Duration 44:58
16+
Play
Video

Citrix Synergy TV - SYN145 - Privacy, security, data and trust: a look at the future of data risk...

Peter Lefkowitz
Chief Privacy & Digital Risk Officer at Citrix
  • Video
  • Table of contents
  • Video
Citrix Synergy Atlanta 2019
May 21 2019, Atlanta, GA, United States
Citrix Synergy Atlanta 2019
Video
Citrix Synergy TV - SYN145 - Privacy, security, data and trust: a look at the future of data risk...
Available
In cart
Free
Free
Free
Free
Free
Free
Add to favorites
248
I like 0
I dislike 0
Available
In cart
Free
Free
Free
Free
Free
Free
  • Description
  • Transcript
  • Discussion

About speakers

Accomplished attorney and data governance professional with 10+ years as Chief Privacy Officer for major multi-nationals. Extensive experience with cloud, IoT, regulatory compliance and public policy. 2018 Chairman of the International Association of Privacy Professionals.
A business savvy software executive specializing in organizational transformations and delivery of cutting-edge products. Experienced in leading small and large groups with extensive skills in managing geographically distributed teams.

About the talk

Topic: IT

In this era of social media big-data exploitation, AI facial recognition and nation-state-level hackers, there is no topic more hotly debated than personal privacy. Privacy law is increasingly focused on limiting the data we collect, use and share, but data and metadata can be used in critically important ways to protect the security of systems and privacy of users. How do we meet emerging legal and regulatory limits while still taking important steps to secure data? These are critical concerns for IT professionals who manage and handle employee and customer data. Hear from Citrix and Cisco senior risk executives and product leaders about how companies are balancing the demands of system security and privacy law; how advanced products and services using AI and machine learning can support your compliance with a robust privacy regime; and why accountability, auditability and trust are key elements of a strong corporate data protection program.Note: This session will be available for on-demand viewing post-event on Citrix Synergy TV.

Share

Good afternoon, everybody. My name is Peter lefkowitz and I'm here with Steve Wilson and Lease about it and we are 00:04 going to do a session about privacy and data and digital trust and the future so hold your 00:14 chairs 45 minutes. We're going to try to get that all done to begin. I'm so fortunate to be joined by Steven Lisa. I'm Steve 00:24 is Citrix is Vice President of product for cloud and iot his products include Cloud workspace and our analytics 00:34 design for all of those products and Steve. I want reduce whole resume, but Steve has an incredible resume going back through 00:43

many years at the Exxon and Oracle and Senior leadership position. So thank you for being here safe. And we have Lisa Baba Lisa is Cisco's 00:53 privacy engineering architect, and I'm just going to read to From Lisa's a job Mission because it's really it's an ambitious one and 01:03 it's and it's exciting one recent job is to embed data privacy and security controls. It's a Cisco processes applications and offerings 01:13 part about Lisa will get into a little 01:22 bit. Is that Lisa along with Jonathan Fox at at at the Cisco manages a really 01:32

sophisticated program around privacy engineering and for those of you who in your spare time, you've ever read the Privacy Engineers Manifesto that is 01:41 sort of the Bible of the space and something that the the Privacy 10 minutes at Cisco manager. So thank you. Thank you. What I'd like to do is 01:51 I would like to hand the very important clicker over to Steve and let We've talked about data at Citrix, 02:01 but I'm going to frame it first. We live in a world now where 10 years ago. Nobody ever could have imagined 02:11

that our products would be so not just data-centric but metadata Centric there was increasing amounts 02:21 of data and everything that we did what we didn't quite get at the time was all of the benefits and all of the risks that would be 02:31 associated with data about data what it is that you do when you access something when you offend to Kate against assistant, when you travel around 02:41 assistant when you come in from the internet and go out to the internet what it could tell about you what you're doing. What health 02:50

conditions you have what risks you posed and with that comes a series of very important decisions Steve and Lisa 03:00 are uniquely positioned to talk about what our two companies are doing in the space. And then once we've gone a bit through what the two companies 03:10 doing in this area will talk a little bit about the law will talk a little bit about what's too, some of the risk some of the challenges and and what 03:17 we're all doing to try to get on top of that so Steve I hand you the mantle So let's talk a little bit about this and I think 03:26

