securing the extended human

8
SECURING THE EXTENDED HUMAN Bionics 2.0

Upload: tom-cheesewright

Post on 13-Jun-2015

400 views

Category:

Technology


0 download

DESCRIPTION

This is a presentation I gave at the Security Lancaster Cyber Security Conference in December 2013. It looks at some of the potential outcomes of attacks on our increasingly augmented humanity, limiting our ability to work or destroying our memories.

TRANSCRIPT

Page 1: Securing the Extended Human

SECURING THE EXTENDED HUMAN

Bionics 2.0

Page 2: Securing the Extended Human
Page 3: Securing the Extended Human

Insert picture of iPhone

DISCRETE, PORTABLE, ALWAYS CONNECTED

MEMORY

KNOWLEDGE

INFORMATION

DATA CAPTURE

NAVIGATION

Page 4: Securing the Extended Human
Page 5: Securing the Extended Human

“Sorry Boss. Can’t come in

today. My work co-

processor has a virus.”

Page 6: Securing the Extended Human
Page 7: Securing the Extended Human
Page 8: Securing the Extended Human

“THE BEST WAY TO PREDICT THE FUTURE IS TO INVENT IT.”

ALAN KAY

IMAGE BY CARL GODWIN HTTP://WWW.BOOKOFTHEFUTURE.CO.UK