Cybersecurity with Ed Adams - Mathieu Gorge

Cybersecurity with Ed Adams

Vigitrust

Ed Adams is the President & CEO of Security Innovation.  Ed has presented to tens of thousands of security professionals at reputable industry events such as RSA Conference (US and Asia), Ponemon Institute’s RIM Renaissance, Connected Security Expo,  Mozilla’s Privacy Lab.  Ed is a Ponemon Institute Research Fellow, Privacy by Design Ambassador by the Information & Privacy Commissioner of Canada, and Forbes Technology Council Member.  He sits on the board of The International Consortium of Minority Cyber Professionals (ICMCP) and is a BoSTEM Advisory Committee member.

What are your thoughts on the current global cybersecurity threats?

For many people (i.e., non-IT professionals or those with limited IT knowledge), the word ‘cybersecurity’ is associated with websites and hackers. However, this is an overly- simplistic view because, in reality, cybersecurity risks are now much more prevalent with IOT (Internet of Things) devices, including, for example, Connected Cars.

According IOT Analytics’ ‘State of the IOT and short term outlook 2018’ report,  there are now over 7 billion IoT devices across the globe and a total of 17 billion connected devices – a number that is predicted to grow at an even faster pace into the future – which will invariably result in increased cybersecurity risk for businesses and individuals alike.

Total number of active device connections worldwide

There are several reasons why IOT devices are particularly vulnerable to cybersecurity threats:

1. Because the software is often not designed with security in mind, they automatically become an obvious and easy target for hackers looking to access confidential data quickly, without having to break through networks and secure firewalls.

2. Since the IOT is a relatively new technology that’s less than 10 years old, there is still a certain immaturity in the software development of these devices; in other words,  software engineers are either not fully aware of the security risk element, or they simply don’t have the skills or knowledge to write the software securely.

3. All too often functionality and convenience trump security: security is often seen as a hindrance or an ‘optional extra’ – as opposed to a fundamental feature that enhances the user’s experience of whatever device they happen to be using.

4. While more mature industries, such as online banking and e-commerce, for example, have been influenced by government and industry regulation, IOT is still an emerging technology which has, to date, outpaced regulation and regulatory authorities.

In the case of connected cars, for example, Taylor Armerding’s Forbes article on the issue of connected cars and security,  shows the staggering extent of computer control in today’s cars:

a Dreamliner jet has about 6.5 million lines of code, while a Ford pickup has about 130 millionThat truck also has about 100 different chips, more than two miles of cable and ten operating systems”.

Finally, according to the Ponemon Research Institute, 63% of manufacturers test less than half of the technologies in your car for vulnerabilities, only 33% train developers on secure coding methods, and only 10% have a dedicated cybersecurity team.

There is a shortage of cybersecurity professionals globally, how is the industry responding?

The cybersecurity industry needs to address the skills shortage as a matter of urgency:  there will be 3.5 million unfilled cybersecurity jobs globally by 2021.

Some organisations have already begun to respond to this situation by training existing developers and staff to transition to cybersecurity.

Also, Artificial intelligence (AI) offers a lot of potential in terms of assisting with this skills shortage; for example, it can provide automatic responses to cybersecurity issues.

Want to See What the Next Ten Years of Cybersecurity Looks Like?

Learn the 5 Pillars of Security Framework™

Pick up your copy of The Cyber Elephant in the Boardroom
The Cyber Elephant in the Boardroom
Mathieu Gorge
Privacy Overview

This page describes our policies for the collection, use, and disclosure of website users’ personal information.

What information do we collect?

User-submitted information

We collect personal information from you when you fill out a form on this website, which may include a newsletter sign-up, assessment or contact form. This information includes your name, email address and may also include other personal details such as your phone number, mailing address, age or profession.

This information is used to email you survey results if you’ve taken a quiz on the website, to respond to any direct queries you may have sent us, as well as to send you personalized periodic emails, including newsletters, regular product and services updates, marketing and promotional information, or other correspondence. To stop receiving these communications at any time, simply click the “unsubscribe” option included at the bottom of each email.

Cookies

This website uses “cookies,” which are small files saved on your computer that store preferences and other information via your browser (i.e. Google Chrome, Firefox, Internet Explorer) that's then used on web pages you visit. These cookies uniquely identify a web browser on a specific computer, but aren’t used to identify an individual person. If you use multiple browsers or computers, each one has a different cookie.

We share information about your use of our website with our trusted social media, advertising and analytics partners, such as Google and Facebook. These third parties may use cookies, web beacons, and other similar technologies to collect or receive information from this website and elsewhere on the internet to provide measurement services and target ads. By using first-party cookies in conjunction with third-party cookies, we are able to analyze our website traffic and provide relevant customized content and advertising to website visitors.

Google Analytics Advertising 

We utilize a variety of Google Analytics Advertising features, which may include at any given time:

  • Remarketing with Analytics
  • Demographics and Interests reporting
  • Segments
  • DoubleClick Campaign Manager integration
  • DoubleClick Bid Manager integration

Remarketing keeps track of everyone who visits this website and follows users wherever they go on other websites in order to show them our targeted ads. Through use of cookies, Google (or other, similar third-party sites) will remember you visited our website in the past and display our advertisements within the other websites you visit. Google can only show the ads on websites that are part of the Google Display Network.

Facebook Pixel

This website also utilizes a tool known as Facebook Pixel, an analytics tool that helps us measure the effectiveness of our online advertising.

How to opt out

Users can choose to accept or decline cookies at any time. There are several ways to opt out of Google Analytics Advertising features and/or any other third-party use of cookies:

Security

We only collect personal information website visitors voluntarily provide, whether from filling out forms or opting into cookies. These details are kept confidential, and we do not sell information to any third-party entities. While we implement a variety of security precautions to protect all personal information submitted through this website, we cannot guarantee its absolute security, as no method of online data transmission or storage is 100% secure.

As noted in our disclaimer, this website may contain links to other third-party entities. Just as we are not in control of the content contained on these outside websites, neither are we responsible for their privacy policies and practices.

Changes to privacy policy

This privacy policy is effective as of February 26, 2021. We may update or change this policy at any time, and website users are urged to check this page periodically for updates.