Remove Accountability Remove Artificial Intelligence Remove Seminar Remove Technology
article thumbnail

Cybersecurity for the Public Interest

Schneier on Security

It's an impassioned debate, acrimonious at times, but there are real technologies that can be brought to bear on the problem: key-escrow technologies, code obfuscation technologies, and backdoors with different properties. Public-interest technology isn't new. We need public-interest technologists.

article thumbnail

Cybersecurity for the Public Interest

Schneier on Security

It's an impassioned debate, acrimonious at times, but there are real technologies that can be brought to bear on the problem: key-escrow technologies, code obfuscation technologies, and backdoors with different properties. Public-interest technology isn't new. We need public-interest technologists.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Evolving Role of Cyber Insurance in Mitigating Ransomware Attacks

SecureWorld News

Lack of established procedures for estimates During the underwriting procedure , the issuer of insurance will take into account the risks associated with your business. One significant innovation is the use of artificial intelligence (AI) and machine learning (ML) in risk assessment processes to help better guide policy underwriting.

article thumbnail

CISSPs from Around The Globe: An Interview with Theresa Grafenstine

CyberSecurity Insiders

House of Representatives and her journey to becoming Chief Auditor for Global Technology at Citi. I am the Chief Auditor for Global Technology at Citi. I am the global chief auditor for technology. One facet of my job is a lot of heavy application-type of technology reviews. What job do you do today? I did two things.