This event has ended. Visit the official site or create your own event on Sched.
Please note though that you must register through Eventbrite in order to attend RightsCon Silicon Valley 2016! 

Find below the Official Schedule v1.0 (as of March 24, 2016). Slight changes may be made over the coming week — including session descriptions, panelist bios and room locations. Be sure to click on "Attendees" to see who’s coming and set up a personal profile. You can then select the sessions you wish to attend and create your own customized RightsCon schedule. Visit our RightsCon site for more details.
View analytic
Wednesday, March 30 • 10:30am - 11:45am
Big data breaches: the tipping point for trust?

Sign up or log in to save this to your schedule and see who's attending!

The number of data breaches for organisations (both business and government) seems to be increasing in frequency and severity, exposing sensitive data from users across the globe.

Examples include massive theft of credit card information from major Korean banks in 2014; disclosure of e-mails, personnel data and unreleased movies after an intrusion in Sony Pictures Entertainment’s network the same year; theft of data from over 20 million civil servants following an intrusion in the US Office of Personel Management’s information system in 2015. Whether we believe these projections or not, there are estimates that the effect of cyberattacks on the Internet could cost the world up to $90 trillion by 2030.

* Is this scenario avoidable?
* Are organisations taking all necessary steps to protect their users' data? And, if not, why not?
* Are there differences of practices between pure ICT players and non-ICT actors dealing with user data?
* In economic terms, does the economic value of personal data outweighs the costs and risks associated with the management of large amounts of user data?

We want first to discuss these points, identify any themes in the causes of these breaches, and then discuss the economic reasons that the organisations may not implementing best practices for stopping the attacks.

avatar for Nicolas Seidler

Nicolas Seidler

Senior Policy advisor, The Internet Society
Nicolas Seidler is Senior Policy Advisor at the Internet Society. He joined the organization in February 2010 and currently leads ISOC’s work on Internet and Human Rights issues. He also engages in key global Internet governance issues and processes. | | Nicolas works with a broad spectrum of international partners, global policy makers and non-governmental stakeholders on a range of Internet issues. In this role he contributes to ISOC's... Read More →

avatar for Drew Mitnick

Drew Mitnick

Policy Counsel, Access Now
avatar for Bruce Schneier

Bruce Schneier

Security technologist, cryptographer, privacy specialist, and author
Bruce Schneier is an internationally renowned security technologist, called a "security guru" by The Economist. He is the author of 13 books -- including "Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World" -- as well as hundreds of articles, essays, and academic papers. His influential newsletter "Crypto-Gram" and his blog "Schneier on Security" are read by over 250,000 people. He has testified before Congress... Read More →

Wednesday March 30, 2016 10:30am - 11:45am
The Cottage

Attendees (43)