fortunately the the keynote this morning set me up pretty well. So hopefully everybody got to see that but I think what you're 03:36 seeing is from a corporate strategy more and more of what we're doing at Citrix pivots around the ability to manipulate 03:46 big data sets and do Advanced analytics on them. And really we started down this road in a lot of ways less than three years ago. 03:56 And we took a look at the trends that we're going out there seeing the early signs that analytics and AI were becoming much more Central to what 04:05

people were doing and we thought about what that might mean to us, right? We're not going to be coming analytics vendor and go compete with power bi 04:15 from Microsoft in Tableau, and we weren't going to become an artificial intelligence vendor and sell you neural networks because people like Amazon 04:22 and Microsoft are doing that. But we thought that was really a unique play given the amount of data that are products generate and 04:30 really what this led to is US looking at this where we said there are these emerging AI machine learning platforms where we can actually use this 04:39

to do what we call understanding the work graph. What are people doing? Where are they doing it from? Why are they doing it? And this brings us 04:49 to the idea of context and really bringing greater context what's going on which we can use in a whole lot of different types of application. 04:59 One of the big applications is is computer security, you know, the big things people worry about when you start to house these big repositories of 05:08 data is what if somebody gets it turns out one of the first things that you figure out how to use this technology for its how to better protect your 05:18

data and I was working with a customer relatively small Citrix customer. Set of auto dealerships few 05:25 hundred employees, but they depend heavily on environment, but they had actually a set of 05:35 other security Technologies. They had they had a commercial firewall a commercial antivirus package and the guy told me he got three hundred emails 05:44 a day from his firewall, which probably most of which were some actual attempt of somebody to probe his perimeter and decide whether 05:54

they could attack him and steal all of his data on his customers data, but it actually hit reach the point where it's completely an actionable to him 06:04 because the firewall was too dumb to understand the contacts and if you remember the slide Calvin put up this morning with you know, the big scary 06:13 teeth, how do you know the difference between the big scary teeth and the cute puppy while it's more contacts, but you have to be smart to be able to 06:20 look across that and take advantage of the bigger data set. So when you look at this from a security perspective, it's if people are going to get more 06:29

sophisticated at attacking us and that's going to include things like your traditional banging against the firewall on a very William Gibson ask 06:37 hacker scenario all the way to the more it's called a mundane but maybe more Insidious types of 06:46 user-centric hacking that goes on there with social engineering and trying to get people's credentials. You need more sophisticated ways to to 06:55 handle those things. And so the first application that we built on our on our big data platform was user Behavior analytics and 07:05

we didn't build our platform as a security platform. We built it as an analytics platform. The first data analytics we decided to do is to help 07:15 protect everybody stayed up until you look at all of those inputs that we have on the left side of the screen. Most of those have been there for 07:23 years. If not, Decades from Citrix. We just mostly drop that date on the floor and now we're trying to help you make better use out of it. But in 07:32 essence we can do better risk metering and help you decide what potentially real threats are on the flip side. Is it from security is about 07:39

productivity and it's about what we talked about this morning where people have too many apps. They don't get to use out of them for not getting their 07:47 money's worth and it's frankly just too complicated and bonding everybody under it. So when we look at things like again Ai and Big Data, how do 07:54 we get to a point where I can leverage those to just get much more intimate with my infrastructure? Why do I have to go open up a bunch of old web 08:04 applications and dig around in HTML apps to ask for what I need and get what I need and tell something to do what I need to get done. And so these 08:13

Beasts of the promises of these technologies that were really going after as a company And I think you're alright. 08:23 Is Peter says I'm the Privacy architect at Cisco and our Focus has been in the sense of where we fit into the world. We have move 08:32 data for years and years and years my whole career at Cisco. I started I thought they was in the packet, you know, if it's just it's something I moved 08:42 from left to right and I spent a lot of energy in that space But as I got into security, we really started focusing on how do you secure it and you 08:50

know again there in that. We looked at firewall and we looked at application security, but what we've really learned in this this new world is that 08:59 it's really two pieces of the security that we focus on what they don't one is that it stayed in German. It's data-centric and number to it is 09:08 people-centric because it now brings the data and the people together because of the things that that Steve is home. And you're trying to do you make 09:17 boric happen. You're trying to make the united in the commercial area mean in the consumer. Hang yourself or educate yourself, but it's always between 09:26

