SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
March 29-31, 2012
                                   www.techshow.com




Angel and Devil: Danger of Emerging
 Technologies That Lawyers Love

              Presenters
            Ivan Hemmans
            Antigone Peyton


                PRESENTED BY THE

                                             March 29-31, 2012
                                             www.techshow.com
It’s A Race
• The rate at which new technologies
  are developed, packaged, and
  delivered is increasing.
• Most find it impossible stay atop all
  the new gadgets and cool tools that
  compete for our time, our attention,
  and our dollars.


                               March 29-31, 2012
                               www.techshow.com
We’re Here to Help




                March 29-31, 2012
                www.techshow.com
Standard Concerns
•   Mobile access & storage
•   Security
•   RFID
•   Geo location
•   Social networks
•   Privacy


                              March 29-31, 2012
                              www.techshow.com
Personal, Meet Business
• Loss of the enterprise wall
• Data, data, everywhere . . .
• Mixing of worlds
  – Hardware
  – Software & programs
  – Storage locations



                                 March 29-31, 2012
                                 www.techshow.com
There’s no better teacher than reality . . .




                                      March 29-31, 2012
                                      www.techshow.com
Radio Frequency Identifier (RFID)

• Can track anyone or any product
  anywhere
• Security concerns
• Privacy
• TMI?




                             March 29-31, 2012
                             www.techshow.com
iCloud
• Apple says:
  – “iCloud stores your music, photos, documents, and
    more and wirelessly pushes them to all your devices.
    Automatic, effortless, and seamless — it just works.”




                                             March 29-31, 2012
                                             www.techshow.com
Apps & iCloud
Devil                                               Angel

Lots of 3rd-party app development to make sharing   Each 3rd-party developer has his or her own terms of
easy                                                use and privacy policies


Love the app store!                                 Apps may have their own security vulnerabilities



Easy backup to Apple servers                        Terms and conditions may not mesh with any
                                                    requirements as set forth by clients or jurisdictions in
                                                    which your firm operates



Documents available from multiple devices           Service may terminate with or without notice. Tight
                                                    integration with Apple means that Apple can collect
                                                    lots of usage information

Easy to use                                         Hard to manage without an Mobile Device
                                                    Management server




                                                                                    March 29-31, 2012
                                                                                    www.techshow.com
Android Devices
• Open Source platform
• More choices
• Malware issues




                         March 29-31, 2012
                         www.techshow.com
Android
Devil                                               Angel

Documents available from any web-enabled device     Service may terminate with or without your notice


Low cost                                            Tight integration with Google means that Google can
                                                    collect lots of usage information

Multitasking                                        Potential for poor battery performance
                                                    Increased potential for malware

Lots of 3rd-party app development to make sharing   Each 3rd-party developer has his or her own terms of
easy                                                use and privacy policies

                                                    Apps may have their own security vulnerabilities


Easy backup to Google servers                       Terms and conditions may not mesh with any
                                                    requirements as set forth by clients or jurisdictions
                                                    within with your firm operates

Documents available from multiple devices           Service may terminate with or without your notice


Easy to use                                         Hard to manage without an Mobile Device
                                                    Management server




                                                                                  March 29-31, 2012
                                                                                  www.techshow.com
Dropbox
• Will give data to government or in
  response to subpoena
• Enables third party decryption
• Past password drops/security
  breaches
• Policy changes follow public outcry
  and investigations
• Data on Amazon S3
                              March 29-31, 2012
                              www.techshow.com
Dropbox
Devil                                                  Angel

Apps to integrate all your devices with Dropbox        Makes it very easy to take firm data into and out of
                                                       the firm



Lots of 3rd-party app development to make sharing      Each 3rd-party developer has his or her own terms of
with iOS and Android easy                              use and privacy policies



                                                       Terms and conditions may not mesh with any
                                                       requirements as set forth by clients or jurisdictions
                                                       within with your firm operates




Your files are available from any web-enabled device   Service may terminate with or without your notice.




