Interview with Deloitte’s Cyber Risk & Financial Services at RSA 2019

Interview with Deloitte’s Cyber Risk & Financial Services at RSA 2019

In this interview, recorded for Roadway Media at RSA 2019, Daniel Frank of Deloitte’s Cyber Risk and Financial Services team talks to Bright Blue Innovation’s Lidia Paulinska about GDPR, US privacy regulations and the integration of privacy requirements and practices into the existing security environment.  The discussion includes trends applicable to SMBs and enterprise clients.

Here is the link to the interview:

How was the world of technology in 2016?

How was the world of technology in 2016?

January 2017 – How was the world of technology in 2016? – talk with the experts from San Francisco Bay area: Kevin Krewell, Principal Analyst of Tirias Research, Rodney Thayer, Cybersecurity Consultant and Pallab Chatterjee, Editor in Chief Media & Entertainment Technologies.

Autonomous vehicles made a lot of progress this year, more than anticipated – stated Kevin Krewell. The amount of effort and engineering going into driverless cars was remarkable. Typically, cars are a slow moving industry, taking 5+ years to qualify an equipment part going into a vehicle. But now things have changed and car manufactures are being blamed for not moving fast enough. Companies, such as, Qualcomm, Nvidia, Intel, NXP and others have been investing heavily to bring autonomous vehicles to the market in the next few years.  Elon Musk and Tesla have done the most to promote this change. Musk broke the barrier by having pre-installed software built into the Tesla vehicles, like he knew it was going to get better over time. Car manufacturers are not just making cars any more, but rather building a software platform – Rodney Thayer.

“All our knowledge begins with the senses”- declared 18th century philosopher Immanuel Kant.

The challenge with autonomous cars is that they are cameras based – added Pallab Chatterjee. Radar, lidar, sonar or real cameras are like senses of a vehicle. They are figuring things out but they create a huge amount of data. The flood of data is here and more is coming. By 2020, the average internet user will create 1.5GB of traffic per day, smart hospital – 3.000 GB per day, autonomous vehicle – 4.000 GB each per day, airplane – 40.000 GB per day and smart factory – 1.000.000 per day.

The biggest surprise that came up in 2016?

That VR came back again was a surprise to Pallab Chatterjee. It is like 3D, every 10-15 years people forget that it is not technology, it is what content is available and how the companies plan to monetize it. That was one of the problems with 3D.  It was rushed to the market because the technology was available but people said – there was nothing to watch because the content was made in a rush and it was of poor quality and stories. We see that scenario right now. The only good content for VR is in games on very expensive platforms but it is not mass market. The VR devices for mass market are not professionally created and a content is poor and people get dizzy and nauseous.

For Kevin Krewell, the biggest surprise in 2016 was how many big money acquisitions were taking place. It is not that big companies are buying small companies but big companies are buying big companies. Intel buying Altera last year was a starting point. NXP bought Freescale and now Qualcomm is buying NXP that just bought Freescale, and Samsung buying Harman Group.

The overriding challenge in 2016 was security and privacy.  A number of high level intrusions and data breaches took place, and as the year ends, more will come to light.  The risks are at all levels, individuals, companies, organizations, even standard internet providers and countries – the cybersecurity threats are guiding the way business was done in 2016 and the new ways it will be done in 2017 according to Rodney.

Here is the full episode that was aired at Bay area Comcast tv in December:

Trusted Computing Group’s view on SEDs

Trusted Computing Group’s view on SEDs

January, 2016, Storage Visions – Mark Schiller is Executive Director of Trusted Computing Group, which provides security standards to the computing industry. The group is a collection of over 100 partners that include commercial companies, government participation, academia and experts in the field of security and privacy. Schiller covered the challenges facing security and protection of stored content, and shared his view on SEDs (Self Encrypting Drives).

Why Self-Encrypting Drives?

There are world-wide financial and legal consequences for data loss and data breeches and the occurrence of such events have been increasing. SEDs create a layer of protection from that happening as well as providing compliance with the safe harbor laws in the most of the US and EU for loss of devices that are secured with encrypted data. Schiller spoke after Michael Willett underlined the main reason of using SEDs.  The SEDs have a lower overhead for encryption and decryption than software encryption. Another feature is SEDs allow for a fast crypto-erase that sanitizes drive data before drive replacement, repair, de-commissioning, re-purposing and end of life.

