Security and Society: - PowerPoint PPT Presentation


PPT – Security and Society: PowerPoint presentation | free to download - id: 9fb7c-Mzk3O


The Adobe Flash plugin is needed to view this content

Get the plugin now

View by Category
About This Presentation

Security and Society:


One day brainstorming session preceded by reception and dinner the night before ... Assistant Professor, University of the Armed Forces, Munich ... – PowerPoint PPT presentation

Number of Views:107
Avg rating:3.0/5.0
Slides: 23
Provided by: pault182


Write a Comment
User Comments (0)
Transcript and Presenter's Notes

Title: Security and Society:

Security and Society
  • An IBM Deep Dive

IBMs Global Innovation Outlook
  • Launched in 2004
  • Opened IBMs in-house forecasting of trends in
    business and technology to outside thought
  • Security and Society A series of six Deep Dives
    in 2008
  • Water second series of Deep Dives in 2008

Deep Dives on Security and Society
  • Six Deep Dives
  • Moscow
  • Berlin
  • Taipei
  • Tokyo
  • Vancouver
  • Chicago

Deep Dive format
  • Representatives from IBM GIO team, who attended
    all Deep Dives in series
  • Other IBM personnel
  • About twenty other attendees from business,
    academia, and government
  • One day brainstorming session preceded by
    reception and dinner the night before
  • Final report based on six Deep Dives of series

Rationale for Security and Society Deep Dive
  • In April, the GIO began its first focus area of
    2008 Security and Society. Why security? Because
    the need for security is a fundamental part of
    the human condition. Lives are spent in pursuit
    of it. Societies are built around it. And
    businesses buy and sell the promise of it.
  • The ongoing battle between those that desire
    security and those that undermine it has never
    been in more flux than it is right now.
    Globalization, ideological conflict, and a global
    communications network that connects everyone on
    the planet have conspired to reshape the global
    security landscape in a matter of decades.
  • As a result, new thinking needs to be applied to
    this new reality.

Suggested Deep Dive Theme
  • To fight a network, you need a network
  • - Katharina von Knop
  • Assistant Professor, University of the
    Armed Forces, Munich
  • Claim Web 2.0 social networking can provide
    such a network

Deep Dives before Chicago
  • Starting in April 2008
  • Moscow
  • First Deep Dive broaching concept of community
  • Towns, villages, families, and individuals all
    have a role to play in security
  • Many participants say that innovative management
    of energy supplies will be Russias greatest
    contribution to global security
  • Green Mark vodka countering counterfeit products

More Deep Dives
  • Berlin
  • Sustainable security must root out causes of
    instability and conflict, e.g., resource
    scarcity, wealth disparity, oppressive governments

More Deep Dives
  • Taipei
  • Building on SARS outbreak of 2003 immune system
    as metaphor for global security
  • Threats allowed to enter system
  • System quickly responds and bolsters defenses
    against similar future attacks
  • Athol Yates, Executive Director, Australian
    Homeland Security Research Centre
  • Balance of supply chain efficiency and security
  • plans for International Homeland Security office

More Deep Dives
  • Tokyo
  • Concern that Japan losing reputation for being
    one of safest and most secure countries
  • Globalization interfering with culture of
    security and allowing physical and digital
    destabilization forces into Japan

More Deep Dives
  • Vancouver
  • Online identities focus of discussion
  • How to manage and control personal identification
  • Consensus that delicate balance of centralized
    and distributed security is the right way to
    address global security

Chicago Deep Dive
  • Key Theme Privacy Cavoukian, strong advocate
  • IBM GIO attendees
  • Amy Hermes, Worldwide GIO Program Director
  • Verna Grayce Chao, GIO Business Development
  • Laura Lombard, GIO Program Coordinator
  • Kristopher Lichter, Director, Exploration
    Programs, GIO Executive Director
  • Milind Naphade, GIO Research Liaison

Chicago Deep Dive
  • Other IBM attendees
  • Marc Lautenbach, General Manager, IBM Americas
  • Chung-Sheng Li, IBM Research, Security Privacy
  • Harriett Pearson, VP Regulatory Policy and Chief
    Privacy Officer
  • Cathy Lasser, VP Industry Solutions and Emerging
  • Rey Khachatourian, Senior Information Architect,
    Customer Experience Strategy, Global Business

Other Chicago Attendees
  • Linda Foley, founder Identity Theft Resource
  • Carol Rizzo, CTO, Kaiser Permanente
  • Andrew Mack, Director Human Security Project,
    Simon Fraser U. U.N. experience
  • Natalie Ambrose, futurist, Future Expeditions
  • Christopher Hoff, CISO, Unisys
  • Erv Blythe, CIO, VPISU

Other Chicago Attendees
  • Mustaque Ahamad, director Information Security
    Center, Georgia Tech
  • Julie Fergerson, VP of Emerging Technology, Debix
    Identity Protection Network
  • Chris Kelly, Chief Privacy Officer, Facebook
  • Dan Shefflin, VP of Advanced Technology for
    Automation and Control Solutions, Honeywell
  • Michael Barrett, CISO, Paypal

Other Chicago Attendees
  • Glenn Armstrong, VP of Corporate and Global
    Innnovation, Alticor
  • Marc Sokol, JKB Capital partner
  • Ann Cavoukian, Information and Privacy
    Commissioner, Province of Ontario
  • Pat Conley, SVP Product Development, Verisign
  • David Trulio, Special Assistant to the President,
    White House, DHS

The Report
  • Distributed Security The Network Effect
  • Government and Business The New Roles
  • Incentives Best Behavior
  • Privacy and Identity Getting to Know You

The Network Effect
  • Common Law
  • Community-based security (vigilantes?)
  • Wireless Watchdogs
  • Mobile phones
  • Thayer School Engineering in Medicine poster
    winner detect counterfeit medicines Ashifi
    Gogo, Ghana
  • The Secure Supply Chain
  • Athol Yates - smart supply chains with central
    analysis engine for risk data at all levels

The New Roles
  • Good Security, Good Business
  • Private sector has more incentive for strong
    security than government or individuals
  • 1.6 to 2 revenue lost to fraud, theft, and
    organized crime
  • The Legal Vacuum
  • Courts of law dangerously out of touch with
    digital criminal landscape
  • Built-in Security
  • Embedding security into products, e.g., car
  • Trade-off between convenience and cost, e.g., iPod

Best Behavior
  • Strictly Business
  • Money is the most powerful incentive for changing
    behavior Green Mark example
  • The Threat Within
  • 92 Insider attacks precipitated by negative
    work-related event not opportunism (CMU report)
  • Monitoring, soft incentives
  • Convenient Truth
  • Having good security make life more convient
  • Travelers pay annual fee for prescreening of
    personal data

Getting To Know You
  • The Master Token
  • Biometrics
  • Cancelable biometrics, e.g., distorted
  • Reputation Reconnaissance
  • Peer-to-peer based online rating systems
  • Social network
  • Aggregated by third party, like credit ratings
  • Reclamation Project
  • Data tethering can know who is using your
    personal data

On-going Collaboration
  • IBM RD
  • Julie Fergerson, Linda Foley - Identity Theft
  • Christopher Hoff - Unisys
  • Ann Cavoukian Information and Privacy
    Commissioner, Ontario video surveillance
  • Carol Rizzo, CTO, Kaiser-Permanente Secure
    Medical Records
  • Decades of medical records for same patients from
    26 hospitals
  • Athol Yates (Taipei) International Homeland