Duration 44:58
16+
Play
Video

Citrix Synergy TV - SYN145 - Privacy, security, data and trust: a look at the future of data risk...

Peter Lefkowitz
Chief Privacy & Digital Risk Officer at Citrix
+ 2 speakers
  • Video
  • Table of contents
  • Video
Citrix Synergy Atlanta 2019
May 21, 2019, Atlanta, GA, United States
Citrix Synergy Atlanta 2019
Video
Citrix Synergy TV - SYN145 - Privacy, security, data and trust: a look at the future of data risk...
Available
In cart
Free
Free
Free
Free
Free
Free
Add to favorites
256
I like 0
I dislike 0
Available
In cart
Free
Free
Free
Free
Free
Free
  • Description
  • Transcript
  • Discussion

About speakers

Peter Lefkowitz
Chief Privacy & Digital Risk Officer at Citrix
Lisa Bobbitt
Privacy Architect, CPO, Privacy Engineering at Cisco
Steve Wilson
VP, Product for Cloud and IoT at Citrix

Accomplished attorney and data governance professional with 10+ years as Chief Privacy Officer for major multi-nationals. Extensive experience with cloud, IoT, regulatory compliance and public policy. 2018 Chairman of the International Association of Privacy Professionals.

View the profile

A business savvy software executive specializing in organizational transformations and delivery of cutting-edge products. Experienced in leading small and large groups with extensive skills in managing geographically distributed teams.

View the profile

About the talk

In this era of social media big-data exploitation, AI facial recognition and nation-state-level hackers, there is no topic more hotly debated than personal privacy. Privacy law is increasingly focused on limiting the data we collect, use and share, but data and metadata can be used in critically important ways to protect the security of systems and privacy of users. How do we meet emerging legal and regulatory limits while still taking important steps to secure data? These are critical concerns for IT professionals who manage and handle employee and customer data. Hear from Citrix and Cisco senior risk executives and product leaders about how companies are balancing the demands of system security and privacy law; how advanced products and services using AI and machine learning can support your compliance with a robust privacy regime; and why accountability, auditability and trust are key elements of a strong corporate data protection program.Note: This session will be available for on-demand viewing post-event on Citrix Synergy TV.

Share

Good afternoon, everybody. My name is Peter lefkowitz and I'm here with Steve Wilson and Lease about it and we are going to do a session about privacy and data and digital trust and the future so hold your chairs 45 minutes. We're going to try to get that all done to begin. I'm so fortunate to be joined by Steven Lisa. I'm Steve is Citrix is Vice President of product for cloud and iot his products include Cloud workspace and our analytics design for all of those products and Steve. I want reduce whole resume, but Steve has an incredible resume going back through

many years at the Exxon and Oracle and Senior leadership position. So thank you for being here safe. And we have Lisa Baba Lisa is Cisco's privacy engineering architect, and I'm just going to read to From Lisa's a job Mission because it's really it's an ambitious one and it's and it's exciting one recent job is to embed data privacy and security controls. It's a Cisco processes applications and offerings part about Lisa will get into a little bit. Is that Lisa along with Jonathan Fox at at at the Cisco manages a really

sophisticated program around privacy engineering and for those of you who in your spare time, you've ever read the Privacy Engineers Manifesto that is sort of the Bible of the space and something that the the Privacy 10 minutes at Cisco manager. So thank you. Thank you. What I'd like to do is I would like to hand the very important clicker over to Steve and let We've talked about data at Citrix, but I'm going to frame it first. We live in a world now where 10 years ago. Nobody ever could have imagined

that our products would be so not just data-centric but metadata Centric there was increasing amounts of data and everything that we did what we didn't quite get at the time was all of the benefits and all of the risks that would be associated with data about data what it is that you do when you access something when you offend to Kate against assistant, when you travel around assistant when you come in from the internet and go out to the internet what it could tell about you what you're doing. What health

conditions you have what risks you posed and with that comes a series of very important decisions Steve and Lisa are uniquely positioned to talk about what our two companies are doing in the space. And then once we've gone a bit through what the two companies doing in this area will talk a little bit about the law will talk a little bit about what's too, some of the risk some of the challenges and and what we're all doing to try to get on top of that so Steve I hand you the mantle So let's talk a little bit about this and I think

