SlideShare a Scribd company logo
If data will be all over the
space, who will take care
of protecting it
Rosario B. Casas
@rosariobc
@vramericas
Julia Costin
@ITGirl_ITWorld
@Americas_cyber
STARTING THE CONVERSATION
1
Cyber State
Rosario B. Casas ( www.vramericas.com): If data will be all over the space, who will take care of protecting it
TOMORROW’S DIGITAL REALITY
DIGITAL OR PHYSICAL WORLD
“Digital and physical worlds collide as
augmented reality moves from science fiction
into everyday consumer and business life,
opening up new opportunities for digital
marketers.”
TALENT GAP
The demand for cybersecurity professionals over the past five
years grew over 3.5 faster than the demand for other IT jobs and
about 12 times faster than for all other jobs.
Cybersecurity is increasingly vital as more and more people are
connected by the Internet, businesses are dependent on cloud-
based and big data services, and governments are facing
increased web-based attacks related to terrorism, espionage or
other areas.
COLLABORATION
TALENT GAP
According to (ISC)² Cybersecurity Workforce Study 2018
2
Challenges
EARLY MOMENT
• Quick prototyping and product release
• Cyber experts waiting for a mature industry to define
standards and policies
• “they have not looked at the security/privacy issues
in VR/ AR, as the technology has not matured yet
and the use of technology is not widespread
amongst consumers”
DATA COLLECTION
• Legitimate users may be unaware that their personal
data may have been captured and, then, leaked
PERSONAL DATA AND
PREFERENCES
• Location, social ties, verbal communication, product
preferences, sensitive information, etc.
• Physical daily environment and interactions
NON VERBAL DATA
• with VR - companies collect non-verbal behavior
(user’s posture, eye-tracking, gestures, facial
expressions, etc.)
*** spending 20 minutes in a VR simulation leaves
about 2 million unique recordings of body language
NON VERBAL DATA
What can Non-Verbal behavior tell us about a person?
• Mental State
• Health Information
• Emotions
• Learning behavior - determine future behavior
• Body language - data can be used to estimate students’
test scores, determine emotions, etc.
BIOMETRIC IDENTIFIERS
• Data generated by automatic measurements of an
individual’s’ biological characteristics, such as fingerprint,
voiceprint, eye retinas, irises, or other unique biological
patterns or characteristics that can be used to identify a
specific individual.
3
Take away
• Digital blackmail
• Hackers access to this data could lead to digital replicas/
digital clones of you being created and used to
impersonate you for malicious reasons.
• Many times, VR/AR systems haven't implemented
encryption for network connects
• Many VR/AR systems rely on third-party apps or
integrations -
TALENT GAP
ISACA Info graph State of Cybersecurity 2019 Resources and Threats.
COLLABORATION FOR THE
FUTURE
QUESTIONS
Rosario B. Casas
@rosariobc
@vramericas
Julia Costin
@ITGirl_ITWorld
@Americas_cyber

More Related Content

PPTX
Technologies slideshare
Dena Selbe
 
PPTX
Software Security For DevOps And Continuous Deployment In The Cloud
InterCon
 
PPTX
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...
Segun Ebenezer Olaniyan
 
PDF
ACS Talk (Melbourne) - The future of security
siswarren
 
PPTX
The Shift from Social Network Security to the Social IOT Security
Dr. Mohamed Torky
 
PDF
The shift from social network security to the social iot security
Aboul Ella Hassanien
 
PPT
Digital Lifestyle Trends and Threats
Andrew Wong
 
PPT
Chapter 3 ethics and privacy
mrzapper
 
Technologies slideshare
Dena Selbe
 
Software Security For DevOps And Continuous Deployment In The Cloud
InterCon
 
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...
Segun Ebenezer Olaniyan
 
ACS Talk (Melbourne) - The future of security
siswarren
 
The Shift from Social Network Security to the Social IOT Security
Dr. Mohamed Torky
 
The shift from social network security to the social iot security
Aboul Ella Hassanien
 
