Cybersecurity influencers believe that a new wave of system-embedded devices present a formidable challenge to their field. The Internet of Things (IoT) will introduce a vast amount of small computers, with inadequate security designs, that use high-speed internet, and that combination has all the ingredients for a cyberspace disaster.
Bob Stratton, a security entrepreneur and consultant, states that not every device has to have the high-level security of desktop computers, but manufactures of small computers should include a built-in level of resistance and system integrity.
Dan Greer, the chief information security officer at a not-for-profit investment firm, believes that the most urgent issue is people's dependence on technology. Due to the widespread use of the internet, interdependence is the norm of today's society. Mr. Greer understands that there is no single way to fix the problem.
Jenny Durkan, global chair of Cyber Law and Privacy Group for a law firm called Quinn Emanuel, states that on the Internet there is an unnecessary collection of people's personal information that is not adequately protected by the companies that manage it. And individuals have no control about the ways their personal data spreads online. Durkan states that companies should offer their technology to clients without the obligatory requirement of collecting their data. Clients should also have the right to review, limit, and eliminate data used for commercial purposes. Durkan believes that innovators need to create from within a paradigm of security. She does not approve of the "innovate and then secure" mindset.
Many influencers believe that the lack of adequate technical education in legislative bodies is the biggest challenge. From their perspective, legislators need to comprehend the tech environment before a threat takes place; otherwise, they will be likely to over-react with legislation. Jeffrey Carr, president of Taia Global, Inc., says that unreliable intelligence data providers influence national policy decisions. Threats are often calibrated as serious by these entities, and the media can further spread this message without fear of blowback. This creates the opportunity for a malicious third-party to cause conflict between two nations. Worst of all, this is unlikely to change. The US government does not recognize this as a problem and the cyber threat intelligence industry has little incentive to change.