a person and the data all of the stuff that we can get that is the context of that helps us make that better one of the things about it. Is that what 09:35 that conductivity a lot of data in the past that has been siloed is no longer siloed. It was physically silent so I couldn't go and get Peters data 09:44 because him by myself, but now I have that I have data generated from every part of my life be at the the 09:54 house even my husband hasn't we got cameras everywhere with from the car from the from my school from work from 10:03

the community the cameras along the roads and now with the car talking about it's talking to me to got all these things moving forward the benefits we 10:13 see or just amazingly across the board for us exciting and we know that it's coming but we got to protect it because of the endgame. 10:22 To make us better not to make it's not to make the information better. We're really applying it so that communities and people will be better as they 10:32 go forward. Should I can see this weekend Cisco like Centrix has really been focusing on all the stated that we get. Not only the the 10:42

content the valley of that data, but the context of that big data and we've applied it somewhat the same ways was applied it in our collaboration with 10:52 our cognitive work. We've applied it in our data centers and meaning are networks how to build a better Network by looking at what's going on. 11:01 We've applied it in environments that are off security and that has you say was your first bank for us. It was the very first area that we really 11:11 brought David together and said, oh we can see more and we can actually let people know without giving away strategic data 11:20

or personal day that we can let you know. Someone's attacking in this area. And this is what the attack Vector looks like and now I can share that and 11:30 you can put up a remediation before it happens to you. So that being predictive was really important to us. So we worked on that and then the 4th 11:38 piece of this where we're really focusing on AI and ml is that running your own business. You know, how do we hire the right people for the new 11:46 future. How do we work with a really good marketing and sales? And then how do I make sure that we are doing the right thing for employees and if 11:53

our customers as we go forward, so it's it's an interesting to A Time For Us data while I was telling Peter earlier cuz I've been sick so very long 12:03 time 24 years that when we started they don't we weren't the processor but as we've moved into cloud and we've moved into iot 12:12 we are the process for now and it's important to us to make sure we're doing the right thing for this data and that's where my world lives as 12:21 Peter was talking about. Focus that we need to support this environment we don't want to slow down anyting we don't want to be the no we don't 12:30

need the cops, but we want to make sure that the date of that we're using has only four pieces that are important to us. One of those is that is 12:40 quality that the date of you've got is has been updated and you're not as as my previous boss. If you don't hoarding data that you no longer need 12:49 73% of the data out there today is no longer valuable to a company or to regulations that's people with storing and recently 12:59 doing a store does not that expensive anymore. But if you start doing Ai and ML on old data, you can get an old position the next piece of it for 13:08

us is that protection and my protection has to be broken apart both for what Cisco does but I'll get them for their customers are doing and we spend a 13:18 lot of time with our accessibility to things are encryption of work. But it is growing and going faster and faster. So we spend a lot of energy 13:27 but it's across our Ward but the group I'm in spends a lot of time building, and modules so that we can actually put it across all our products not 13:36 just security products but private security and that's why I chose when I read Michelle's book in the Dolphins book. I read it over Christmas one year 13:45

my husband works for Christmas. And this is why this is why I'm in this space. I really truly believe that we have to his people 13:54 be protecting ourselves but taking advantage of all these opportunities. So it's not that I won't share my data but share it for a value. Don't just 14:04 give it away. And so that's where my privacy peace comes in that. We really focus on the regulations. But we also look at the real value of taking 14:12 care of people and that you know, I want I don't want you to say no, but I want to be able to be very transparent about why I need the date of it. I'm 14:20

asking you to give me so that transparency is going to be Of our story. I'm really focusing on that area and making sure that 14:28 we're not just taking care of give you the day to let me hide it from you and we do need that not just the content but the contact where is who's 14:37 talking about? How long should we keep at all of those things become part of my engineering but I teach to my Engineers I teach to ourselves people. 14:45 We really spend a lot of time with awareness because the first step for you to think about data is what's in your head now, it's what I code. So 14:54