Digital Lifestyle Trends and Threats
Andrew Wong
 
Chapter 3 ethics and privacy
mrzapper
 

What's hot (20)

PPTX
Extending CyberSecurity Beyond The Office Perimeter
Veriato
 
PDF
Wearable Technology for Enhanced Security.
Dr. Michael Agbaje
 
PDF
GuardianGabriel
Brian Ethridge
 
PPTX
Itgs
tpgml4546
 
PDF
Ethics for IT Professionals
Prof. Erwin Globio
 
PPTX
IT Ethics
Keith Putnam
 
PPTX
Isc(2) eastbay-lenin aboagye
Lenin Aboagye
 
PDF
Security in Internet of Things(IoT) Ecosystem
rahulbindra
 
PPTX
Cyber security and Homeland security
ADGP, Public Grivences, Bangalore
 
PDF
Cyber ethics
Mohit Dholakiya
 
PPTX
Mobile Computing: QR Codes & Cloud Apps
ayoungkin
 
PPTX
ThingsConAMS 2017 - Mirko Ross - Internet of Shit Fails
ThingsConAMS
 
PPTX
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
Dataconomy Media
 
PDF
The Basics: Reviewing & Producing ESI Evidence
Aaron Vick
 
PPTX
ITGS
luz_agreda28
 
PDF
Mozilla wot dwika v5
Dwika Sudrajat
 
PPTX
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
Rushabh Shah
 
PPTX
Keeping up with the Revolution in IT Security
Distil Networks
 
PPT
Cyber and ethics(cyber crime and many more topics)
Rakshit Sharma
 
PDF
HIPAA Compliance For Emerging Technologies
Synerzip
 
Extending CyberSecurity Beyond The Office Perimeter
Veriato
 
Wearable Technology for Enhanced Security.
Dr. Michael Agbaje
 
GuardianGabriel
Brian Ethridge
 
Itgs
tpgml4546
 
Ethics for IT Professionals
Prof. Erwin Globio
 
IT Ethics
Keith Putnam
 
Isc(2) eastbay-lenin aboagye
Lenin Aboagye
 
Security in Internet of Things(IoT) Ecosystem
rahulbindra
 
Cyber security and Homeland security
ADGP, Public Grivences, Bangalore
 
Cyber ethics
Mohit Dholakiya
 
Mobile Computing: QR Codes & Cloud Apps
ayoungkin
 
ThingsConAMS 2017 - Mirko Ross - Internet of Shit Fails
ThingsConAMS
 
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
Dataconomy Media
 
The Basics: Reviewing & Producing ESI Evidence
Aaron Vick
 
Mozilla wot dwika v5
Dwika Sudrajat
 
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
Rushabh Shah
 
Keeping up with the Revolution in IT Security
Distil Networks
 
Cyber and ethics(cyber crime and many more topics)
Rakshit Sharma
 
HIPAA Compliance For Emerging Technologies
Synerzip
 
Ad

Similar to Rosario B. Casas ( www.vramericas.com): If data will be all over the space, who will take care of protecting it (20)

PPTX
How Can Policymakers and Regulators Better Engage the Internet of Things?
Mercatus Center
 
PPTX
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Adam Thierer
 
PDF
Privacy Exposed: Ramifications of Social Media and Mobile Technology
Tom Eston
 
PPTX
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
Adam Thierer
 
PDF
Big Data and Information Security
ijceronline
 
PDF
Lessons in privacy engineering from a nation scale identity system - connect id
David Kelts, CIPT
 
PPTX
Designing for Privacy NY Studio—10/04/21
Robert Stribley
 
PDF
Research on Privacy Protection in Big Data Environment
IJERA Editor
 
PDF
Research on Privacy Protection in Big Data Environment
IJERA Editor
 
PPTX
BYOD - Bringing Technology to work | Sending Data Everywhere
Jim Brashear
 
PPTX
Privacy Implications of Biometric Data - Kevin Nevias
Kevin Nevias
 
PPTX
Putting data science into perspective
Sravan Ankaraju
 
PPTX
Internet of Things TCLG Oct 23 2014
Lisa Abe-Oldenburg, B.Comm., JD.
 