fortunately the the keynote this morning set me up pretty well. So hopefully everybody got to see that but I think what you're seeing is from a corporate strategy more and more of what we're doing at Citrix pivots around the ability to manipulate big data sets and do Advanced analytics on them. And really we started down this road in a lot of ways less than three years ago. And we took a look at the trends that we're going out there seeing the early signs that analytics and AI were becoming much more Central to what

people were doing and we thought about what that might mean to us, right? We're not going to be coming analytics vendor and go compete with power bi from Microsoft in Tableau, and we weren't going to become an artificial intelligence vendor and sell you neural networks because people like Amazon and Microsoft are doing that. But we thought that was really a unique play given the amount of data that are products generate and really what this led to is US looking at this where we said there are these emerging AI machine learning platforms where we can actually use this

to do what we call understanding the work graph. What are people doing? Where are they doing it from? Why are they doing it? And this brings us to the idea of context and really bringing greater context what's going on which we can use in a whole lot of different types of application. One of the big applications is is computer security, you know, the big things people worry about when you start to house these big repositories of data is what if somebody gets it turns out one of the first things that you figure out how to use this technology for its how to better protect your

data and I was working with a customer relatively small Citrix customer. Set of auto dealerships few hundred employees, but they depend heavily on environment, but they had actually a set of other security Technologies. They had they had a commercial firewall a commercial antivirus package and the guy told me he got three hundred emails a day from his firewall, which probably most of which were some actual attempt of somebody to probe his perimeter and decide whether

they could attack him and steal all of his data on his customers data, but it actually hit reach the point where it's completely an actionable to him because the firewall was too dumb to understand the contacts and if you remember the slide Calvin put up this morning with you know, the big scary teeth, how do you know the difference between the big scary teeth and the cute puppy while it's more contacts, but you have to be smart to be able to look across that and take advantage of the bigger data set. So when you look at this from a security perspective, it's if people are going to get more

sophisticated at attacking us and that's going to include things like your traditional banging against the firewall on a very William Gibson ask hacker scenario all the way to the more it's called a mundane but maybe more Insidious types of user-centric hacking that goes on there with social engineering and trying to get people's credentials. You need more sophisticated ways to to handle those things. And so the first application that we built on our on our big data platform was user Behavior analytics and

we didn't build our platform as a security platform. We built it as an analytics platform. The first data analytics we decided to do is to help protect everybody stayed up until you look at all of those inputs that we have on the left side of the screen. Most of those have been there for years. If not, Decades from Citrix. We just mostly drop that date on the floor and now we're trying to help you make better use out of it. But in essence we can do better risk metering and help you decide what potentially real threats are on the flip side. Is it from security is about

productivity and it's about what we talked about this morning where people have too many apps. They don't get to use out of them for not getting their money's worth and it's frankly just too complicated and bonding everybody under it. So when we look at things like again Ai and Big Data, how do we get to a point where I can leverage those to just get much more intimate with my infrastructure? Why do I have to go open up a bunch of old web applications and dig around in HTML apps to ask for what I need and get what I need and tell something to do what I need to get done. And so these

Beasts of the promises of these technologies that were really going after as a company And I think you're alright. Is Peter says I'm the Privacy architect at Cisco and our Focus has been in the sense of where we fit into the world. We have move data for years and years and years my whole career at Cisco. I started I thought they was in the packet, you know, if it's just it's something I moved from left to right and I spent a lot of energy in that space But as I got into security, we really started focusing on how do you secure it and you

know again there in that. We looked at firewall and we looked at application security, but what we've really learned in this this new world is that it's really two pieces of the security that we focus on what they don't one is that it stayed in German. It's data-centric and number to it is people-centric because it now brings the data and the people together because of the things that that Steve is home. And you're trying to do you make boric happen. You're trying to make the united in the commercial area mean in the consumer. Hang yourself or educate yourself, but it's always between

a person and the data all of the stuff that we can get that is the context of that helps us make that better one of the things about it. Is that what that conductivity a lot of data in the past that has been siloed is no longer siloed. It was physically silent so I couldn't go and get Peters data because him by myself, but now I have that I have data generated from every part of my life be at the the house even my husband hasn't we got cameras everywhere with from the car from the from my school from work from

the community the cameras along the roads and now with the car talking about it's talking to me to got all these things moving forward the benefits we see or just amazingly across the board for us exciting and we know that it's coming but we got to protect it because of the endgame. To make us better not to make it's not to make the information better. We're really applying it so that communities and people will be better as they go forward. Should I can see this weekend Cisco like Centrix has really been focusing on all the stated that we get. Not only the the