that's really where we are. Play some Joyce Theater. So so before we get to to all the scary laws, let's let's let's talk a bit about 15:02 how this works in practice and end and Lisa. I'll start with you. I know that you guys have built a really strong routine around 15:12 how Engineers think about these issues when When developing products and when implementing products could you just walk us through 15:21 a little bit of that that life cycle and and we're we're ownership lies for that. Do you view this? I'll put it this way. Do you 15:31

view you think about this community which is largely technical people. Do you view the ownership in the responsibility for these topics 15:41 principal is residing with wonky policy guys like me now or in engineering where does it where who owns it actually build our 15:51 products on that opportunity? What are team focus is on as part of operation? If you give him a framework that we can be consistent across things. 16:00 So 12 years ago Cisco looked at what Microsoft was doing and put in our secured about my life cycle. And so we started building in put security 16:10

into everything from you know your phone to the data center. And then as we've added an added we've moved into it. We had to add our Cloud story. 16:20 We had to work with our services teams. We booked work with any of our development teams that are building buying or partnering to get a solution out 16:30 the door as well as in a price for our own data has to be taken that way it taken care of and what we've done is when we looked at Price engineering 16:38 it can be easily put on top of that secure development life cycle design plan design develop verify 16:46

and then if it's if we're running it either we launch it out. So it goes on to a customer's own friend or we put it into the Operational part of what 16:56 we do and we have a whole set of requirements and not space. The nice thing about data is that it fits in that world the bad thing about data it's not 17:05 limited to that world and it's really important that now is fishing. We start looking at Ai and ML and a delay that that data where I used to live 17:13 within our WebEx or within a routering software can now I'll be taken out and looked out and use differently and that's 17:23

where I've had to teach my Engineers to think outside the box, you know, they worked really hard to understand that they need an ownership of not just 17:32 the product of their data, especially when we're processing. Steve Lisa just hit on three very important related topics 17:42 data legs ML and I I'm going to take them in reverse order because I think you start start with the data Lake and then you build up from 17:52 there you or your business necessarily now that we're doing Cloud now that we're doing Advanced 18:01

analytics for variety of topics, right for for for nacho security pro performance is built on that concept of the day Lake how has that 18:11 transform the way that you and your team think about the design ground-up of our products. But so first off 18:20 when when we talked about Citrix Cloud, the original premise of Citrix cloud is It's stories very little data. 18:30 All of you are worried about running your apps and desktops and traditionally people do that in their own 18:40

Datacenter. They own the infrastructure the delivery controllers everything as well as the servers running those applications. 18:49 So we started by offering Services where you can take some of the infrastructure and run it in the cloud, but can keep your 18:57 applications right where they are and I get questions constantly about how can I view all work at companies that have their own security and privacy 19:07 policies. How can I trust you with all this data? And we all can get down to real brass tacks. We have to really draw it out. What date are you 19:17

worried? You're trusting me with cuz I don't know anything. We're not copying your directory. I don't have your passwords. It's 19:26 it's really a command-and-control infrastructure for efficiently running event at Farm doesn't know about your user doesn't know about your apps. 19:36 Please start from that base of my the thing that makes it easier for me to sell to my customers as making sure that I know nothing as a as a base 19:46 going in position. And then we take that position very seriously, then though we say now I can add value in places. If you do choose to 19:55

give me more data and not really give it to me, but let me process it on your behalf is a better way to say that I'm so as we plug these Services 20:04 into the Citrix analytics framework and that Citrix analytics framework includes the data Lake you opt into particular kinds of services 20:14 and that's going to take particular kinds of metadata out of your system and get them stored so that we can help you process that and help 20:24 make it actionable. So so one thing I know you and I worked on this together and it's been become a pretty consistent theme across our 20:34

teams. We started to build these data governance documents, right? We describe all of the metadata that we have access to we describe where are pops. 20:43 Where are various opportunities around the world to store that data Arc. What has that done has that has that helped with your cell cycle. Does that 20:51 make a difference to the to the trust equation the way that customers think about what they're doing? So I'd say it's it's required but not always 21:00 sufficient. I'd say that a lot of the decision that people make on these are first order emotional decisions of the that's scary. I'm 21:09

not ready to go there yet and people need to be in a position where they're wanting that new value that you can bring to them where they're willing to 21:19 explore. Okay, what what risk am I at to take that off? And then what you get into is like let's get out the documentation. Let's look at 21:28 what's moving what's being stored where and who has access to it and you start to work through that and it's we see people go through Cloud 21:38 Transformations. These are the same questions that people ask when they're buying Salesforce or concur or you know doesn't have to be an artificial in 21:46

