Watch these clips from this panel from the AICGS Annual Symposium:
Serious cyber-attacks against public and private sector organizations are increasing in frequency and severity. Recent events have promoted concerns about preventing cyber-attacks while preserving privacy to the top of the political agenda. National—and international—conversations are taking place on the campaign trail, among policymakers, and by the tech-savvy younger generation on the role of the government in a networked world.
Technology has changed the face of cyber security. The exponential growth of network-attached devices, ranging from personal devices (smart phones, tablets, PCs, home networks) to corporate infrastructure (PCs, servers, corporate networks and datacenters) to public infrastructure (utility grids, public transit, defense intelligence) has created opportunities, challenges, and threats to organizations around the globe. Added to this mix is the resulting growth in data and the increasing sophistication of software to manipulate, analyze, and process these data.
Hackers, once eager young students and programmers anxious to demonstrate their computing prowess through intrusions and playful antics, have evolved. Now, access to our systems is sought by highly sophisticated organized crime rings operating across borders and national defense agencies pursuing clandestine and military activities.
IBM and other leading IT firms have developed advanced data analytics software to detect and prevent cyber-attacks by leveraging advanced data analysis. These tools and processes develop insights about the kinds of attacks being launched, who is launching them, and how their techniques are evolving. These analytics help determine which industries are being targeted, the types of incidents most prevalent, the threat posed, and the factors that allow exposure to cyber-attacks.
With public infrastructure and other national interests increasingly under attack and at risk of attack, governments are playing a more active role in the cyber security world, raising new questions about privacy boundaries and protection agendas. Questions on the role of government remain: should companies share the data they have with the government? What oversight mechanisms should be in place to prevent abuse by the government? What measures can the government take to fight intrusions?
It is certain that some combination of approaches will be necessary, and this panel will examine what combination of government and corporate power can be combined to determine precisely where attacks emanate, the motives, and the parties responsible.
Scott Crawford, Security Strategist, IBM
Louis R. Hughes, Independent Director, Alcatel Lucent
Stuart Levi, Partner, Skadden, Arps, Slate, Meagher & Flom LLP
Udi Mokady, Founder and CEO, Cyber-Ark
Rolf Riemenschnitter, Chief Information Security Officer, Deutsche Bank
Shreyas Vijaykumar, Commercial Business Lead, Palantir
Managing Director, Software Investment Banking, Deutsche Bank