PPTX
IoT & Big Data - A privacy-oriented view of the future
Facundo Mauricio
 
PPTX
Iot privacy vs convenience
Don Lovett
 
PDF
A Framework for Securing Personal Data Shared by Users on the Digital Platforms
ijcncjournal019
 
PDF
A Framework for Securing Personal Data Shared by Users on the Digital Platforms
IJCNCJournal
 
PDF
A FRAMEWORK FOR SECURING PERSONAL DATA SHARED BY USERS ON THE DIGITAL PLATFORMS
sandromathew616
 
PDF
A Framework for Securing Personal Data Shared by Users on the Digital Platforms
ijcncjournal019
 
How Can Policymakers and Regulators Better Engage the Internet of Things?
Mercatus Center
 
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Adam Thierer
 
Privacy Exposed: Ramifications of Social Media and Mobile Technology
Tom Eston
 
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
Adam Thierer
 
Big Data and Information Security
ijceronline
 
Lessons in privacy engineering from a nation scale identity system - connect id
David Kelts, CIPT
 
Designing for Privacy NY Studio—10/04/21
Robert Stribley
 
Research on Privacy Protection in Big Data Environment
IJERA Editor
 
Research on Privacy Protection in Big Data Environment
IJERA Editor
 
BYOD - Bringing Technology to work | Sending Data Everywhere
Jim Brashear
 
Privacy Implications of Biometric Data - Kevin Nevias
Kevin Nevias
 
Putting data science into perspective
Sravan Ankaraju
 
Internet of Things TCLG Oct 23 2014
Lisa Abe-Oldenburg, B.Comm., JD.
 
IoT & Big Data - A privacy-oriented view of the future
Facundo Mauricio
 
Iot privacy vs convenience
Don Lovett
 
A Framework for Securing Personal Data Shared by Users on the Digital Platforms
ijcncjournal019
 
A Framework for Securing Personal Data Shared by Users on the Digital Platforms
IJCNCJournal
 
A FRAMEWORK FOR SECURING PERSONAL DATA SHARED BY USERS ON THE DIGITAL PLATFORMS
sandromathew616
 
A Framework for Securing Personal Data Shared by Users on the Digital Platforms
ijcncjournal019
 
Ad

More from AugmentedWorldExpo (20)

PDF
Bill Meyer (Virtual Science Center): Turning Kids on to STEM by Letting Them ...
AugmentedWorldExpo
 
PDF
Nick Klingensmith (Microsoft): Increasing Immersion with the MR Lighting Tools
AugmentedWorldExpo
 
PDF
Rokid: Design a seamless solution for AR glasses
AugmentedWorldExpo
 
PDF
How AR is Transforming the Online Retail Experience
AugmentedWorldExpo
 
PDF
Chloe Doyeon Kim (MAXST): The Current and Future State of MAXST Platform
AugmentedWorldExpo
 
PDF
AWE USA 2019: Owning Augmented Space
AugmentedWorldExpo
 
PDF
Victor Sun (Shadow Creator): How to turn Mixed Reality “headset” into “glasses”?
AugmentedWorldExpo
 
PDF
Chris Pickett (DigiLens): XR is Hard: Here’s Why
AugmentedWorldExpo
 
PDF
Antti Sunnari (Dispelix Ltd): Full-color, single-waveguide near-eye displays ...
AugmentedWorldExpo
 
PDF
Jian Liang (HiScene): AR for Industry in China: From Concepts to Real Applica...
AugmentedWorldExpo
 
PDF
Augmented reality meets Television -Ellen DeGeneres' Game of Games AR App
AugmentedWorldExpo
 
PDF
Jennifer Cook (Dreamscape Immersive): Dreamscape Immersive Presentation
AugmentedWorldExpo
 
PDF
AWE USA 2019: 2 Partners sharing 1 vision for smart operators
AugmentedWorldExpo
 
PDF
Phil LaFond (Bosch Automotive Service Solutions Inc.): Bosch Technical Traini...
AugmentedWorldExpo
 
