SlideShare a Scribd company logo
1 of 18
When Everyone (Including Your Mother) Is on Facebook:Implications for Information Security & Privacy Professionals Catherine Dwyer, PhD. Seidenberg School of Computer Science & Information Systems Pace University
What is a digital native? (everyone) How did we get here - two tales from the past decade – “MIS” and “Web 2.0” What challenges does “web 2.0” raise for security and privacy professionals? How can ISSA and other organizations tackle these issues? My talk today 2 NYMISSA 5/26/2011
NYMISSA 3 5/26/2011
Expect immediate access to all information sources relevant to task, available 24/7, from any location, from any “smart” device with an easy to use interface Always connected, unless they don’t want to be, so you better respect (and protect) their privacy Traders from investment bank want to be able to execute trades using their iPad 5/26/2011 NYMISSA 4 What is a digital native?
How did we get here? Two stories MIS Web 2.0 2000 - Nasdaq peaks at 5132 (2749 on 5/24) 2002 - SOX is passed 2003 – Carr HBR,“IT Doesn’t Matter” dot com bust Outsourcing Decreased MIS investment and employment 2001 – iPod & iTunes, WikiPedia 2004 – Facebook, GMail (beta) NYMISSA 5 5/26/2011 “The overinvestment in IT echoes the overinvestment in railroads …. Companies dazzled by the commercial possibilities threw large quantities of money away on half-baked businesses and products.”
Two Stories cont. MIS Web 2.0 2005 – YouTube, Google Maps 2006 – Twitter 2007 – iPhone 2009 – Android phone 2010 - iPad NYMISSA 6 5/26/2011 US CS Majors
2011 – digital natives & IT security professionals MIS Staff Digital natives Must manage Web 2.0 security and privacy leaks with strained infrastructure, little training and low staffing levels Few CS/IS majors graduating – and they are going to work for FB & Google! Digital natives equals everyone! Customers, employees, and corporate leadership (CEOs with blogs?) Facebook sets standard for usability and information access NYMISSA 7 5/26/2011
Scott M., VP at HP, updated LinkedIn profile described work developing ‘object storage,’ ‘networking,’ and ‘block storage’ for ‘an innovative and highly differentiated approach to cloud computing.’  The only problem was HP initiative was not public knowledge Post described user interface, including APIs and language binds for Java, Ruby, etc.  NYMISSA 8 Oops! 5/26/2011
Lock down systems: Former national security advisor Richard Clarke reported that after the Pentagon had a security breach from a thumb drive, it ordered that all USB connections plugged with rubber cement Train people – “if you share information about yourself you could be the victim of identity theft” NYMISSA 9 What can we do about it? 5/26/2011
One example from student assignment exercise conducting security/privacy audit: E.V. has no anti-spyware or anti-virus software E.V.’s computer does not update its system automatically E.V. does not use strong passwords, has one password for all of her accounts NYMISSA 10 Are digital natives aware of data leakage and security issues? 5/26/2011
NYMISSA 11 201 Apps! 5/26/2011 Facebook Apps are third party applications that get access to profile data (even when FB user is not online)
NYMISSA 12 NYT – 5/12/2010  NYT – 5/12/2010 - To manage your privacy on Facebook, you must navigate through 50 settings with more than 170 options 5/26/2011
As a property of data, e.g. social security numbers are private Must re-conceptualize privacy as a process “Many argue protecting privacy means strictly limiting access to personal information or assuring people’s right to control information about themselves. I disagree. What people care most about is not simply restricting the flowofinformation but ensuring that it flowsappropriately.”- Helen Nissenbaum, Privacy in Context 5/26/2011 NYMISSA 13 How is privacy implemented?
Building in privacy from the outset achieves better results than “bolting it on” at the end 1) Incorporating four substantive privacy protections into a firm’s practices Security, collection limits, retention practices, accuracy 2) Maintaining comprehensive data management procedures throughout the life cycle of their products and services 5/26/2011 NYMISSA 14 Privacy by Design
“Control over privacy” is a data centric approach Must re-conceptualize privacy as a process, not a property of a distinct piece or category of data We can’t fix privacy by adding checkboxes to every data sharing decision point Need to apply BPM, UML and workflow analysis to identify context relevant to information privacy NYMISSA 15 Clear role for ISSA 5/26/2011
You are critical stakeholders in this process and need a stronger connection to decision makers Your expertise with COSO framework and COBIT are extremely relevant to these problems – “privacy controls” Who is your lobbyist? How can you join the current privacy/security regulatory debate? NYMISSA 16 Going forward 5/26/2011
Privacy Papers for Policy Makers (Future of Privacy Forum) Lessons from the Identity Trail - Lessons From the Identity Trail Carnegie Mellon - CyLabHarvard - Berkman Center Stanford - http://cyberlaw.stanford.edu/NYU - Privacy Research Group FTC staff report and FCC green paper Privacy by Design NYMISSA 17 Recommended resources 5/26/2011
Thank you! Contact information:Prof. Catherine Dwyer email: cdwyer[at]pace[dot]eduTwitter: ProfCDwyerDiigo bookmarks: profcad Seidenberg School of Computing Sciences & Information SystemsPace University163 William Street #225NY, NY  10038 NYMISSA 18 Questions? 5/26/2011