content the valley of that data, but the context of that big data and we've applied it somewhat the same ways was applied it in our collaboration with our cognitive work. We've applied it in our data centers and meaning are networks how to build a better Network by looking at what's going on. We've applied it in environments that are off security and that has you say was your first bank for us. It was the very first area that we really brought David together and said, oh we can see more and we can actually let people know without giving away strategic data

or personal day that we can let you know. Someone's attacking in this area. And this is what the attack Vector looks like and now I can share that and you can put up a remediation before it happens to you. So that being predictive was really important to us. So we worked on that and then the 4th piece of this where we're really focusing on AI and ml is that running your own business. You know, how do we hire the right people for the new future. How do we work with a really good marketing and sales? And then how do I make sure that we are doing the right thing for employees and if

our customers as we go forward, so it's it's an interesting to A Time For Us data while I was telling Peter earlier cuz I've been sick so very long time 24 years that when we started they don't we weren't the processor but as we've moved into cloud and we've moved into iot we are the process for now and it's important to us to make sure we're doing the right thing for this data and that's where my world lives as Peter was talking about. Focus that we need to support this environment we don't want to slow down anyting we don't want to be the no we don't

need the cops, but we want to make sure that the date of that we're using has only four pieces that are important to us. One of those is that is quality that the date of you've got is has been updated and you're not as as my previous boss. If you don't hoarding data that you no longer need 73% of the data out there today is no longer valuable to a company or to regulations that's people with storing and recently doing a store does not that expensive anymore. But if you start doing Ai and ML on old data, you can get an old position the next piece of it for

us is that protection and my protection has to be broken apart both for what Cisco does but I'll get them for their customers are doing and we spend a lot of time with our accessibility to things are encryption of work. But it is growing and going faster and faster. So we spend a lot of energy but it's across our Ward but the group I'm in spends a lot of time building, and modules so that we can actually put it across all our products not just security products but private security and that's why I chose when I read Michelle's book in the Dolphins book. I read it over Christmas one year

my husband works for Christmas. And this is why this is why I'm in this space. I really truly believe that we have to his people be protecting ourselves but taking advantage of all these opportunities. So it's not that I won't share my data but share it for a value. Don't just give it away. And so that's where my privacy peace comes in that. We really focus on the regulations. But we also look at the real value of taking care of people and that you know, I want I don't want you to say no, but I want to be able to be very transparent about why I need the date of it. I'm

asking you to give me so that transparency is going to be Of our story. I'm really focusing on that area and making sure that we're not just taking care of give you the day to let me hide it from you and we do need that not just the content but the contact where is who's talking about? How long should we keep at all of those things become part of my engineering but I teach to my Engineers I teach to ourselves people. We really spend a lot of time with awareness because the first step for you to think about data is what's in your head now, it's what I code. So

that's really where we are. Play some Joyce Theater. So so before we get to to all the scary laws, let's let's let's talk a bit about how this works in practice and end and Lisa. I'll start with you. I know that you guys have built a really strong routine around how Engineers think about these issues when When developing products and when implementing products could you just walk us through a little bit of that that life cycle and and we're we're ownership lies for that. Do you view this? I'll put it this way. Do you

view you think about this community which is largely technical people. Do you view the ownership in the responsibility for these topics principal is residing with wonky policy guys like me now or in engineering where does it where who owns it actually build our products on that opportunity? What are team focus is on as part of operation? If you give him a framework that we can be consistent across things. So 12 years ago Cisco looked at what Microsoft was doing and put in our secured about my life cycle. And so we started building in put security

into everything from you know your phone to the data center. And then as we've added an added we've moved into it. We had to add our Cloud story. We had to work with our services teams. We booked work with any of our development teams that are building buying or partnering to get a solution out the door as well as in a price for our own data has to be taken that way it taken care of and what we've done is when we looked at Price engineering it can be easily put on top of that secure development life cycle design plan design develop verify

and then if it's if we're running it either we launch it out. So it goes on to a customer's own friend or we put it into the Operational part of what we do and we have a whole set of requirements and not space. The nice thing about data is that it fits in that world the bad thing about data it's not limited to that world and it's really important that now is fishing. We start looking at Ai and ML and a delay that that data where I used to live within our WebEx or within a routering software can now I'll be taken out and looked out and use differently and that's

