Future Crooks (In Medicine)

Future Crooks (In Medicine)

In my lectures I always talk about the absurdity of making the case that all should be a 100% safe, secure and private. In spite of all effort, money and debate, just as there were crooks in the Middle Ages, there will be in the future. As long as we know, every 'most secure' systems gets hacked, since there will be always someone smarter than the smartest system.

To me it's even an ethical or moral question: what about politicians, companies, advocate groups that preach 100% safety for all of these aspects. The create an atmosphere with an unmeetable goal, set the bar unreachable high and block innovation unacceptable often.

Let's be honest with each other : it is a no-can-do, but should we do nothing then ? Of course not, we should do our utmost best to prevent anything bad to happen with our data, our records and our identity. But stop thinking that policy in one or the other country will 'prevent' or 'block' bad things to happen in a hyperconnected world.

I thought it would make sense to share a video of colleague faculty at Singularity University's Exponential Medicine Marc Goodman with you. This talk he gave at TED Global in 2012, and i hope his great talk last November in San Diego will come online soon (will share here as well then).

A good read afterwards is this June 2013 Wired article from his hand together with (also SU Faculty) Andrew Hessel.

Also if this is of your interest be sure to get a copy of his new book "Future Crimes". After seeing his talk, you might even be móre concerned, good ! But now let's try to re-balance the risks and our normal life a bit more then we are doing right now, there is no such thing as 100% safety and security.

Andrew Fleming ICA AML Dip

MI and Reporting EMEA Head | Keynote Speaker | AI In Business | Anti-Money Laundering | Fraud | Terrorist Financing | Data Management | Assurance | Management | Cross-border Investigation | Corruption

10 年

I don't know any company which is preaching 100% data safety. Data management risk strategies, as advocated by risk professionals, demand that we implement data protocols, introduce next generation firewalls and anti-malware systems and train our staff to recognise potential breaches, unusual data movement and suspicious behaviour in other staff, but recognises that we cannot totally eliminate data breaches. All we can do is manage the risk downwards and increase the difficulty for the criminally minded. Our staff, customers, partners and suppliers represent potentially the greatest threat to our data, we cannot stop an employee’s failure to be vigilant, making a mistake or being criminally minded, nor can we guarantee that our customers, suppliers or partners have not had their systems compromised providing a possible secure route for malware into our systems. This is why we need to introduce for example layered firewalls, multiple restricted access pinch-points and independent programmes searching for unusual behaviour throughout our data management systems. Clearly eternal vigilance is key and there is always more we need to do but we are limited to the cost versus risk balance. Most companies will conduct a cost based risk assessment that will look to identify their risk exposure and implement an appropriate data risk management strategy based on their own risk analysis, which is in line with their perceived risk exposure. Cost will always play a part in data risk management and some companies, due to who they are and the sectors they are involved in, will be at a greater risk of data theft, those companies will consequently invest more to reduce the potential risk but that greater investment will still not guarantee a 100% safe system.

回复

要查看或添加评论,请登录

Lucien Engelen的更多文章

社区洞察

其他会员也浏览了