More Related Content

What's hot

NYLJ Social Media Webinar J. Shook
NYLJ Social Media Webinar   J. ShookNYLJ Social Media Webinar   J. Shook
NYLJ Social Media Webinar J. ShookJ. David Morris
 
Iid infoshare exec_summary final
Iid infoshare exec_summary finalIid infoshare exec_summary final
Iid infoshare exec_summary finalAndrew_Goss
 
Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Cathy Dwyer
 
Personal Sphere - Information management in everyday life / EC Infoday 11.5.2009
Personal Sphere - Information management in everyday life / EC Infoday 11.5.2009Personal Sphere - Information management in everyday life / EC Infoday 11.5.2009
Personal Sphere - Information management in everyday life / EC Infoday 11.5.2009Kari-Hans Kommonen
 
Cite conference intralinks_industrialization_or_consumerization_final
Cite conference intralinks_industrialization_or_consumerization_finalCite conference intralinks_industrialization_or_consumerization_final
Cite conference intralinks_industrialization_or_consumerization_finalIntralinks
 
Hello. My name is, Social Business Design.
Hello. My name is, Social Business Design.Hello. My name is, Social Business Design.
Hello. My name is, Social Business Design.James Dellow
 
User privacy and data trustworthiness in mobile crowd sensing
User privacy and data trustworthiness in mobile crowd sensingUser privacy and data trustworthiness in mobile crowd sensing
User privacy and data trustworthiness in mobile crowd sensingLeMeniz Infotech
 
Week 4 pp presentation
Week 4  pp presentationWeek 4  pp presentation
Week 4 pp presentationJonica Bowne
 
Burling d cloudcomputing
Burling d cloudcomputingBurling d cloudcomputing
Burling d cloudcomputingDiane Burling
 
Five Trends that will Impact IT
Five Trends that will Impact ITFive Trends that will Impact IT
Five Trends that will Impact ITHolly Ross
 
Managing insider threat
Managing insider threatManaging insider threat
Managing insider threatmilliemill
 
Storgrid-Encryption-White-Paper
Storgrid-Encryption-White-PaperStorgrid-Encryption-White-Paper
Storgrid-Encryption-White-PaperToshio Spoor
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systemsProf. Othman Alsalloum
 
MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15MIT Startup Exchange
 
Data security in practice
Data security in practiceData security in practice
Data security in practiceAndres Kütt
 

What's hot (20)

NYLJ Social Media Webinar J. Shook
NYLJ Social Media Webinar   J. ShookNYLJ Social Media Webinar   J. Shook
NYLJ Social Media Webinar J. Shook
 
Iid infoshare exec_summary final
Iid infoshare exec_summary finalIid infoshare exec_summary final
Iid infoshare exec_summary final
 
Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"
 
Personal Sphere - Information management in everyday life / EC Infoday 11.5.2009
Personal Sphere - Information management in everyday life / EC Infoday 11.5.2009Personal Sphere - Information management in everyday life / EC Infoday 11.5.2009
Personal Sphere - Information management in everyday life / EC Infoday 11.5.2009
 
Cite conference intralinks_industrialization_or_consumerization_final
Cite conference intralinks_industrialization_or_consumerization_finalCite conference intralinks_industrialization_or_consumerization_final
Cite conference intralinks_industrialization_or_consumerization_final
 
Hello. My name is, Social Business Design.
Hello. My name is, Social Business Design.Hello. My name is, Social Business Design.
Hello. My name is, Social Business Design.
 
Security in the Cloud
Security in the CloudSecurity in the Cloud
Security in the Cloud
 
User privacy and data trustworthiness in mobile crowd sensing
User privacy and data trustworthiness in mobile crowd sensingUser privacy and data trustworthiness in mobile crowd sensing
User privacy and data trustworthiness in mobile crowd sensing
 
Esecurity e202
Esecurity e202Esecurity e202
Esecurity e202
 
Global Threats| Cybersecurity|
Global Threats| Cybersecurity| Global Threats| Cybersecurity|
Global Threats| Cybersecurity|
 
Week 4 pp presentation
Week 4  pp presentationWeek 4  pp presentation
Week 4 pp presentation
 
Burling d cloudcomputing
Burling d cloudcomputingBurling d cloudcomputing
Burling d cloudcomputing
 
Five Trends that will Impact IT
Five Trends that will Impact ITFive Trends that will Impact IT
Five Trends that will Impact IT
 
Managing insider threat
Managing insider threatManaging insider threat
Managing insider threat
 
Storgrid-Encryption-White-Paper
Storgrid-Encryption-White-PaperStorgrid-Encryption-White-Paper
Storgrid-Encryption-White-Paper
 
Peer to-peer-networking
Peer to-peer-networkingPeer to-peer-networking
Peer to-peer-networking
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15
 
Data security in practice
Data security in practiceData security in practice
Data security in practice
 
Qstn 27
Qstn 27Qstn 27
Qstn 27
 

Similar to Dwyer ISSA Presentation

Big data privacy issues in public social media
Big data privacy issues in public social mediaBig data privacy issues in public social media
Big data privacy issues in public social mediaSupriya Radhakrishna
 
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11DaliaCulbertson719
 
Spe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devicesSpe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devicesLeMeniz Infotech
 
Global Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid WorldGlobal Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid WorldNeil Raden
 
Business_Analytics_Presentation_Luke_Caratan
Business_Analytics_Presentation_Luke_CaratanBusiness_Analytics_Presentation_Luke_Caratan
Business_Analytics_Presentation_Luke_CaratanLuke Caratan
 
®Three Undocumented Layers of the OSI Model  and The.docx
®Three Undocumented Layers of the OSI Model  and The.docx®Three Undocumented Layers of the OSI Model  and The.docx
®Three Undocumented Layers of the OSI Model  and The.docxLynellBull52
 
The challenges of building a strong data infrastructure
The challenges of building a strong data infrastructureThe challenges of building a strong data infrastructure
The challenges of building a strong data infrastructureJeni Tennison
 
Running Head DATA BREACH .docx
Running Head DATA BREACH                                        .docxRunning Head DATA BREACH                                        .docx
Running Head DATA BREACH .docxtodd271
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSZac Darcy
 
White Paper - Killing the Shadow Systems
White Paper - Killing the Shadow SystemsWhite Paper - Killing the Shadow Systems
White Paper - Killing the Shadow SystemsNewton Day Uploads
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...mkeane
 
The BYOD Security Battleground
The BYOD Security BattlegroundThe BYOD Security Battleground
The BYOD Security BattlegroundWatchful Software
 
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docxRunning head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docxjeanettehully
 