Collagen solution it's anywhere that they're going to be taking their data and and storing it their employees date of their customers data. If serious 21:55 real questions about that, so the ability to have really clear documentation about that that you have access to and that your team's can explain to 22:05 people that's that's a base going in condition and you mentioned another item and I'm going to ask each of you about this Steve you framed it 22:14 in terms of people being able to make granular control decisions talk talk about that talk about how that gets built into the product talked about how 22:24

important that is to to customers in there in their decision-making. I think people. People don't just 22:34 want to know what types of data are being shared they'd they need to know they're obligated to know right on behalf of their company on behalf 22:44 of their customers on behalf of their employees. And so I don't think people want to be able to inspect every packet but they want to know what 22:53 classes of data are being moved where they're being stored how they're being stored in who has access to that for what reasons so it's not so much 23:01

that I need to know, you know kind of the status of every field but it's you know, what what classes of information are being 23:11 stored and process than and why why do you need that? And how are using it? What are your thoughts on 23:21 where we see exactly the same thing, because when it really comes down to it, it's a risk decision of what you're doing with your data and no more 23:30 information you have and making that risk decision the better it is for some Time to know that yes, I can trust you two to take care of me 23:38

cuz you're being very transparent about what you're doing. You're not going to do something. I'm done comfortable with and if you are at your door 23:47 open to hearing what I need you to hear and so what we've done is the same concept week that we put out what we call her privacy data sheets and the 23:55 flow of where data is going so that it can be seen as part of the decision-making and it's actually been done. We did some surveys out on privacy 24:04 and it really actually shrinks the decision-making process for them. I mean going from Like Moths To The Winx today's something some cases because 24:14

The other piece of it a mini deep come and ask us about it. Even before we did that data sheets and we had to go. Where is that data? Who's got the 24:24 who's got this information about what we're doing. And now that we have a nice consistent way of doing the inventory the assessment and building these 24:32 hate these these this transparency and to it. We are now being consistent across the board. And again, if that's part of what we've been focused on is 24:40 as our path to getting there. So I'll just make her plug while while Lisa mentions that she mentioned that the research that Cisco's put out 24:49

two months ago. You put out your annual privacy report which which goes into Justice topics. You mind 24:58 spending a moment on that we did what we talked about 3,000 stores. They didn't know it was Cisco we went through what you know that that type of 25:08 survey but asking a couple of things one is yep, how how how do you see yourself in the To remodel of taking care of 25:16 data and privacy and then what are the things that are slowing you down in this area? And then how how you know, how does it affect your 25:26

decision-making guess again? We know we have to use data. We don't get to just go hide it or block it down. We want to use it. But we need to do it in 25:36 a explicit risk decision-making process and that that we were able to actually see in across the countries. I am back 25:45 India love that. They were number one in maturity and from our thing that me and we got so much things to put into their into their 25:55 marketing because they were like to see how old is transition has gone from it 26:05

being just a pure certification a regulation to truly be in a value statement as part of the business and I do think it's because of where we've been 26:15 moved. Leaving out processing to I mean again, I can trust that. I have my flash drive. But as soon as I put it into the cloud who's got access to 26:24 it and knowing that this is a secure and understand who I want to share it with accessible with space becomes a really important piece of the story. 26:33 So so let's let's turn up the volume a little bit, right? This is this is the the really scary slide for those of you who were here at Cinergy 26:42

last year. We had Synergy. I guess it was about a week before the gdpr went into effect. Right and the GDP or marked for Faraz. I'm sure for Cisco for 26:52 many of you it Mark this transformative moment when privacy was no longer just a bit of 27:02 you know, privacy is what you make of it and you do some registrations with authorities and then you worry about your works councils. It really became 27:11 a very tangible item for all of us are required for The first time comprehensively across a large group of companies the notion of accountability 27:19