                                                                                       March 29-31, 2012
                                                                                       www.techshow.com
Social Media
•   What’s private?
•   I know where you are today
•   Location setting confusion
•   Linked accounts




                                 March 29-31, 2012
                                 www.techshow.com
What Can You Do?
• Awareness is the first line of
  defense
  – Read documentation and blogs
• Ways to spread awareness:
  – Live presentations
  – E-mail distributions
  – Intranet postings, blogs
  – Empower thoughtleaders

                               March 29-31, 2012
                               www.techshow.com
Antigone Peyton - CEO & Founder                       Ivan Hemmans
Cloudigy Law, PLLC                                    O’Melveny & Myers
(703) 436-2033                                        Twitter: @ihemmans
antigone.peyton@cloudigylaw.com                       Website: http://www.hemmans.com
Twitter: @antigonepeyton; @cloudigylaw
Facebook: http://www.facebook.com/CloudigyLaw
LinkedIn: http://www.linkedin.com/in/antigonepeyton
Cloudigy blog: http://cloudigylaw.com/news/




                                                                                 March 29-31, 2012
                                                                                 www.techshow.com

Más contenido relacionado

La actualidad más candente

Modern Technology
Modern TechnologyModern Technology
Modern TechnologyMd Saylab
 
Beam Internets Everything: The Only Unified Messaging Platform that Connects ...
Beam Internets Everything: The Only Unified Messaging Platform that Connects ...Beam Internets Everything: The Only Unified Messaging Platform that Connects ...
Beam Internets Everything: The Only Unified Messaging Platform that Connects ...WithTheBest
 
Design beyond the glowing rectangle - EuroIA2010
Design beyond the glowing rectangle - EuroIA2010Design beyond the glowing rectangle - EuroIA2010
Design beyond the glowing rectangle - EuroIA2010Claire Rowland
 
The New Internet: When Everything Becomes Smart
The New Internet: When Everything Becomes SmartThe New Internet: When Everything Becomes Smart
The New Internet: When Everything Becomes SmartJeeni
 
Internet of things (IOT) - Advanced Doorbell
Internet of things (IOT)  - Advanced DoorbellInternet of things (IOT)  - Advanced Doorbell
Internet of things (IOT) - Advanced DoorbellIndrason Ngangbam
 
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...OWASP Turkiye
 
Mediamorphosis 2013: Hacking the Body
Mediamorphosis 2013: Hacking the Body Mediamorphosis 2013: Hacking the Body
Mediamorphosis 2013: Hacking the Body Camille Baker, PhD
 
Comm%20 tech%20final%20project
Comm%20 tech%20final%20projectComm%20 tech%20final%20project
Comm%20 tech%20final%20projectawgalv01
 
New media presentation_1
New media presentation_1New media presentation_1
New media presentation_1mbucy21
 
Internet of Things for Libraries
Internet of Things for LibrariesInternet of Things for Libraries
Internet of Things for LibrariesNicole Baratta
 
Cloud Computing Presentation for Web Tools_Nicole Siegel
Cloud Computing Presentation for Web Tools_Nicole SiegelCloud Computing Presentation for Web Tools_Nicole Siegel
Cloud Computing Presentation for Web Tools_Nicole Siegelnsiegel922
 
Cloud Computing Presentation for Web Tools_ Nicole Siegel
Cloud Computing Presentation for Web Tools_ Nicole SiegelCloud Computing Presentation for Web Tools_ Nicole Siegel
Cloud Computing Presentation for Web Tools_ Nicole Siegelnsiegel922
 

La actualidad más candente (18)

Modern Technology
Modern TechnologyModern Technology
Modern Technology
 
Beam Internets Everything: The Only Unified Messaging Platform that Connects ...
Beam Internets Everything: The Only Unified Messaging Platform that Connects ...Beam Internets Everything: The Only Unified Messaging Platform that Connects ...
Beam Internets Everything: The Only Unified Messaging Platform that Connects ...
 
Lifted by the Cloud
Lifted by the CloudLifted by the Cloud
Lifted by the Cloud
 
Design beyond the glowing rectangle - EuroIA2010
Design beyond the glowing rectangle - EuroIA2010Design beyond the glowing rectangle - EuroIA2010
Design beyond the glowing rectangle - EuroIA2010
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
The New Internet: When Everything Becomes Smart
The New Internet: When Everything Becomes SmartThe New Internet: When Everything Becomes Smart
The New Internet: When Everything Becomes Smart
 
Internet of things (IOT) - Advanced Doorbell
Internet of things (IOT)  - Advanced DoorbellInternet of things (IOT)  - Advanced Doorbell
Internet of things (IOT) - Advanced Doorbell
 
