powerpoint presentation · t. maximize trust that you have, minimize trust that you need. 23
TRANSCRIPT
![Page 1: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23](https://reader030.vdocument.in/reader030/viewer/2022041104/5f052f847e708231d411b383/html5/thumbnails/1.jpg)
tData Economy in Privacy, Security & Trust
Jovan Golic
EXPO 2015
27 Sep. 2015 | Milan
─ Points of Attention ─
![Page 2: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23](https://reader030.vdocument.in/reader030/viewer/2022041104/5f052f847e708231d411b383/html5/thumbnails/2.jpg)
t
GOING DIGITAL & ON-LINE IS GOOD
1
![Page 3: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23](https://reader030.vdocument.in/reader030/viewer/2022041104/5f052f847e708231d411b383/html5/thumbnails/3.jpg)
t
GOING SMART IS GREAT
2
![Page 4: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23](https://reader030.vdocument.in/reader030/viewer/2022041104/5f052f847e708231d411b383/html5/thumbnails/4.jpg)
t
TOWARDS DIGITAL SINGLE MARKET IN EU
3
![Page 5: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23](https://reader030.vdocument.in/reader030/viewer/2022041104/5f052f847e708231d411b383/html5/thumbnails/5.jpg)
t
CROSS-BORDER DIGITAL IDENTITY MANAGEMENT
4
![Page 6: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23](https://reader030.vdocument.in/reader030/viewer/2022041104/5f052f847e708231d411b383/html5/thumbnails/6.jpg)
t
DO-IT-YOURSELF
5
![Page 7: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23](https://reader030.vdocument.in/reader030/viewer/2022041104/5f052f847e708231d411b383/html5/thumbnails/7.jpg)
t
LOOSING CONTROL & FLEXIBILITY
6
![Page 8: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23](https://reader030.vdocument.in/reader030/viewer/2022041104/5f052f847e708231d411b383/html5/thumbnails/8.jpg)
t
LOT OF PERSONAL/SENSITIVE DATA BEING REVEALED
7
![Page 9: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23](https://reader030.vdocument.in/reader030/viewer/2022041104/5f052f847e708231d411b383/html5/thumbnails/9.jpg)
t
DATA ARE EASY TO COPY, MODIFY & ERASE
8
![Page 10: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23](https://reader030.vdocument.in/reader030/viewer/2022041104/5f052f847e708231d411b383/html5/thumbnails/10.jpg)
t
CYBER ATTACKS ARE GROWING
9
![Page 11: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23](https://reader030.vdocument.in/reader030/viewer/2022041104/5f052f847e708231d411b383/html5/thumbnails/11.jpg)
t
NEED FOR DATA PROTECTION
10
![Page 12: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23](https://reader030.vdocument.in/reader030/viewer/2022041104/5f052f847e708231d411b383/html5/thumbnails/12.jpg)
t
DATA SECURITY ─ CONFIDENTIALITY, INTEGRITY, AVAILABILITY, ENTITY IDENTIFICATION
11
![Page 13: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23](https://reader030.vdocument.in/reader030/viewer/2022041104/5f052f847e708231d411b383/html5/thumbnails/13.jpg)
t
NEED FOR ENDPOINT DEVICE PROTECTION AGAINST INTRUSIONS & MALICIOUS SOFTWARE
12
![Page 14: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23](https://reader030.vdocument.in/reader030/viewer/2022041104/5f052f847e708231d411b383/html5/thumbnails/14.jpg)
t
NEED FOR USERS’ CONTROL OVER SENSITIVE DATA
13
![Page 15: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23](https://reader030.vdocument.in/reader030/viewer/2022041104/5f052f847e708231d411b383/html5/thumbnails/15.jpg)
t
USERS’ CONSENT IS NOT ENOUGH
14
![Page 16: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23](https://reader030.vdocument.in/reader030/viewer/2022041104/5f052f847e708231d411b383/html5/thumbnails/16.jpg)