where I've had to teach my Engineers to think outside the box, you know, they worked really hard to understand that they need an ownership of not just the product of their data, especially when we're processing. Steve Lisa just hit on three very important related topics data legs ML and I I'm going to take them in reverse order because I think you start start with the data Lake and then you build up from there you or your business necessarily now that we're doing Cloud now that we're doing Advanced

analytics for variety of topics, right for for for nacho security pro performance is built on that concept of the day Lake how has that transform the way that you and your team think about the design ground-up of our products. But so first off when when we talked about Citrix Cloud, the original premise of Citrix cloud is It's stories very little data. All of you are worried about running your apps and desktops and traditionally people do that in their own

Datacenter. They own the infrastructure the delivery controllers everything as well as the servers running those applications. So we started by offering Services where you can take some of the infrastructure and run it in the cloud, but can keep your applications right where they are and I get questions constantly about how can I view all work at companies that have their own security and privacy policies. How can I trust you with all this data? And we all can get down to real brass tacks. We have to really draw it out. What date are you

worried? You're trusting me with cuz I don't know anything. We're not copying your directory. I don't have your passwords. It's it's really a command-and-control infrastructure for efficiently running event at Farm doesn't know about your user doesn't know about your apps. Please start from that base of my the thing that makes it easier for me to sell to my customers as making sure that I know nothing as a as a base going in position. And then we take that position very seriously, then though we say now I can add value in places. If you do choose to

give me more data and not really give it to me, but let me process it on your behalf is a better way to say that I'm so as we plug these Services into the Citrix analytics framework and that Citrix analytics framework includes the data Lake you opt into particular kinds of services and that's going to take particular kinds of metadata out of your system and get them stored so that we can help you process that and help make it actionable. So so one thing I know you and I worked on this together and it's been become a pretty consistent theme across our

teams. We started to build these data governance documents, right? We describe all of the metadata that we have access to we describe where are pops. Where are various opportunities around the world to store that data Arc. What has that done has that has that helped with your cell cycle. Does that make a difference to the to the trust equation the way that customers think about what they're doing? So I'd say it's it's required but not always sufficient. I'd say that a lot of the decision that people make on these are first order emotional decisions of the that's scary. I'm

not ready to go there yet and people need to be in a position where they're wanting that new value that you can bring to them where they're willing to explore. Okay, what what risk am I at to take that off? And then what you get into is like let's get out the documentation. Let's look at what's moving what's being stored where and who has access to it and you start to work through that and it's we see people go through Cloud Transformations. These are the same questions that people ask when they're buying Salesforce or concur or you know doesn't have to be an artificial in

Collagen solution it's anywhere that they're going to be taking their data and and storing it their employees date of their customers data. If serious real questions about that, so the ability to have really clear documentation about that that you have access to and that your team's can explain to people that's that's a base going in condition and you mentioned another item and I'm going to ask each of you about this Steve you framed it in terms of people being able to make granular control decisions talk talk about that talk about how that gets built into the product talked about how

important that is to to customers in there in their decision-making. I think people. People don't just want to know what types of data are being shared they'd they need to know they're obligated to know right on behalf of their company on behalf of their customers on behalf of their employees. And so I don't think people want to be able to inspect every packet but they want to know what classes of data are being moved where they're being stored how they're being stored in who has access to that for what reasons so it's not so much

that I need to know, you know kind of the status of every field but it's you know, what what classes of information are being stored and process than and why why do you need that? And how are using it? What are your thoughts on where we see exactly the same thing, because when it really comes down to it, it's a risk decision of what you're doing with your data and no more information you have and making that risk decision the better it is for some Time to know that yes, I can trust you two to take care of me

cuz you're being very transparent about what you're doing. You're not going to do something. I'm done comfortable with and if you are at your door open to hearing what I need you to hear and so what we've done is the same concept week that we put out what we call her privacy data sheets and the flow of where data is going so that it can be seen as part of the decision-making and it's actually been done. We did some surveys out on privacy and it really actually shrinks the decision-making process for them. I mean going from Like Moths To The Winx today's something some cases because