Iot chap i
Iot chap iIot chap i
Iot chap i
 
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
 
Mediamorphosis 2013: Hacking the Body
Mediamorphosis 2013: Hacking the Body Mediamorphosis 2013: Hacking the Body
Mediamorphosis 2013: Hacking the Body
 
Designing chocolate, not aspirin
Designing chocolate, not aspirinDesigning chocolate, not aspirin
Designing chocolate, not aspirin
 
Comm%20 tech%20final%20project
Comm%20 tech%20final%20projectComm%20 tech%20final%20project
Comm%20 tech%20final%20project
 
New media presentation_1
New media presentation_1New media presentation_1
New media presentation_1
 
Internet of Things Webinar
Internet of Things WebinarInternet of Things Webinar
Internet of Things Webinar
 
Internet of Things for Libraries
Internet of Things for LibrariesInternet of Things for Libraries
Internet of Things for Libraries
 
Cloud Computing Presentation for Web Tools_Nicole Siegel
Cloud Computing Presentation for Web Tools_Nicole SiegelCloud Computing Presentation for Web Tools_Nicole Siegel
Cloud Computing Presentation for Web Tools_Nicole Siegel
 
Cloud Computing Presentation for Web Tools_ Nicole Siegel
Cloud Computing Presentation for Web Tools_ Nicole SiegelCloud Computing Presentation for Web Tools_ Nicole Siegel
Cloud Computing Presentation for Web Tools_ Nicole Siegel
 

Similar a Angel & Devil: Danger of Emerging Technologies

VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365David J Rosenthal
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesProofpoint
 
Mobile Security in 2013
Mobile Security in 2013 Mobile Security in 2013
Mobile Security in 2013 Troy C. Fulton
 
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)Lacoon Mobile Security
 
Webinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWebinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWithum
 
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...Andris Soroka
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptxSofiyaKhan49
 
Secure mobile content SharePoint Best Practices Conference 2013
Secure mobile content   SharePoint Best Practices Conference 2013Secure mobile content   SharePoint Best Practices Conference 2013
Secure mobile content SharePoint Best Practices Conference 2013Mike Brannon
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile SecurityArrow ECS UK
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace RisksParag Deodhar
 
Three Principals for Simple, Secure Content Sharing
Three Principals for Simple, Secure Content SharingThree Principals for Simple, Secure Content Sharing
Three Principals for Simple, Secure Content SharingContent Raven
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyOracleIDM
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & securityPriyab Satoshi
 
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2016
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha Visram
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 

Similar a Angel & Devil: Danger of Emerging Technologies (20)

VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government Agencies
 
Mobile Security in 2013
Mobile Security in 2013 Mobile Security in 2013
Mobile Security in 2013
 
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
 
Webinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWebinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft Cloud
 
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
 
Secure mobile content SharePoint Best Practices Conference 2013
Secure mobile content   SharePoint Best Practices Conference 2013Secure mobile content   SharePoint Best Practices Conference 2013
Secure mobile content SharePoint Best Practices Conference 2013
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace Risks
 
Three Principals for Simple, Secure Content Sharing
Three Principals for Simple, Secure Content SharingThree Principals for Simple, Secure Content Sharing
Three Principals for Simple, Secure Content Sharing
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Portable Biometrics (1)
Portable Biometrics (1)Portable Biometrics (1)
Portable Biometrics (1)
 
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 

Más de Antigone Peyton

Kill the Dinosaurs, and Other Tips for Achieving Technical Competence
Kill the Dinosaurs, and Other Tips for Achieving Technical CompetenceKill the Dinosaurs, and Other Tips for Achieving Technical Competence
Kill the Dinosaurs, and Other Tips for Achieving Technical CompetenceAntigone Peyton
 
A Litigator's Guide to the Internet of Things (IoT)
A Litigator's Guide to the Internet of Things (IoT)A Litigator's Guide to the Internet of Things (IoT)
A Litigator's Guide to the Internet of Things (IoT)Antigone Peyton
 
Protect That IP! Or the Art of Doing Business with the Government if You Sell...
Protect That IP! Or the Art of Doing Business with the Government if You Sell...Protect That IP! Or the Art of Doing Business with the Government if You Sell...
Protect That IP! Or the Art of Doing Business with the Government if You Sell...Antigone Peyton
 
Big Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy ImplicationsBig Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy ImplicationsAntigone Peyton
 
