powerpoint presentation · t. maximize trust that you have, minimize trust that you need. 23

31
Data Economy in Privacy, Security & Trust Jovan Golic EXPO 2015 27 Sep. 2015 | Milan ─ Points of Attention ─

Upload: others

Post on 11-Jun-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23

tData Economy in Privacy, Security & Trust

Jovan Golic

EXPO 2015

27 Sep. 2015 | Milan

─ Points of Attention ─

Page 2: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23

t

GOING DIGITAL & ON-LINE IS GOOD

1

Page 3: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23

t

GOING SMART IS GREAT

2

Page 4: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23

t

TOWARDS DIGITAL SINGLE MARKET IN EU

3

Page 5: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23

t

CROSS-BORDER DIGITAL IDENTITY MANAGEMENT

4

Page 6: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23

t

DO-IT-YOURSELF

5

Page 7: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23

t

LOOSING CONTROL & FLEXIBILITY

6

Page 8: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23

t

LOT OF PERSONAL/SENSITIVE DATA BEING REVEALED

7

Page 9: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23

t

DATA ARE EASY TO COPY, MODIFY & ERASE

8

Page 10: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23

t

CYBER ATTACKS ARE GROWING

9

Page 11: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23

t

NEED FOR DATA PROTECTION

10

Page 12: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23

t

DATA SECURITY ─ CONFIDENTIALITY, INTEGRITY, AVAILABILITY, ENTITY IDENTIFICATION

11

Page 13: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23

t

NEED FOR ENDPOINT DEVICE PROTECTION AGAINST INTRUSIONS & MALICIOUS SOFTWARE

12

Page 14: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23

t

NEED FOR USERS’ CONTROL OVER SENSITIVE DATA

13

Page 15: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23

t

USERS’ CONSENT IS NOT ENOUGH

14

Page 16: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23

t

SECURITY-BY-DESIGN

15

Page 17: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23

t

PRIVACY-BY-DESIGN

16

Page 18: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23

t

USABILITY, EASE OF USE

17

Page 19: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23

t

BIG DATA ANALYTICS OVER ANONYMIZED DATA

18

Page 20: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23

t

USER PROFILING SHOULD BE DONE LOCALLY

19

Page 21: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23

t

MASS USER/CITIZEN PROFILING COLLIDES WITH HUMAN FREEDOM

20

Page 22: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23

t

MASS CYBER SURVEILLANCE COLLIDES WITH HUMAN FREEDOM

21

Page 23: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23

t

CYBER-INVESTIGATION ENABLED, BUT NOT ABUSED

22

Page 24: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23

t

MAXIMIZE TRUST THAT YOU HAVE, MINIMIZE TRUST THAT YOU NEED

23

Page 25: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23

t

AVOID SINGLE POINTS OF TRUST, TO BECOME SINGLE POINTS OF FAILURE

24

Page 26: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23

t

BASE USERS’ TRUST ON TRUSTWORTHY TECHNOLOGY, BE PROACTIVE

25

Page 27: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23

t

ADDICTION TO CONNECTIVITY & SMART DEVICES

26

Page 28: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23

t

USERS SHOULD CONTROL SMART DEVICES & MACHINES

27

Page 29: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23

t

SEE DATA PROTECTION AS BUSINESS OPPORTUNITY RATHER THAN OBSTACLE

28

Page 30: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23

t

DATA PROTECTION SHOULD BE A DRIVER OF DATA ECONOMY

29

Page 31: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23

t

RAISE AWARENESS

30