PDF
Scott Montgomerie (Scope AR): AR’s Influence on the Workforce of Tomorrow: Jo...
AugmentedWorldExpo
 
PPTX
Hugo Swart (Qualcomm, Inc.): How 5G, Distributed Processing and Technology Ad...
AugmentedWorldExpo
 
PDF
Valentin Heun (PTC): One Reality - A 3rd generation AR User Interface
AugmentedWorldExpo
 
PDF
Anton Ebert (Siemens Healthcare): Challenges and approaches on integrating a ...
AugmentedWorldExpo
 
PDF
Sarah Hill (Healium by StoryUP Studios): Healing Stories Powered by Biometrics
AugmentedWorldExpo
 
PDF
Iva Leon (ARVR Women and Allies): Building community with social VR
AugmentedWorldExpo
 
Bill Meyer (Virtual Science Center): Turning Kids on to STEM by Letting Them ...
AugmentedWorldExpo
 
Nick Klingensmith (Microsoft): Increasing Immersion with the MR Lighting Tools
AugmentedWorldExpo
 
Rokid: Design a seamless solution for AR glasses
AugmentedWorldExpo
 
How AR is Transforming the Online Retail Experience
AugmentedWorldExpo
 
Chloe Doyeon Kim (MAXST): The Current and Future State of MAXST Platform
AugmentedWorldExpo
 
AWE USA 2019: Owning Augmented Space
AugmentedWorldExpo
 
Victor Sun (Shadow Creator): How to turn Mixed Reality “headset” into “glasses”?
AugmentedWorldExpo
 
Chris Pickett (DigiLens): XR is Hard: Here’s Why
AugmentedWorldExpo
 
Antti Sunnari (Dispelix Ltd): Full-color, single-waveguide near-eye displays ...
AugmentedWorldExpo
 
Jian Liang (HiScene): AR for Industry in China: From Concepts to Real Applica...
AugmentedWorldExpo
 
Augmented reality meets Television -Ellen DeGeneres' Game of Games AR App
AugmentedWorldExpo
 
Jennifer Cook (Dreamscape Immersive): Dreamscape Immersive Presentation
AugmentedWorldExpo
 
AWE USA 2019: 2 Partners sharing 1 vision for smart operators
AugmentedWorldExpo
 
Phil LaFond (Bosch Automotive Service Solutions Inc.): Bosch Technical Traini...
AugmentedWorldExpo
 
Scott Montgomerie (Scope AR): AR’s Influence on the Workforce of Tomorrow: Jo...
AugmentedWorldExpo
 
Hugo Swart (Qualcomm, Inc.): How 5G, Distributed Processing and Technology Ad...
AugmentedWorldExpo
 
Valentin Heun (PTC): One Reality - A 3rd generation AR User Interface
AugmentedWorldExpo
 
Anton Ebert (Siemens Healthcare): Challenges and approaches on integrating a ...
AugmentedWorldExpo
 
Sarah Hill (Healium by StoryUP Studios): Healing Stories Powered by Biometrics
AugmentedWorldExpo
 
Iva Leon (ARVR Women and Allies): Building community with social VR
AugmentedWorldExpo
 

Recently uploaded (20)

PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
PDF
This slide provides an overview Technology
mineshkharadi333
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
Shreyas_Phanse_Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
SHREYAS PHANSE
 
PDF
Test Bank, Solutions for Java How to Program, An Objects-Natural Approach, 12...
famaw19526
 
PPTX
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira Júnior
 
PDF
Google’s NotebookLM Unveils Video Overviews
SOFTTECHHUB
 
PDF
agentic-ai-and-the-future-of-autonomous-systems.pdf
siddharthnetsavvies
 
PDF
CIFDAQ's Teaching Thursday: Moving Averages Made Simple
CIFDAQ
 
PDF
Building High-Performance Oracle Teams: Strategic Staffing for Database Manag...
SMACT Works
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
DOCX
Top AI API Alternatives to OpenAI: A Side-by-Side Breakdown
vilush
 