right that you had to trace data up and down the stack. You need to be in charge of your vendors you needed to have auditable 27:29 processes and you needed to be transparent about what you're doing, right you now start to say California consumer Privacy Act 27:38 is coming online in January 2020. Get ready everybody. We have a Washington state law that's going into a fact we have Vermont and Maryland in the 27:48 state of New York and a bunch of others are concerned privacy laws. And so a few things come out of that and then I'll I'll ask each of you about at 27:58

the first thing is we're on stage talking about this right five years ago, its energy or Cisco live. I don't think this would have been a topic right 28:06 hook but we're on we're on stage talking about this, but the second is it how it is. For our customers for our communities 28:16 a unique set of challenges when they ask each of you about that this move to privacy laws that are 28:25 more accountability based with a lot more controls that then flow all the way through to engineering and I T has that help or hurt 28:35

what you do and what we offer safe. So I think one of the things that 28:44 they're being a set of regulations out, there is that it actually did some extent give his people inside your company care about 28:54 secure data security and data privacy a platform to stand on if your top-level Executives don't see a profit motive in it 29:03 than General it would get ignored and even if your top-level executive don't understand the enemy out of GDP are the California consumer, 29:13

you know, they're like I have to deal with this they can do the they can do the math very simply on the back of a napkin about how much it's going to 29:23 cost them if they're not complying with gdpr. And now you have the point where I mean, I think we pretty much hired Peter because gdpr was coming into 29:32 perspective. We didn't have a privacy Digital Risk officer before and the company decided that it needed one and so It means that you got 29:42 basically a level of attention. They're like below that I think you're still very much in a place where you was customers need to make decisions about 29:52

vendors that you think I have the right cultures and the right behaviors that they're going to work with you on these things because the laws the laws 30:01 are not specific enough and sophisticated enough or flexible enough to really enforce how individual companies actually handle their data. 30:11 I agree with Steve and the big thing for us that we've had to so that we can actually Implement is to take this whole 350 and build them into our 30:23 policy. So, you know in the sense that Jean-Pierre tends to be kind of that consistent highest bar. We've been able to establish that but when I work 30:33

with my team's I don't go your gdpr now compliant or working. I got your our privacy policy compliant and that allows us 30:42 to change it up. If something happens in the world tomorrow so that we can continue to work with the framework that we have. Where is it by make it 30:52 just a gdpr thing and that doesn't stop us that we had to do binding corporate rules and that we had to get a data Protection Officer. And then we had 31:01 a lot of programmatic things that we've wrapped into gdpr support and we're not we're not going to get rid of that but we have had taken that whole 31:08

concept and now is not Engineers they hate for me to say this, but this is my source of Truth. This is the policy that Thunder and that policy needs 31:16 these requirements and these requirements me with this type of privacy enhancing processes or Technologies as well as awareness so we can walk 31:25 want one thing to add to that is I'm based out of the Citrix office in California and I do a lot of work with the What's called the Silicon Valley 31:34 leadership group and they asked a few of us to go to Sacramento. Which is the capital of California and talk to the legislature actually turned out 31:43

one of the things are working on at the time with the California consumer data protection regulations, but they actually asked us to come up and talk 31:51 about iot. They didn't understand it and they wanted some people from the industry. So we went with the Stanford professor and a couple different 32:00 people commercial industry had some experience in we got a group of 30, you know Senate and assembly staffers. And the first thing they said is be 32:08 very gentle were mostly English Majors. We don't understand any of this stuff. Pain in the mint in the most genuine possible way so 32:17

you can you have to know who's writing these regulations. These are not privacy experts. They're not computer experts think they're not networking 32:27 experts. They don't know what the word metadata means. So 32:36 most part I'd say it that people like, you know, the people that 32:40 I met that Dale had the best of intentions they would you know, they weren't corrupt politicians. They were just literally were trying to figure out 32:50 the right thing to do for our constituents. And would you please help us understand this but you're you're not in the position where you should be 32:57

depending on those regulations to Tattoo they're there to put this sort of minimum bar to put all of us on notice that we have to care about 33:03 this California had a I had a unique circumstance write a guy by the name of all put together a state referendum and it looked like it was going to 33:13 pass the legislature out a week to consider a bell so I don't envy their position. But let let let me ask you this. So we are at this moment where 33:23 we've had the GDP are we now have some Tamil we have all the states where the federal government us concerning Privacy Law. We have countries around 33:31

