbours here at the end of i would say by enlarge it's
00:31:28
for those interested in the as other companies that have to
00:31:31
protect dieter attended the the measures you've mentioned are
00:31:34
it's a quite standard reasonable measures to be to be uh taken so more specific question is uh
00:31:42
when it is data that are we did it was sport activity that or
00:31:47
oh that's it collected through wearable devices but there's just a you know a highly
00:31:53
specific to this field the l. d.'s to the collection of pretty uh
00:31:57
uh intimidated because the ability of these wearable devices to
00:32:02
provide a actuate measurements is going to improve
00:32:06
right and the hawkers capability in the meantime are not going to diminish its will clearly right so so
00:32:13
clearly the the issue is going to become no one more relevant so my feeling is that
00:32:20
what needs to happen is that it's not just an hackers
00:32:25
is also still devices and so the device manufacturers
00:32:29
have to resist the temptation of being both device sellers
00:32:34
and the data collectors for the purpose of
00:32:37
what the ties the data but there is a mixing of the two which is uh
00:32:42
i think it highly unhealthy it's all there should be pressure
00:32:47
from the legislature and from the market to see we'd we don't want this to happen
00:32:52
either you you company or someone who was a vendor of harbour and then
00:32:59
you've read your your business model is based on selling this hardware and the really the software
00:33:04
or just someone what the ties is the the data but if you do both this would
00:33:09
confusion of role that is very very confusing for the uh for the for the news
00:33:14
i think yeah and maybe one one in it as well to conclude case if we're talking about
00:33:19
the uh no one thing we need to do i would say go for the up
00:33:24
um sometimes not that complicated when i looked at how the uh organisation was hacked
00:33:29
a uh a year ago now um no it could have been avoided we've
00:33:35
possibly not too complicated measure and and usually it's coming i definitely user off all i thought
00:33:41
it was a problem with endpoint security so that's usually a very easy entry point
00:33:47
so make the the right decisions uh around those aspects and
00:33:51
and make sure that you you you do that consistently
00:33:56
thank you and and some us through a satan one like things to be the separation of duties and separation of concerns
00:34:04
so from a and forcing them as opposing instigating a principle when you're accessing data
00:34:09
so for example i could is with the i. t. department would never access commentator actual nevada
00:34:16
on the on the on the people that would be wanting to use that data
00:34:19
there with no problem it would never be keep thinking the code negativity out with instead
00:34:24
of the be touching after two and a you can stay on quite a good
00:34:29
a discussion and argument between the departments to the business owners for example people wanting to use the
00:34:34
data may say you'll be really convenient if you let me download everything in keeping track so
00:34:39
right on the i keep are the id side because i know it's not allowed that that you
00:34:42
can certainly shouldn't be doing that you should be using the two nights with looking for you
00:34:46
the decision concerns and needs no really hope it was a lot of good home made work
00:34:52
i think the mass scale and uh we don't wanna support
00:34:55
contents or prospective uh two points i would recommend first
00:35:00
it sure that's us the content or or sports broadcaster to secure
00:35:05
the content from the source c. of the definition device
00:35:09
so there's an entire channel that you need to stick your using
00:35:13
various technologies so that would be important uh the second
00:35:18
the second tape uh would be that you was the contents owner was a broadcaster and show you can offer
00:35:25
a a user experience to your viewers that makes them want to subscribe
00:35:31
to your services and watch the content you generate rather than
00:35:36
per chairs uh parts are you sure now watch it if they get any
00:35:40
uh to some some parrots service i think bestseller as you understood
00:35:46
it a complex yeah solution there is not a single well to answer the all the the the complexity of it it will be part
00:35:52
half a collaborative uh approach and i think what we think you'll
00:35:55
be grounds for the panelists uh for being today and where

Share this talk: 


Conference program

Welcome Words by David Eades
David Eades
15 May 2018 · 9:06 a.m.
Welcome Words by Philippe Leuba
Phillipe Leuba, Chef du Département de l'Economie et du Sport
15 May 2018 · 9:08 a.m.
Welcome Words by Grégoire Junod
Grégoire Junod
15 May 2018 · 9:13 a.m.
Welcome Words by Benoit Mariani
Benoit Mariani
15 May 2018 · 9:15 a.m.
Hacking the Future
Andy Walshe
15 May 2018 · 9:25 a.m.
Talkback Session: Smart Venues, Moderated by David Eades
Daniel Marion, John Rhodes, Claire Lewis
15 May 2018 · 10:18 a.m.
Talkback Session: Wearables and Data, Moderated by David Eades
Terho Lahtinen, Jean-Christophe Longchampt, Christophe Ramstein, Patrick Schoettker
15 May 2018 · 11:04 a.m.
Talkback Session: Fans and Data, Moderated by Rebecca Hopkins
Horesh Ben Shitrit, Pete Burns, David Lampitt, Clemens Schnellert
15 May 2018 · 11:46 a.m.
Interviews, Moderated by David Eades
Stéphane Guerry, Joey Tan, Olivier Glauser, Albert Mundet
15 May 2018 · 1:45 p.m.
Talkback Session: Machine Learning and AI, Moderated by Jay Stuart
Nicolas Chapart, Nicolas Déal, Johan Vounckx, Mehrsan Javan
15 May 2018 · 2:37 p.m.
Speech
Jochen Färber
15 May 2018 · 3:14 p.m.
Talkback Session: NextGen Video & Engagement, Moderated by Nicolas Henchoz
Christoph Heimes, Spencer Nolan, Pedro Presa, Alexandra Willis
15 May 2018 · 3:30 p.m.
Interview on Security
Earl Crane
15 May 2018 · 4:08 p.m.
Talkback Session: Cyber security and Digital Security, Moderated by Sébastien Kulling
Dang Duy, Thomas Shorrock, Jean-Pierre Hubaux, Simon Trudelle
15 May 2018 · 4:19 p.m.
Introduction of Day 2
David Eades
16 May 2018 · 9:35 a.m.
Social Business and Sport
Muhammad Yunus
16 May 2018 · 9:38 a.m.
Talkback Session: Designer Bodies - Yes or No? Moderated by David Eades
Roland Sigrist, Vincent Gremeaux, Carlos Canto Alvarez, Véronique Lugrin
16 May 2018 · 10:27 a.m.
Talkback Session: Designing for the Future, Moderated by Jay Stuart
Ali Russell, Emilio Risques, Véronique Michaud, Thilo Alex Brunner
16 May 2018 · 11:08 a.m.
Talkback Session: Protection through Innovation, Moderated by Mike Miller
Liam Mc Tiernan, Laurent Mekies, Eric Nauman, Martial Saugy, Mathieu Saubade
16 May 2018 · 12:04 p.m.
From Racing to the Road
Laurent Mekies
16 May 2018 · 1:32 p.m.
Talkback Session: Understanding the eSports Ecosystem, Moderated by Jay Stuart
Brent Barry, Anna Baumann, Julien Delalande, Michael Journot, Carlos "ocelote" Rodriguez Santiago
16 May 2018 · 2:05 p.m.
Talkback Session: What's next in eSports? Moderated by Lars Stegelmann
Brett Abarbanel, Stefan Kuerten, Jan Pommer, Federico Winer
16 May 2018 · 3:05 p.m.
Closing Words
David Eades
16 May 2018 · 4:06 p.m.

Recommended talks

Welcome and introduction
H. Bourlard, Idiap Research Institute
3 Sept. 2012 · 9:02 a.m.
Glatt, from suburb to city - Conclusion
Raphael Frei - Paul Knill
20 Sept. 2013 · 3:55 p.m.