The other piece of it a mini deep come and ask us about it. Even before we did that data sheets and we had to go. Where is that data? Who's got the who's got this information about what we're doing. And now that we have a nice consistent way of doing the inventory the assessment and building these hate these these this transparency and to it. We are now being consistent across the board. And again, if that's part of what we've been focused on is as our path to getting there. So I'll just make her plug while while Lisa mentions that she mentioned that the research that Cisco's put out

two months ago. You put out your annual privacy report which which goes into Justice topics. You mind spending a moment on that we did what we talked about 3,000 stores. They didn't know it was Cisco we went through what you know that that type of survey but asking a couple of things one is yep, how how how do you see yourself in the To remodel of taking care of data and privacy and then what are the things that are slowing you down in this area? And then how how you know, how does it affect your

decision-making guess again? We know we have to use data. We don't get to just go hide it or block it down. We want to use it. But we need to do it in a explicit risk decision-making process and that that we were able to actually see in across the countries. I am back India love that. They were number one in maturity and from our thing that me and we got so much things to put into their into their marketing because they were like to see how old is transition has gone from it

being just a pure certification a regulation to truly be in a value statement as part of the business and I do think it's because of where we've been moved. Leaving out processing to I mean again, I can trust that. I have my flash drive. But as soon as I put it into the cloud who's got access to it and knowing that this is a secure and understand who I want to share it with accessible with space becomes a really important piece of the story. So so let's let's turn up the volume a little bit, right? This is this is the the really scary slide for those of you who were here at Cinergy

last year. We had Synergy. I guess it was about a week before the gdpr went into effect. Right and the GDP or marked for Faraz. I'm sure for Cisco for many of you it Mark this transformative moment when privacy was no longer just a bit of you know, privacy is what you make of it and you do some registrations with authorities and then you worry about your works councils. It really became a very tangible item for all of us are required for The first time comprehensively across a large group of companies the notion of accountability

right that you had to trace data up and down the stack. You need to be in charge of your vendors you needed to have auditable processes and you needed to be transparent about what you're doing, right you now start to say California consumer Privacy Act is coming online in January 2020. Get ready everybody. We have a Washington state law that's going into a fact we have Vermont and Maryland in the state of New York and a bunch of others are concerned privacy laws. And so a few things come out of that and then I'll I'll ask each of you about at

the first thing is we're on stage talking about this right five years ago, its energy or Cisco live. I don't think this would have been a topic right hook but we're on we're on stage talking about this, but the second is it how it is. For our customers for our communities a unique set of challenges when they ask each of you about that this move to privacy laws that are more accountability based with a lot more controls that then flow all the way through to engineering and I T has that help or hurt

what you do and what we offer safe. So I think one of the things that they're being a set of regulations out, there is that it actually did some extent give his people inside your company care about secure data security and data privacy a platform to stand on if your top-level Executives don't see a profit motive in it than General it would get ignored and even if your top-level executive don't understand the enemy out of GDP are the California consumer,

you know, they're like I have to deal with this they can do the they can do the math very simply on the back of a napkin about how much it's going to cost them if they're not complying with gdpr. And now you have the point where I mean, I think we pretty much hired Peter because gdpr was coming into perspective. We didn't have a privacy Digital Risk officer before and the company decided that it needed one and so It means that you got basically a level of attention. They're like below that I think you're still very much in a place where you was customers need to make decisions about

vendors that you think I have the right cultures and the right behaviors that they're going to work with you on these things because the laws the laws are not specific enough and sophisticated enough or flexible enough to really enforce how individual companies actually handle their data. I agree with Steve and the big thing for us that we've had to so that we can actually Implement is to take this whole 350 and build them into our policy. So, you know in the sense that Jean-Pierre tends to be kind of that consistent highest bar. We've been able to establish that but when I work

with my team's I don't go your gdpr now compliant or working. I got your our privacy policy compliant and that allows us to change it up. If something happens in the world tomorrow so that we can continue to work with the framework that we have. Where is it by make it just a gdpr thing and that doesn't stop us that we had to do binding corporate rules and that we had to get a data Protection Officer. And then we had a lot of programmatic things that we've wrapped into gdpr support and we're not we're not going to get rid of that but we have had taken that whole

concept and now is not Engineers they hate for me to say this, but this is my source of Truth. This is the policy that Thunder and that policy needs these requirements and these requirements me with this type of privacy enhancing processes or Technologies as well as awareness so we can walk want one thing to add to that is I'm based out of the Citrix office in California and I do a lot of work with the What's called the Silicon Valley leadership group and they asked a few of us to go to Sacramento. Which is the capital of California and talk to the legislature actually turned out

