What are the most important ethical considerations relevant to cyber security management?

“If we’re relying on laws and regulations to tell us what to do and how to do it, it’ll take too long.”

Ahead of teissR3 | Resilience, Response and Recovery Online Summit 2020, Sarah Armstrong Smith, Chief Security Adviser, Microsoft, talks to Jeremy Swinfen Green about ethical considerations in cyber security management and artificial intelligence.

teissR3, taking place 15th – 24th September 2020, is the leading event focusing on how you improve your organisation’s cyber resiliency and adopt best-practice in incident response and crisis management in a post-COVID-19 world. Register your place by clicking here.

Video transcript:

What are the most important ethical considerations relevant to cybersecurity management?

Well, I think what we’re seeing right now as we talked about is the pace of change through digital acceleration, innovations, those type of things. And just like we saw GDPR, if we’re relying on laws and regulations to tell us what to do and how to do it, it takes too long. So actually we’ve all got to working together to have a code of practise regarding doing the right thing because it’s the right thing to do. And what I would highlight though is in our key area when we talk about cybersecurity is around artificial intelligence, and in particular when we’re talking about cognitive intelligence.

So having something has the ability to think for itself, particularly when we start introducing that into the world of robotics and automation. There’s a lot of ethical dilemmas there with regards to how we build and create some of these services. Technology companies and consumers all have a role to play in making sure that everything that we design and build is done for the right reasons, in the right way, with the ethical consideration first and forefront of what we do.

Copyright Lyonsdown Limited 2021

Top Articles

Is your security in need of an update this Cybersecurity Awareness month?

Cyber security experts tell teiss about the evolving threat landscape and how organisations can bolster their cyber security defenses

A new case for end-to-end encryption

How a hacker group got hold of calling records and text messages deploying highly sophisticated tools that show signs of originating in China

Telcos in Europe put muscle behind firewalls as SMS grows

Messaging is set to be one of the biggest traffic sources for telcos worldwide prompting them to protect loss of revenue to Grey Route practices 

Related Articles

[s2Member-Login login_redirect=”https://www.teiss.co.uk” /]