Voting period for this idea type has passed

Welcome to the "Internet of Threats"

Biometrics, voice enabled interfaces, and the internet of everything are issuing a new slew of threat vectors. In addition, insider threats (employees, contractors, suppliers) have lead to a slew of spear phishing activities, social engineering, and hacker activity. Whether spoofing identity or exfiltration of sensitive corporate date, these events are on the rise. How do we secure ourselves, our data yet remain productive and take advantage of cloud based resources?

Additional Supporting Materials




Ari Lightman, Professor, Carnegie Mellon University

Add Comments

comments powered by Disqus

SXSW reserves the right to restrict access to or availability of comments related to PanelPicker proposals that it considers objectionable.

Show me another