one of the things are working on at the time with the California consumer data protection regulations, but they actually asked us to come up and talk about iot. They didn't understand it and they wanted some people from the industry. So we went with the Stanford professor and a couple different people commercial industry had some experience in we got a group of 30, you know Senate and assembly staffers. And the first thing they said is be very gentle were mostly English Majors. We don't understand any of this stuff. Pain in the mint in the most genuine possible way so

you can you have to know who's writing these regulations. These are not privacy experts. They're not computer experts think they're not networking experts. They don't know what the word metadata means. So most part I'd say it that people like, you know, the people that I met that Dale had the best of intentions they would you know, they weren't corrupt politicians. They were just literally were trying to figure out the right thing to do for our constituents. And would you please help us understand this but you're you're not in the position where you should be

depending on those regulations to Tattoo they're there to put this sort of minimum bar to put all of us on notice that we have to care about this California had a I had a unique circumstance write a guy by the name of all put together a state referendum and it looked like it was going to pass the legislature out a week to consider a bell so I don't envy their position. But let let let me ask you this. So we are at this moment where we've had the GDP are we now have some Tamil we have all the states where the federal government us concerning Privacy Law. We have countries around

the world that have not had strong privacy laws in the past that are now passing ever more stringent laws are considering ever more stringent laws. I'm going to start with yulisa. What's what's the what's the great opportunity? And what's the thing that could be on the horizon? That just scares The Living Daylights out of you. Only mascara first, let's scare is that we're going to get to a point that they expect each of us to consent to every time we use a piece of data and I want to be under the legal basis. I want to be able to set to

know. This is your and I believe AI by the way will help me know the white lines the guardrails you want to live in I don't want to have to ask every time because the customer experience. Okay. Let me just be honest. None of you guys have ever read your privacy notices every time that if you have it take 72 hours of reading privacy notices for normal people in the workspace. I don't want to live in that world. I want consent to be needed when it's needed but legal basis the contracts with public interest these things need to be well understood in you so that's my scare. Is

that How to get because it's a great term it's going to get dropped into the requirements of the law of it and works and work and not the other piece of it that I'm most excited about. Is that as we get to know what type of data we have and we understand quote who owns it or who stewarding it and who's taking care of it. We we really see that value and we start seeing all these interesting things that you could do with that data that would make each of us healthier or a happier or more pack more money or whatever it is. That success means to you to everybody

in this room in the data age. Now where in that information agent. It's an area that when I started Have I Told Peter that I grew up in North Carolina on a dirt road with my family I learned about privacy very early cuts. My family the four houses had a we had a party line and my grandma picked up the phone for every call. So you could add to be really careful about their privacy and what you said. I also grew up where there was no data the closest library with 17

miles away and we had three TV stations and one of them was not in BC was that kind of stuff when people told me I have never so that we have the access to all this data and that we can use it to our betterment. I'm so excited. I mean, that's why I think privacy so important and that's why I think data protection. So important was also the AI and ml that you can pull a lot of information and maybe make the amazing again. Sorry. I cannot get on my soapbox. So

it's okay by my biggest fear of this from a regulatory point of view is into the country's bitter. Forward-thinking and good about this people who respect things like freedom and then there are countries that I worry about and I think bottom line artificial intelligence is going to be the biggest disruptor everything in that goes from commercial productivity to Military and defense ever and I'm including nuclear weapons and everything else in that. And the reason I say this is when you think about how fast this face is about to start

to move. I did my first work in AI in the 90s and we did some stuff that was kind of cool. But the end of the day didn't have enough computing power to solve the problems. We wanted to solve 10 years ago. When I was at Sun we were working on a project building one of the largest supercomputers in the world, we built the 64000 core supercomputer for the University of Texas Ranger at the University of Texas, and it was one of the first petaflop class machines. Less than 10 years later. I just saw machine came online and its measured in exaflops. So

it's people tell you more supplies flowing down. It's not it's slowing down on one very fixed Vector about how fast you can run a single red inside a piece of silicon things like gpus. My daughter was Bitcoin mining in my garage last year. She had more flops in my garage than that supercomputer that cost 50 million dollars at the University of Texas. So this is coming in this is very real my car drives me to work everyday now, so what I'm worried about is we do something where Some politicians with the best of intentions create some restrictions about

