Drones and the Internet of Things in the cybersecurity equation – IBM Cyber Beat Live

 Technological advancement is unleashing an age of extensive innovation that is chock full of unmanned aerial vehicles known as drones, wearable devices, cognitive thinking and the Internet of Things and connected devices. Alexander Bell once said, “It is the man who carefully advances step by step, with his mind becoming wider and wider…who is bound to succeed in the greatest degree.”

Are the giant steps we’re taking to remove the hinges from innovation’s door also weakening our cybersecurity? Are we ignoring the “carefully advances” phrase in Bell’s axiom?

Widespread security threats

A recent Forbes report shows that cybersecurity incidents have increased significantly, and researchers predict the cybersecurity market will reach $170 Billion by 2020. And no industry is exempt. Cyber criminals target banks, hospitals, universities and even utilities. Does the rabid desire to defy technological norms expose us to even greater cybersecurity threats than ever? Are we sacrificing citizen privacy and safety for the newest gadget?

Consider that according to an International Business Times report, hackers at AnonSec recently claimed they found a way to potentially gain partial control of a NASA Global Hawk drone. Drone technology holds the promise of speed and efficiency for online retail, emergency management and even healthcare. Yet, drones also have the potential to be used as a tool that can invade privacy, conduct corporate espionage and carry out acts of terrorism.

For another contrast, consider that the Internet of Things gives businesses the opportunity to increase productivity and enhance customer experience, among other things. However, a report on Internet of Things security shows there is a “458 percent increase in vulnerability scans of [Internet of Things] IoT devices in the last two years.”

Deep discussion of cybersecurity

What are we doing to ensure drones, the Internet of Things and technology in general doesn’t give hackers the keys to our security systems? This question will be the center of the discussion, “Drone on: How technology changes the face of cybersecurity” on 11 March 2016 at 1 PM Eastern. Here are some key questions experts will discuss:

  • Drones facilitate a range of possibilities, from delivery and fulfillment to logistics, security, law enforcement and action by first responders, However, can these devices be properly protected? How are they susceptible to hacks?

  • What can we do to combat the security risks and challenges drones create? Will these measures enable foolproof prevention of hacking drones?

  • What’s the role of government in drone regulation when it comes to protecting the privacy and safety of citizens?

  • Research indicates only 12 percent of companies are highly confident in Internet of Things security. How can we improve the security of connected devices and instill high confidence in their security?

  • Smart devices collect information about us, our homes and our lifestyles. How can citizens ensure their information is secure from possible cyber attacks?


http://www.ibmbigdatahub.com/sites/default/files/todd_rosenblum_2.jpgTodd M. Rosenblum, senior exeutive at IBM, was previously acting assistant secretary of homeland defense and principal deputy assistant secretary at the US Department of Defense and deputy under secretary of intelligence for plans, policy and performance management at the US Department of Homeland Security. Rosenblum is a nonresident fellow at
the Brent Scowcroft Center on International Security.




http://www.ibmbigdatahub.com/sites/default/files/petersinger_1.jpgPeter Warren Singer, strategist and senior fellow at the New America Foundation and founder of NeoLuddite, a technology advisory firm, is the author of multiple award-winning books and a contributing editor at Popular Science. Singer has been named by the National Portrait Gallery, Smithsonian Institution, as one of the 100 “leading innovators in the nation,” and by Defense News as one of the 100 most influential people in defense issues. He was recognized by Onalytica social media data analysis as one of the ten most influential voices in the cybersecurity world. And Foreign Policy included Singer in its annual Top 100 Global Thinkers List of people whose ideas most influenced the world that year.

Described in the Wall Street Journal as “the premier futurist in the national-security environment,” Dr. Singer is considered to be one of the world’s leading experts on changes in 21st century warfare. He has consulted for the US Military, Defense Intelligence Agency, FBI, and advised a range of entertainment programs, including Discovery Channel, Dreamworks, HBO, History Channel, Universal, Warner Brothers and Call of Duty,the video game series and best-selling entertainment project. Singer also served as coordinator of the Obama 2008 campaign’s defense policy task force and was named by the President to the US Military’s Transformation Advisory Group.

http://www.ibmbigdatahub.com/sites/default/files/scottschober_2.jpgScott N. Schober is a cybersecurity expert and president and CEO of Berkeley Varitronics Systems, Inc., a 40-year-old provider of advanced wireless radio frequency (RF) test and security solutions. Schober has overseen the development of numerous cell phone detection tools used to enforce a “no cell phone policy” in corporate, correctional, law enforcement, military, secured government and university facilities. He regularly appears on Arise TV, Bloomberg TV, Canadian TV News and as a cybersecurity expert with numerous appearances on Al Jazeera America, CCTV America, CNBC, CNN, Fox Business Channel, Fox News, Inside Edition, MSNBC, One America News (OAN), PIX11, TheBlaze and more. Schober has also presented as a subject-matter expert (SME) discussing cybersecurity and corporate espionage at numerous conferences worldwide.


And here are a few resources to review in preparation for this discussion:

Notify of

Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013