Panel at Third Country Training on Cybersecurity

75935a034e6c04dfd6f6946a299c3937?s=47 Harish Pillay
August 15, 2018
31

Panel at Third Country Training on Cybersecurity

Cybersecurity

75935a034e6c04dfd6f6946a299c3937?s=128

Harish Pillay

August 15, 2018
Tweet

Transcript

  1. Cybersecurity Considerations - A Citizen Engineer’s Perspective Harish Pillay Board

    of Trustees Head, Community Architecture and Leadership hpillay@redhat.com @harishpillay, h.pillay@ieee.org
  2. Three Broad Areas • Trends in National Cybersecurity Legislation •

    Considerations for ensuring security, protecting consumers’ interest, and ensuring innovation and prosperity • Balancing a mix of legislative and non- legislative approaches
  3. Three Broad Areas • Trends in National Cybersecurity Legislation •

    Considerations for ensuring security, protecting consumers’ interest, and ensuring innovation and prosperity • Balancing a mix of legislative and non- legislative approaches
  4. Three Broad Areas • Trends in National Cybersecurity Legislation •

    Considerations for ensuring security, protecting consumers’ interest, and ensuring innovation and prosperity • Balancing a mix of legislative and non- legislative approaches
  5. Sir Arthur C Clarke’s Three Laws First Law: When a

    distinguished but elderly scientist states that something is possible, he is almost certainly right. When he states that something is impossible, he is very probably wrong. Second Law: The only way of discovering the limits of the possible is to venture a little way past them into the impossible. Third Law: Any sufficiently advanced technology is indistinguishable from magic. Credit: https://en.wikipedia.org/wiki/Clarke%27s_three_laws
  6. Ensuring Security • Every individual is unique and deserves the

    fullest and strongest security – no one is above the law
  7. Ensuring Security • Every individual is unique and deserves the

    fullest and strongest security – no one is above the law • There cannot be any form of “backdoor” to the security posture of the technology in the consumer space
  8. Ensuring Security • Every individual is unique and deserves the

    fullest and strongest security – no one is above the law • There cannot be any form of “backdoor” to the security posture of the technology in the consumer space • No restriction of any form on reverse engineering and/or replacement of security features by the user
  9. Why?

  10. Protecting Consumers’ Interest • Consumers are purchase products are owners

    and have rights and obligations
  11. Protecting Consumers’ Interest • Consumers are purchase products are owners

    and have rights and obligations • Security is MAGIC - like anything technology based – Clake’s Third Law
  12. Protecting Consumers’ Interest • Consumers are purchase products are owners

    and have rights and obligations • Security is MAGIC - like anything technology based – Clake’s Third Law • Just as with ensuring security, the owners have full rights to reverse engineer and rip/replace components as they deem fit.
  13. Why?

  14. Ensuring Innovation and Prosperity is the WHY

  15. Ensuring Innovation and Prosperity • Freedom to tinker and experiment

    is a necessary condition for innovation cf Clarke’s Second Law.
  16. Ensuring Innovation and Prosperity • Freedom to tinker and experiment

    is a necessary condition for innovation cf Clarke’s Second Law. • Legislative support to shield reverse engineering to improve products and services should be looked upon as being “assume positive intent”.
  17. Ensuring Innovation and Prosperity • Freedom to tinker and experiment

    is a necessary condition for innovation cf Clarke’s Second Law. • Legislative support to shield reverse engineering to improve products and services should be looked upon as being “assume positive intent”. • Prosperity comes naturally when a thousand ideas bloom and a supportive ecosystem is sustained.
  18. Thank you! Harish Pillay hpillay@redhat.com @harishpillay h.pillay@ieee.org