how use artificial intelligence and how we develop it that puts the Free World at an anti-competitive risk and that we wind up with other parts of the world developing this faster than we do. So I do think that we need to put a lot of guardrails around this we all need to be conscious of this and we've got to be looking hard at it. But fundamentally we have to be running hard at this because this is this is the technology of the century prerogative and I'll give mine as well my biggest

fear at this point and it and it's a bit of a riff on what stable saying is we have these incredible opportunities in front of us. We have so many good uses we can make of data and of metadata we can advance Healthcare we can do internet connected. Games that not only help with health care, but then can push data sets to create ever faster Solutions health problems. We can deal with anti-fraud anti-money-laundering with trading arms we can deal with security of networks and security of data. The fear is that the

laws will come along trying to solve a very limited problem date of brokerage and social media and we will all wind up in that space Here's My Hope and I think it may be an antidote to and it's something that that that Steve and Lisa were talking about earlier, which is for the first time I think the last 18 months we all have on the tips of our tongues that sort of a new expression but it's now and why do you say privacy and Hansen Technologies? We have the ability, right? And this is something you do when designing products this something you do in overseeing

product. We have the ability to give people more granular choice. When you give people more information you give them or granular choice. life isn't so scary anymore, right and that in a way brings us home to Trust and I think really that is where if you look at the at the at the binding thread between our companies if I may it's in that it's in that trust equation. So please if you wouldn't mind speaking of mom and about about your Trust equation with customers that would be great.

Which is what you're seeing here covers our whole thing of security and Trust of it talks about how we put security into our products that it talks about what we did for gdpr. It talks about these data sheets reference earlier, but really and what was important to us about this is that we start looking at this holistically that we don't have these pieces and parts and that was how we started with security and that's how we're stretching our data is to look at it across the board as though it's there and if you have any questions,

you can ask me questions. They are or catch up with me cuz I'm both ways is really excited about the trust piece of and that's why we think privacy and data protection really fits in the truck part and I'll close by saying we've done we've done much the same way for those of you who have not seen it go out take a For the Citrix trust Center, we put all of our product and service not just the documentation for the products and services. But the specific security documentation privacy policy compliance documentation certifications. I'm we have places to

report issues and incidents. We have a special news channel on there for things that are coming out involving our products and services and it is part of the the entire trust relationship that we're trying to create with our customers. So with that I would like to thank both of you very much. This has been wonderful and I appreciate you taking part. Bank of America contact so we have one minute and 57 seconds. We have time for one question. Does anyone have a question? No,

okay. Yes. I am so so I'm going to answer a little bit of a different way and I'll let you guys at edges. I think 50 years from now all of the devices that are connected to us are going to do it for us. I think we're going to probably move a little bit further in that direction. It's going to be more curated. We're going to have the ability to make more choices about how it works. We need a little bit smarter about the data that we put out there but I think this is a train that's down a track. I think the difference is going to be we're all going to be putting a lot of data in the cloud there

going to be a gas that we let Facebook own the data that we gave them. I think that's the place too. And I do think if you watch all the Chinese that our children are getting about being more specific. I mean, we kind of allow people Facebook grow up with a lock with no roof and it started with people who are younger who thought it's okay to tell everything but is it is you're bringing up more and more of this digital-native child. They're being told don't give away. All of your information doesn't stop some people. But again, that's their decision. That's the important part of this is

it when we do collaboration and we do social media, we have to understand you have the right to put it up there. We also have the responsibility. Terrific. Thank you all very much for coming. Have a wonderful day XR bag.

Cackle comments for the website

Buy this talk

Access to the talk “Citrix Synergy TV - SYN145 - Privacy, security, data and trust: a look at the future of data risk...”
Available
In cart
Free
Free
Free
Free
Free
Free

Access to all the recordings of the event

Get access to all videos “Citrix Synergy Atlanta 2019”
Available
In cart
Free
Free
Free
Free
Free
Free
Ticket

Interested in topic “Software development”?

You might be interested in videos from this event

September 28, 2018
Moscow
16
129
app store, apps, development, google play, mobile, soft

Buy this video

Video

Access to the talk “Citrix Synergy TV - SYN145 - Privacy, security, data and trust: a look at the future of data risk...”
Available
In cart
Free
Free
Free
Free
Free
Free

Conference Cast

With ConferenceCast.tv, you get access to our library of the world's best conference talks.

Conference Cast
525 conferences
20515 speakers
7489 hours of content