Big Changes in Patent Laws: Implementing the AIA
Big Changes in Patent Laws: Implementing the AIABig Changes in Patent Laws: Implementing the AIA
Big Changes in Patent Laws: Implementing the AIAAntigone Peyton
 
Social Media for Litigators
Social Media for LitigatorsSocial Media for Litigators
Social Media for LitigatorsAntigone Peyton
 
Two Businessess & An IP Fracas
Two Businessess & An IP FracasTwo Businessess & An IP Fracas
Two Businessess & An IP FracasAntigone Peyton
 
Taking Your Practice Into the Cloud (2011)
Taking Your Practice Into the Cloud (2011)Taking Your Practice Into the Cloud (2011)
Taking Your Practice Into the Cloud (2011)Antigone Peyton
 
Litigators’ Tool Box: Social Media (2011)
Litigators’ Tool Box: Social Media (2011)Litigators’ Tool Box: Social Media (2011)
Litigators’ Tool Box: Social Media (2011)Antigone Peyton
 
KIPO/KIPA Presentation: Direct Infringement (2010)
KIPO/KIPA Presentation: Direct Infringement (2010)KIPO/KIPA Presentation: Direct Infringement (2010)
KIPO/KIPA Presentation: Direct Infringement (2010)Antigone Peyton
 
Spoliation Wars & Other ESI Highlights (2010)
Spoliation Wars & Other ESI Highlights (2010)Spoliation Wars & Other ESI Highlights (2010)
Spoliation Wars & Other ESI Highlights (2010)Antigone Peyton
 

Más de Antigone Peyton (13)

Kill the Dinosaurs, and Other Tips for Achieving Technical Competence
Kill the Dinosaurs, and Other Tips for Achieving Technical CompetenceKill the Dinosaurs, and Other Tips for Achieving Technical Competence
Kill the Dinosaurs, and Other Tips for Achieving Technical Competence
 
A Litigator's Guide to the Internet of Things (IoT)
A Litigator's Guide to the Internet of Things (IoT)A Litigator's Guide to the Internet of Things (IoT)
A Litigator's Guide to the Internet of Things (IoT)
 
Lawyers in the Cloud
Lawyers in the CloudLawyers in the Cloud
Lawyers in the Cloud
 
Protect That IP! Or the Art of Doing Business with the Government if You Sell...
Protect That IP! Or the Art of Doing Business with the Government if You Sell...Protect That IP! Or the Art of Doing Business with the Government if You Sell...
Protect That IP! Or the Art of Doing Business with the Government if You Sell...
 
Big Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy ImplicationsBig Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy Implications
 
2013 SBIR Presentation
2013 SBIR Presentation2013 SBIR Presentation
2013 SBIR Presentation
 
Big Changes in Patent Laws: Implementing the AIA
Big Changes in Patent Laws: Implementing the AIABig Changes in Patent Laws: Implementing the AIA
Big Changes in Patent Laws: Implementing the AIA
 
Social Media for Litigators
Social Media for LitigatorsSocial Media for Litigators
Social Media for Litigators
 
Two Businessess & An IP Fracas
Two Businessess & An IP FracasTwo Businessess & An IP Fracas
Two Businessess & An IP Fracas
 
Taking Your Practice Into the Cloud (2011)
Taking Your Practice Into the Cloud (2011)Taking Your Practice Into the Cloud (2011)
Taking Your Practice Into the Cloud (2011)
 
Litigators’ Tool Box: Social Media (2011)
Litigators’ Tool Box: Social Media (2011)Litigators’ Tool Box: Social Media (2011)
Litigators’ Tool Box: Social Media (2011)
 
KIPO/KIPA Presentation: Direct Infringement (2010)
KIPO/KIPA Presentation: Direct Infringement (2010)KIPO/KIPA Presentation: Direct Infringement (2010)
KIPO/KIPA Presentation: Direct Infringement (2010)
 
Spoliation Wars & Other ESI Highlights (2010)
Spoliation Wars & Other ESI Highlights (2010)Spoliation Wars & Other ESI Highlights (2010)
Spoliation Wars & Other ESI Highlights (2010)
 

Último

How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsUXDXConf
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityScyllaDB
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyUXDXConf
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastUXDXConf
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka DoktorováCzechDreamin
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKUXDXConf
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Julian Hyde
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024TopCSSGallery
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeCzechDreamin
 
The UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoThe UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoUXDXConf
 

Último (20)

How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
The UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoThe UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, Ocado
 