PPTX
The Power of IoT Sensor Integration in Smart Infrastructure and Automation.pptx
Rejig Digital
 
PPTX
Smart Infrastructure and Automation through IoT Sensors
Rejig Digital
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
madgavkar20181017ppt McKinsey Presentation.pdf
georgschmitzdoerner
 
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
This slide provides an overview Technology
mineshkharadi333
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Shreyas_Phanse_Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
SHREYAS PHANSE
 
Test Bank, Solutions for Java How to Program, An Objects-Natural Approach, 12...
famaw19526
 
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira Júnior
 
Google’s NotebookLM Unveils Video Overviews
SOFTTECHHUB
 
agentic-ai-and-the-future-of-autonomous-systems.pdf
siddharthnetsavvies
 
CIFDAQ's Teaching Thursday: Moving Averages Made Simple
CIFDAQ
 
Building High-Performance Oracle Teams: Strategic Staffing for Database Manag...
SMACT Works
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
Top AI API Alternatives to OpenAI: A Side-by-Side Breakdown
vilush
 
The Power of IoT Sensor Integration in Smart Infrastructure and Automation.pptx
Rejig Digital
 
Smart Infrastructure and Automation through IoT Sensors
Rejig Digital
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
madgavkar20181017ppt McKinsey Presentation.pdf
georgschmitzdoerner
 

Rosario B. Casas ( www.vramericas.com): If data will be all over the space, who will take care of protecting it

  • 1. If data will be all over the space, who will take care of protecting it Rosario B. Casas @rosariobc @vramericas Julia Costin @ITGirl_ITWorld @Americas_cyber
  • 6. DIGITAL OR PHYSICAL WORLD “Digital and physical worlds collide as augmented reality moves from science fiction into everyday consumer and business life, opening up new opportunities for digital marketers.”
  • 7. TALENT GAP The demand for cybersecurity professionals over the past five years grew over 3.5 faster than the demand for other IT jobs and about 12 times faster than for all other jobs. Cybersecurity is increasingly vital as more and more people are connected by the Internet, businesses are dependent on cloud- based and big data services, and governments are facing increased web-based attacks related to terrorism, espionage or other areas.
  • 9. TALENT GAP According to (ISC)² Cybersecurity Workforce Study 2018
  • 11. EARLY MOMENT • Quick prototyping and product release • Cyber experts waiting for a mature industry to define standards and policies • “they have not looked at the security/privacy issues in VR/ AR, as the technology has not matured yet and the use of technology is not widespread amongst consumers”
  • 12. DATA COLLECTION • Legitimate users may be unaware that their personal data may have been captured and, then, leaked
  • 13. PERSONAL DATA AND PREFERENCES • Location, social ties, verbal communication, product preferences, sensitive information, etc. • Physical daily environment and interactions
  • 14. NON VERBAL DATA • with VR - companies collect non-verbal behavior (user’s posture, eye-tracking, gestures, facial expressions, etc.) *** spending 20 minutes in a VR simulation leaves about 2 million unique recordings of body language
  • 15. NON VERBAL DATA What can Non-Verbal behavior tell us about a person? • Mental State • Health Information • Emotions • Learning behavior - determine future behavior • Body language - data can be used to estimate students’ test scores, determine emotions, etc.
  • 16. BIOMETRIC IDENTIFIERS • Data generated by automatic measurements of an individual’s’ biological characteristics, such as fingerprint, voiceprint, eye retinas, irises, or other unique biological patterns or characteristics that can be used to identify a specific individual.
  • 18. • Digital blackmail • Hackers access to this data could lead to digital replicas/ digital clones of you being created and used to impersonate you for malicious reasons. • Many times, VR/AR systems haven't implemented encryption for network connects • Many VR/AR systems rely on third-party apps or integrations -
  • 19. TALENT GAP ISACA Info graph State of Cybersecurity 2019 Resources and Threats.
  • 21. QUESTIONS Rosario B. Casas @rosariobc @vramericas Julia Costin @ITGirl_ITWorld @Americas_cyber