What is the future of cloud security linked in
What is the future of cloud security linked inWhat is the future of cloud security linked in
What is the future of cloud security linked inJonathan Spindel
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsIrish Future Internet Forum
 
The Role of Information Security Policy
The Role of Information Security PolicyThe Role of Information Security Policy
The Role of Information Security PolicyRobot Mode
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
New Communication Paradigm and Security
New Communication Paradigm and SecurityNew Communication Paradigm and Security
New Communication Paradigm and SecurityMarco Raposo
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESijcsit
 

Similar to Dwyer ISSA Presentation (20)

Big data privacy issues in public social media
Big data privacy issues in public social mediaBig data privacy issues in public social media
Big data privacy issues in public social media
 
Data trawling and security strategies
Data trawling and security strategiesData trawling and security strategies
Data trawling and security strategies
 
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
 
Spe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devicesSpe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devices
 
Global Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid WorldGlobal Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid World
 
Business_Analytics_Presentation_Luke_Caratan
Business_Analytics_Presentation_Luke_CaratanBusiness_Analytics_Presentation_Luke_Caratan
Business_Analytics_Presentation_Luke_Caratan
 
®Three Undocumented Layers of the OSI Model  and The.docx
®Three Undocumented Layers of the OSI Model  and The.docx®Three Undocumented Layers of the OSI Model  and The.docx
®Three Undocumented Layers of the OSI Model  and The.docx
 
The challenges of building a strong data infrastructure
The challenges of building a strong data infrastructureThe challenges of building a strong data infrastructure
The challenges of building a strong data infrastructure
 
Running Head DATA BREACH .docx
Running Head DATA BREACH                                        .docxRunning Head DATA BREACH                                        .docx
Running Head DATA BREACH .docx
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
 
White Paper - Killing the Shadow Systems
White Paper - Killing the Shadow SystemsWhite Paper - Killing the Shadow Systems
White Paper - Killing the Shadow Systems
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
 
The BYOD Security Battleground
The BYOD Security BattlegroundThe BYOD Security Battleground
The BYOD Security Battleground
 
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docxRunning head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
 
What is the future of cloud security linked in
What is the future of cloud security linked inWhat is the future of cloud security linked in
What is the future of cloud security linked in
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
 
The Role of Information Security Policy
The Role of Information Security PolicyThe Role of Information Security Policy
The Role of Information Security Policy
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
New Communication Paradigm and Security
New Communication Paradigm and SecurityNew Communication Paradigm and Security
New Communication Paradigm and Security
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
 