Angel & Devil: Danger of Emerging Technologies

  • 1. March 29-31, 2012 www.techshow.com Angel and Devil: Danger of Emerging Technologies That Lawyers Love Presenters Ivan Hemmans Antigone Peyton PRESENTED BY THE March 29-31, 2012 www.techshow.com
  • 2. It’s A Race • The rate at which new technologies are developed, packaged, and delivered is increasing. • Most find it impossible stay atop all the new gadgets and cool tools that compete for our time, our attention, and our dollars. March 29-31, 2012 www.techshow.com
  • 3. We’re Here to Help March 29-31, 2012 www.techshow.com
  • 4. Standard Concerns • Mobile access & storage • Security • RFID • Geo location • Social networks • Privacy March 29-31, 2012 www.techshow.com
  • 5. Personal, Meet Business • Loss of the enterprise wall • Data, data, everywhere . . . • Mixing of worlds – Hardware – Software & programs – Storage locations March 29-31, 2012 www.techshow.com
  • 6. There’s no better teacher than reality . . . March 29-31, 2012 www.techshow.com
  • 7. Radio Frequency Identifier (RFID) • Can track anyone or any product anywhere • Security concerns • Privacy • TMI? March 29-31, 2012 www.techshow.com
  • 8. iCloud • Apple says: – “iCloud stores your music, photos, documents, and more and wirelessly pushes them to all your devices. Automatic, effortless, and seamless — it just works.” March 29-31, 2012 www.techshow.com
  • 9. Apps & iCloud Devil Angel Lots of 3rd-party app development to make sharing Each 3rd-party developer has his or her own terms of easy use and privacy policies Love the app store! Apps may have their own security vulnerabilities Easy backup to Apple servers Terms and conditions may not mesh with any requirements as set forth by clients or jurisdictions in which your firm operates Documents available from multiple devices Service may terminate with or without notice. Tight integration with Apple means that Apple can collect lots of usage information Easy to use Hard to manage without an Mobile Device Management server March 29-31, 2012 www.techshow.com
  • 10. Android Devices • Open Source platform • More choices • Malware issues March 29-31, 2012 www.techshow.com
  • 11. Android Devil Angel Documents available from any web-enabled device Service may terminate with or without your notice Low cost Tight integration with Google means that Google can collect lots of usage information Multitasking Potential for poor battery performance Increased potential for malware Lots of 3rd-party app development to make sharing Each 3rd-party developer has his or her own terms of easy use and privacy policies Apps may have their own security vulnerabilities Easy backup to Google servers Terms and conditions may not mesh with any requirements as set forth by clients or jurisdictions within with your firm operates Documents available from multiple devices Service may terminate with or without your notice Easy to use Hard to manage without an Mobile Device Management server March 29-31, 2012 www.techshow.com
  • 12. Dropbox • Will give data to government or in response to subpoena • Enables third party decryption • Past password drops/security breaches • Policy changes follow public outcry and investigations • Data on Amazon S3 March 29-31, 2012 www.techshow.com
  • 13. Dropbox Devil Angel Apps to integrate all your devices with Dropbox Makes it very easy to take firm data into and out of the firm Lots of 3rd-party app development to make sharing Each 3rd-party developer has his or her own terms of with iOS and Android easy use and privacy policies Terms and conditions may not mesh with any requirements as set forth by clients or jurisdictions within with your firm operates Your files are available from any web-enabled device Service may terminate with or without your notice. March 29-31, 2012 www.techshow.com
  • 14. Social Media • What’s private? • I know where you are today • Location setting confusion • Linked accounts March 29-31, 2012 www.techshow.com
  • 15. What Can You Do? • Awareness is the first line of defense – Read documentation and blogs • Ways to spread awareness: – Live presentations – E-mail distributions – Intranet postings, blogs – Empower thoughtleaders March 29-31, 2012 www.techshow.com
  • 16. Antigone Peyton - CEO & Founder Ivan Hemmans Cloudigy Law, PLLC O’Melveny & Myers (703) 436-2033 Twitter: @ihemmans antigone.peyton@cloudigylaw.com Website: http://www.hemmans.com Twitter: @antigonepeyton; @cloudigylaw Facebook: http://www.facebook.com/CloudigyLaw LinkedIn: http://www.linkedin.com/in/antigonepeyton Cloudigy blog: http://cloudigylaw.com/news/ March 29-31, 2012 www.techshow.com