Our increasingly connected world gives hackers even more ways to exploit technology for malicious purposes. We’re now entering a period when cyber attacks could cause major physical damage. To protect people from these combined cyber and physical threats, information security experts and law enforcement, which traditionally handles physical security, will have to share strategies.
After all, the boundaries between cyber and physical attacks are already blurring. In March of 2016, the U.S. Department of Justice claimed seven Iranians hacked the control systems of a small dam in New York state in 2013. The dam was offline for repair, preventing the hackers from controlling the flow of water. However, the incident demonstrated that hackers could take over infrastructure that was controlled by computers.
And, of course, there was the Stuxnet computer virus that stymied Iran’s nuclear program by targeting the centrifuges that enriched uranium. Stuxnet is considered the first program that showed how malware could cause physical damage.
Now with more items gaining web connectivity as part of the Internet of Things (IoT) movement, the need to protect physical devices from hackers will only increase. Information security professionals will be called upon to make sure attackers can’t tamper with the brakes on our autonomous cars or hack our smart thermostats and turn off the heat in our home during the winter.
At this week's METal the Chief Trust Officer, & VP Global Security at Unisys Tom Patterson with share with us the new normal when it comes to the next generation of security. What are the unforeseen issues governments, companies and citizens need to prepare for to keep themselves secured.
Selected as a 2016 global thought leader on trust, Tom is a dynamic silicon valley security executive with Government, corporate, global, and big-four executive experience, leveraging his immersion in all facets of security to improve businesses around the world. Having served as a CSO (MCC), big-four partner (Deloitte), chief eCommerce strategist (IBM), and a founder of a tech startup backed by the Carlyle Group, Tom thrives on delivering the real security benefits that build trust and grow businesses.Join Report
From April 01, 2017 9:00 am to 12:30 pm Save to calendar