Recently uploaded

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 

Dwyer ISSA Presentation

  • 1. When Everyone (Including Your Mother) Is on Facebook:Implications for Information Security & Privacy Professionals Catherine Dwyer, PhD. Seidenberg School of Computer Science & Information Systems Pace University
  • 2. What is a digital native? (everyone) How did we get here - two tales from the past decade – “MIS” and “Web 2.0” What challenges does “web 2.0” raise for security and privacy professionals? How can ISSA and other organizations tackle these issues? My talk today 2 NYMISSA 5/26/2011
  • 4. Expect immediate access to all information sources relevant to task, available 24/7, from any location, from any “smart” device with an easy to use interface Always connected, unless they don’t want to be, so you better respect (and protect) their privacy Traders from investment bank want to be able to execute trades using their iPad 5/26/2011 NYMISSA 4 What is a digital native?
  • 5. How did we get here? Two stories MIS Web 2.0 2000 - Nasdaq peaks at 5132 (2749 on 5/24) 2002 - SOX is passed 2003 – Carr HBR,“IT Doesn’t Matter” dot com bust Outsourcing Decreased MIS investment and employment 2001 – iPod & iTunes, WikiPedia 2004 – Facebook, GMail (beta) NYMISSA 5 5/26/2011 “The overinvestment in IT echoes the overinvestment in railroads …. Companies dazzled by the commercial possibilities threw large quantities of money away on half-baked businesses and products.”
  • 6. Two Stories cont. MIS Web 2.0 2005 – YouTube, Google Maps 2006 – Twitter 2007 – iPhone 2009 – Android phone 2010 - iPad NYMISSA 6 5/26/2011 US CS Majors
  • 7. 2011 – digital natives & IT security professionals MIS Staff Digital natives Must manage Web 2.0 security and privacy leaks with strained infrastructure, little training and low staffing levels Few CS/IS majors graduating – and they are going to work for FB & Google! Digital natives equals everyone! Customers, employees, and corporate leadership (CEOs with blogs?) Facebook sets standard for usability and information access NYMISSA 7 5/26/2011
  • 8. Scott M., VP at HP, updated LinkedIn profile described work developing ‘object storage,’ ‘networking,’ and ‘block storage’ for ‘an innovative and highly differentiated approach to cloud computing.’ The only problem was HP initiative was not public knowledge Post described user interface, including APIs and language binds for Java, Ruby, etc. NYMISSA 8 Oops! 5/26/2011
  • 9. Lock down systems: Former national security advisor Richard Clarke reported that after the Pentagon had a security breach from a thumb drive, it ordered that all USB connections plugged with rubber cement Train people – “if you share information about yourself you could be the victim of identity theft” NYMISSA 9 What can we do about it? 5/26/2011
  • 10. One example from student assignment exercise conducting security/privacy audit: E.V. has no anti-spyware or anti-virus software E.V.’s computer does not update its system automatically E.V. does not use strong passwords, has one password for all of her accounts NYMISSA 10 Are digital natives aware of data leakage and security issues? 5/26/2011
  • 11. NYMISSA 11 201 Apps! 5/26/2011 Facebook Apps are third party applications that get access to profile data (even when FB user is not online)
  • 12. NYMISSA 12 NYT – 5/12/2010 NYT – 5/12/2010 - To manage your privacy on Facebook, you must navigate through 50 settings with more than 170 options 5/26/2011
  • 13. As a property of data, e.g. social security numbers are private Must re-conceptualize privacy as a process “Many argue protecting privacy means strictly limiting access to personal information or assuring people’s right to control information about themselves. I disagree. What people care most about is not simply restricting the flowofinformation but ensuring that it flowsappropriately.”- Helen Nissenbaum, Privacy in Context 5/26/2011 NYMISSA 13 How is privacy implemented?
  • 14. Building in privacy from the outset achieves better results than “bolting it on” at the end 1) Incorporating four substantive privacy protections into a firm’s practices Security, collection limits, retention practices, accuracy 2) Maintaining comprehensive data management procedures throughout the life cycle of their products and services 5/26/2011 NYMISSA 14 Privacy by Design
  • 15. “Control over privacy” is a data centric approach Must re-conceptualize privacy as a process, not a property of a distinct piece or category of data We can’t fix privacy by adding checkboxes to every data sharing decision point Need to apply BPM, UML and workflow analysis to identify context relevant to information privacy NYMISSA 15 Clear role for ISSA 5/26/2011
  • 16. You are critical stakeholders in this process and need a stronger connection to decision makers Your expertise with COSO framework and COBIT are extremely relevant to these problems – “privacy controls” Who is your lobbyist? How can you join the current privacy/security regulatory debate? NYMISSA 16 Going forward 5/26/2011
  • 17. Privacy Papers for Policy Makers (Future of Privacy Forum) Lessons from the Identity Trail - Lessons From the Identity Trail Carnegie Mellon - CyLabHarvard - Berkman Center Stanford - http://cyberlaw.stanford.edu/NYU - Privacy Research Group FTC staff report and FCC green paper Privacy by Design NYMISSA 17 Recommended resources 5/26/2011
  • 18. Thank you! Contact information:Prof. Catherine Dwyer email: cdwyer[at]pace[dot]eduTwitter: ProfCDwyerDiigo bookmarks: profcad Seidenberg School of Computing Sciences & Information SystemsPace University163 William Street #225NY, NY 10038 NYMISSA 18 Questions? 5/26/2011