Gaze into tech’s crystal ball: Futurist Shara Evans talks security – SecurityBrief Australia

When it comes to the future of technology, you dont need to look much further than Shara Evans, who is one of the worlds top female futurists and keynote speakers.

I spend a lot of my time looking at the latest and greatest that is happening in research labs around the world and also cutting-edge developments that are just coming to market now or in early prototypes.

Whether thats robots, nanotechnology or medical technology, or societys reactions to those technologies, Evans has her finger on the pulse.

Evans also helps specific verticals and industries work out how to apply the latest technology, look ahead to imagine the world in 10-20 years and how they can innovate to capture that change.

Speaking exclusively to SecurityBrief, sheexplains exactly why technology is about to get a whole not more exciting - and a whole lot more dangerous.

The one threat that I find in so many cases is that security is an afterthought, privacy is missing and ethics arent even thought of. This happens especially in the startup world, where people are just looking to solve problems or do something cool. Theyre not security experts, she says.

By attaching things to the internet in particular, you end up with potential areas that could lead to vulnerabilities. All you need is one weak link. Its not just hacking that is the issue, its how much information people put about themselves that they have either knowingly or inadvertently put out by using technology through a vendors website.

From an enterprise side, Evans says that the very first thing they need to understand is where technology is going and which of those they might implement in their own organisations, especially if staff are bringing those technologies in through their own initiatives.

The future is not fixed. There are a range of potential scenarios that can happen based on uptake of technology, technological hurdles being solved, geopolitical factors and climate factors. I look at different scenarios for how things might unfold and look at the way society might change and see where some of the puzzles might be.

If somebody has a wearable device and is connecting to their work mobile phone, and theres malware contained within it, suddenly its into a companys private network because somebody has a device that isnt secured properly.

She says that her presentation at the ASIALConference will focus on the cutting-edge technologies, where theyre going and what can be hacked and some of the exploits that have happened. We then look at new technologies and how they might open up vulnerabilities for enterprises as well.

If you think about technologies like drones. Theyre getting smaller all the time. The military has surveillance drones the size of an insect. You could have a device like that in your boardroom and youd never know it.

She says she will also look at how technology is helping to enhance humans, through the likes of ingestible and implantable technologies that are connected to the internet. What are the implications for businesses when that happens?

Things that are in the research labs right now are likely to be protecting their business in the mid-term to long-term.

She comments that internet-connected devices, from drones, to wearables to the humble refrigerator, fire alarm, surveillance camera and temperature monitor, biometric databases - are all connected.

Augmented reality is another growing area, which will evolve from smart glasses to smart contacts, Evans says. On the business side, she says these are prime tools for collaboration, visualisation, GPS signals, visual feedback in industrial projects and much more. What that means though, is that security is imperative.

In the case of the industrial worker if somebody hacked that and told workers to turn gauges in the wrong direction, you have a disaster or a terrorist attack because somebody has hacked into an augmented reality string.

She says the reality is that if there is a backdoor, somebody is going to exploit it. Organisations need to know what what could happen if things go wrong, and what organisations need to do to make sure that they dont go wrong.

Once an attack is there, you absolutely cannot control it. Theres a rather naive view that only people with authorisation can get into a backdoor, but thats just not the case.

Shara Evans will presenting at the ASIALConference, part of the Security Exhibition & Conference in Sydney that runs from July 26-28.

She will be covering topics as diverse as data security, wearables, health and embedded technology, the Internet of Things, and how they will unfold in the future.

Its always interesting to see where the world is going in the future, and thats what I will be talking about, she concludes.

View original post here:

Gaze into tech's crystal ball: Futurist Shara Evans talks security - SecurityBrief Australia

Related Posts

Comments are closed.