t
SECURITY-BY-DESIGN
15
![Page 17: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23](https://reader030.vdocument.in/reader030/viewer/2022041104/5f052f847e708231d411b383/html5/thumbnails/17.jpg)
t
PRIVACY-BY-DESIGN
16
![Page 18: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23](https://reader030.vdocument.in/reader030/viewer/2022041104/5f052f847e708231d411b383/html5/thumbnails/18.jpg)
t
USABILITY, EASE OF USE
17
![Page 19: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23](https://reader030.vdocument.in/reader030/viewer/2022041104/5f052f847e708231d411b383/html5/thumbnails/19.jpg)
t
BIG DATA ANALYTICS OVER ANONYMIZED DATA
18
![Page 20: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23](https://reader030.vdocument.in/reader030/viewer/2022041104/5f052f847e708231d411b383/html5/thumbnails/20.jpg)
t
USER PROFILING SHOULD BE DONE LOCALLY
19
![Page 21: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23](https://reader030.vdocument.in/reader030/viewer/2022041104/5f052f847e708231d411b383/html5/thumbnails/21.jpg)
t
MASS USER/CITIZEN PROFILING COLLIDES WITH HUMAN FREEDOM
20
![Page 22: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23](https://reader030.vdocument.in/reader030/viewer/2022041104/5f052f847e708231d411b383/html5/thumbnails/22.jpg)
t
MASS CYBER SURVEILLANCE COLLIDES WITH HUMAN FREEDOM
21
![Page 23: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23](https://reader030.vdocument.in/reader030/viewer/2022041104/5f052f847e708231d411b383/html5/thumbnails/23.jpg)
t
CYBER-INVESTIGATION ENABLED, BUT NOT ABUSED
22
![Page 24: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23](https://reader030.vdocument.in/reader030/viewer/2022041104/5f052f847e708231d411b383/html5/thumbnails/24.jpg)
t
MAXIMIZE TRUST THAT YOU HAVE, MINIMIZE TRUST THAT YOU NEED
23
![Page 25: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23](https://reader030.vdocument.in/reader030/viewer/2022041104/5f052f847e708231d411b383/html5/thumbnails/25.jpg)
t
AVOID SINGLE POINTS OF TRUST, TO BECOME SINGLE POINTS OF FAILURE
24
![Page 26: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23](https://reader030.vdocument.in/reader030/viewer/2022041104/5f052f847e708231d411b383/html5/thumbnails/26.jpg)
t
BASE USERS’ TRUST ON TRUSTWORTHY TECHNOLOGY, BE PROACTIVE
25
![Page 27: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23](https://reader030.vdocument.in/reader030/viewer/2022041104/5f052f847e708231d411b383/html5/thumbnails/27.jpg)
t
ADDICTION TO CONNECTIVITY & SMART DEVICES
26
![Page 28: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23](https://reader030.vdocument.in/reader030/viewer/2022041104/5f052f847e708231d411b383/html5/thumbnails/28.jpg)
t
USERS SHOULD CONTROL SMART DEVICES & MACHINES
27
![Page 29: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23](https://reader030.vdocument.in/reader030/viewer/2022041104/5f052f847e708231d411b383/html5/thumbnails/29.jpg)
t
SEE DATA PROTECTION AS BUSINESS OPPORTUNITY RATHER THAN OBSTACLE
28
![Page 30: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23](https://reader030.vdocument.in/reader030/viewer/2022041104/5f052f847e708231d411b383/html5/thumbnails/30.jpg)
t
DATA PROTECTION SHOULD BE A DRIVER OF DATA ECONOMY
29
![Page 31: PowerPoint Presentation · t. maximize trust that you have, minimize trust that you need. 23](https://reader030.vdocument.in/reader030/viewer/2022041104/5f052f847e708231d411b383/html5/thumbnails/31.jpg)
t
RAISE AWARENESS
30