the world that have not had strong privacy laws in the past that are now passing ever more stringent laws are considering ever more stringent laws. 33:41 I'm going to start with yulisa. What's what's the what's the great opportunity? And what's the thing that 33:49 could be on the horizon? That just scares The Living Daylights out of you. Only mascara first, let's scare is that we're going to get to a point that 33:58 they expect each of us to consent to every time we use a piece of data and I want to be under the legal basis. I want to be able to set to 34:07

know. This is your and I believe AI by the way will help me know the white lines the guardrails you want to live in I don't want to have to ask every 34:17 time because the customer experience. Okay. Let me just be honest. None of you guys have ever read your privacy notices every time that if you have it 34:27 take 72 hours of reading privacy notices for normal people in the workspace. I 34:35 don't want to live in that world. I want consent to 34:44 be needed when it's needed but legal basis the contracts with public interest these things need to be well understood in you so that's my scare. Is 34:54

that How to get because it's a great term it's going to get dropped into the requirements of the law of it and works and work and not the other piece 35:03 of it that I'm most excited about. Is that as we get to know what type of data we have and we understand quote who owns it or who stewarding it and 35:13 who's taking care of it. We we really see that value and we start seeing all these interesting things that you could do with that data that would make 35:22 each of us healthier or a happier or more pack more money or whatever it is. That success means to you to everybody 35:31

in this room 35:41 in the 35:42 data age. Now where in that information agent. It's an area that when I started Have I Told Peter that I grew up in North Carolina on a dirt road with 35:52 my family I learned about privacy very early cuts. My family the four houses had a we had a party line and my grandma picked up the phone for every 36:00 call. So you could add to be really careful about their privacy and what you said. I also grew up where there was no data the closest library with 17 36:10

miles away and we had three TV stations and one of them was not in BC was that kind of stuff when people told me I have never so 36:19 that we have the access to all this data and that we can use it to our betterment. I'm so excited. I mean, that's why I think privacy 36:29 so important and that's why I think data protection. So important was also the AI and ml that you can pull a lot of information and maybe make the 36:39 amazing again. Sorry. I cannot get on my soapbox. So 36:47

it's okay by my biggest fear of this from a regulatory point of view is 36:55 into the country's bitter. Forward-thinking 37:02 and good about this people who respect things like freedom and then there are countries that I worry about and I think bottom line artificial 37:12 intelligence is going to be the biggest disruptor everything in that goes from commercial productivity to Military and defense ever 37:20 and I'm including nuclear weapons and everything else in that. And the reason I say this is when you think about how fast this face is about to start 37:30

to move. I did my first work in AI in the 90s and we did some stuff that was kind of cool. But the end of the day didn't have enough computing power 37:38 to solve the problems. We wanted to solve 10 years ago. When I was at Sun we were working on a project building one of the largest supercomputers in 37:46 the world, we built the 64000 core supercomputer for the University of Texas Ranger at the University of Texas, and it was one of the first petaflop 37:54 class machines. Less than 10 years later. I just saw machine came online and its measured in exaflops. So 38:03

it's people tell you more supplies flowing down. It's not it's slowing down on one very fixed Vector about how fast you can run a single red 38:13 inside a piece of silicon things like gpus. My daughter was Bitcoin mining in my garage last year. She had more flops in my garage than that 38:23 supercomputer that cost 50 million dollars at the University of Texas. So this is coming in this is very real my car drives me to work everyday now, 38:32 so what I'm worried about is we do something where Some politicians with the best of intentions create some restrictions about 38:41

how use artificial intelligence and how we develop it that puts the Free World at an anti-competitive risk and that we wind up with 38:51 other parts of the world developing this faster than we do. So I do think that we need to put a lot of guardrails around this we all need to be 39:00 conscious of this and we've got to be looking hard at it. But fundamentally we have to be running hard at this because this is this is the technology 39:09 of the century prerogative and I'll give mine as well my biggest 39:18

fear at this point and it and it's a bit of a riff on what stable saying is we have these incredible opportunities in front of us. We have 39:28 so many good uses we can make of data and of metadata we can advance Healthcare we can do internet connected. Games that not only 39:38 help with health care, but then can push data sets to create ever faster Solutions health problems. We can deal with anti-fraud anti-money-laundering 39:47 with trading arms we can deal with security of networks and security of data. The fear is that the 39:56