He summarized the talk with SSDs are the new standard for fast storage media. In combination with the NVMe storage interface, they are driving higher performance and lower latency solutions, meaning data safety can be realized without the negative impact of software encryption on system performance.

More information about Trusted Computing Group at www.drivetrust.com

 

 

 

Self Encrypting Drives are becoming universal

Self Encrypting Drives are becoming universal

January, Storage Visions – Michael Willett from Bright Plaza moderated the Storage Vision’s panel discussion about security and protection.  He stated that the idea of encryption being built into the hardware is becoming universal.  There are many benefits leaning on the concept of Hardware-based Self-Encryption being a better option over Software-based Encryption. First is the transparency and easy management. SEDs (Self Encrypting Drives) come from the factory with an encryption key already generated so there is no encrypting key to manage. Second, the Life-cycle cost. In the software case, it is an on-going cost versus pro-rated into the initial drive for SED. Third is disposal or re-purposing cost for the drive.  It is easy to erase the on-board encryption key for SEDs providing safe disposal. There is also no problem with re-encryption as there is no need to ever re-encrypt the data. The last benefits are in (A) performance: there is no degradation in SED performance;  (B) standardization: the entire HDD industry is building to the TCG/SED specifications, and finally (C) there is no interference with upstream processes or use.

2

The session covered the challenges facing security and protection of stored content, including content on mobile devices as well as at home and in the cloud. It explored the reasons why OPAL based client encrypted storage is a key factor in data security, Standardized security products are making data security easier than ever while enabling desired content sharing.

 

 

Oracle Cloud at OpenWorld 2015

Oracle Cloud at OpenWorld 2015

A proclamation at the event is that “the era of utility computing is here”.  This new shift in computing is no less important than the introduction of personal computers to the general public in the 1970’s.  At that time, nobody believed that computers could be a personal device, explained Executive Chairman and CTO Larry Ellison at Oracle OpenWorld 2015.

DSC_0692

In his opening keynote Ellison unveiled the new Oracle SaaS applications and other advances in the Oracle Cloud. The biggest cloud companies are now worth 6 billion dollars and will be soon more. Oracle realized that the importance of the cloud a decade ago, and re-wrote all its applications to run in the cloud also. In 2015, Oracle is focused on engineering, cost, performance, reliability, compatibility, security and standards in the three layers of the cloud: SaaS, PaaS and IaaS.

DSC_0693

Oracle Cloud: Six Design Goals:

Lower Cost: 1. Lower Price: Match or beat Amazon Web Services Prices 2. Automation: Eliminate labor and human error 3. Productivity: Reduce labor by making it easier to build and use applications

Highest Reliability: 1. Fault Tolerant: Redundant deployment, hot patching & backup, instant recovery 2. Automation: Eliminate human error during deployment, patching, backup, recovery

Highest Performance: 1. Database:  In-memory In-flash columnar database, Exadata in the Cloud 2. Middleware: In-memory speed-of-through Analytics 3. Scale-out Architecture: Elastic capacity and performance on-demand

Open Standards: 1.  SQL, Hadoop, NoSQL…Java, Ruby, Node.js…Linux, Docker. No Lock-in: Move Workloads and data to the other Public Clouds: Amazon, Microsoft…

Compatibility: 1. Manage: Public Cloud and Private Cloud assets with a single pane of glass 2. Coexistence: Push-button live data migration between Oracle Public & Private Cloud

Always-On Security: 1. Security in Silicon: Always-on-real-time intrusion detection stops data theft 2. Data Encryption: Always-on in the Cloud – Key management on-Premise

 

The opening of the event had details of the major announcements presented by Mr Ellison, the first of these was about the Oracle SCM Cloud.

DSC_0712

The second was about E-Commerce in the CX cloud.

DSC_0713

The third announcement was about the new mobile UI.

DSC_0719

The last announcement was about Integrated Learning System.

DSC_0723