laws will come along trying to solve a very limited problem date of brokerage and social media and we will all wind up 40:06 in that space Here's My Hope and I think it may be an antidote to and it's something that that that Steve and Lisa were talking about earlier, which 40:16 is for the first time I think the last 18 months we all have on the tips of our tongues that sort of a new expression but it's now and why do you say 40:25 privacy and Hansen Technologies? We have the ability, right? And this is something you do when designing products this something you do in overseeing 40:32

product. We have the ability to give people more granular choice. When you give people more information you give them or granular choice. life isn't 40:41 so scary anymore, right and that in a way brings us home to Trust and I think really that is where 40:51 if you look at the at the at the binding thread between our companies if I may it's in that it's in that trust equation. So please if you wouldn't 41:00 mind speaking of mom and about about your Trust equation with customers that would be great. 41:10

Which is what you're seeing here covers our whole thing of security and Trust of it talks about how we put security 41:17 into our products that it talks about what we did for gdpr. It talks about these data sheets reference earlier, but really and 41:27 what was important to us about this is that we start looking at this holistically that we don't have these pieces and parts and that was how we 41:37 started with security and that's how we're stretching our data is to look at it across the board as though it's there and if you have any questions, 41:45

you can ask me questions. They are or catch up with me cuz I'm both ways is really excited about the trust piece of and that's why we think 41:53 privacy and data protection really fits in the truck part and I'll close by saying we've done we've done much the same way for those of you who have 42:02 not seen it go out take a For the Citrix trust Center, we put all of our product and service not just the documentation for the products and 42:12 services. But the specific security documentation privacy policy compliance documentation certifications. I'm we have places to 42:22

report issues and incidents. We have a special news channel on there for things that are coming out involving our products and services and it is part 42:31 of the the entire trust relationship that we're trying to create with our customers. So with that I would like to thank both of you 42:41 very much. This has been wonderful and I appreciate you taking part. Bank of America contact 42:51 so we have one minute and 57 seconds. We have time for one question. Does anyone have a question? No, 43:01

okay. Yes. 43:11 I am so so I'm going to answer a little bit of a different way and I'll let you guys at edges. I think 50 years from now all of the devices 43:24 that are connected to us are going to do it for us. I think we're going to probably move a little bit further in that direction. It's going to be more 43:34 curated. We're going to have the ability to make more choices about how it works. We need a little bit smarter about the data that we put out there 43:43 but I think this is a train that's down a track. I think the difference is going to be we're all going to be putting a lot of data in the cloud there 43:50

going to be a gas that we let Facebook own the data that we gave them. I think that's the place too. And I do think if you watch all the Chinese that 43:59 our children are getting about being more specific. I mean, we kind of allow people Facebook grow up with a lock with no roof and it started with 44:09 people who are younger who thought it's okay to tell everything but is it is you're bringing up more and more of this digital-native child. They're 44:18 being told don't give away. All of your information doesn't stop some people. But again, that's their decision. That's the important part of this is 44:28

it when we do collaboration and we do social media, we have to understand you have the right to put it up there. We also have the responsibility. 44:38 Terrific. Thank you all very much for coming. Have a wonderful day XR bag. 44:46

Cackle comments for the website

Buy this talk

Access to the talk “Citrix Synergy TV - SYN145 - Privacy, security, data and trust: a look at the future of data risk...”
Available
In cart
Free
Free
Free
Free
Free
Free

Video

Get access to all videos “Citrix Synergy Atlanta 2019”
Available
In cart
Free
Free
Free
Free
Free
Free
Ticket

Interested in topic “IT”?

You might be interested in videos from this event

September 28 2018
Moscow
16
122
app store, apps, development, google play, mobile, soft

Buy this video

Video

Access to the talk “Citrix Synergy TV - SYN145 - Privacy, security, data and trust: a look at the future of data risk...”
Available
In cart
Free
Free
Free
Free
Free
Free

Conference Cast

With ConferenceCast.tv, you get access to our library of the world's best conference talks.

Conference Cast
505 conferences
19653 speakers
7164 hours of content