Artificial Intelligence and human implants: Infosecurity Europe looks at the future as brains become linked to networks

Date: Tue, 06/14/2016 - 18:44

Artificial Intelligence and human implants: Infosecurity Europe looks at the future as brains become linked to networks
Kevin Warwick, Emeritus Professor at Reading and Coventry Universities, gave the Closing Keynote Speech, Artificial Intelligence, Implants, and Future Security Issues, at Infosecurity Europe last week in a session that looked at implant technology, both in terms of new forms of identification, and in bringing humans and technology together, particularly with regard to the security issues that this presents
 
Kevin Warwick said: “Artificial Intelligence will help to raise cyber security levels but it will also be a tool for hackers to break the security down. As humans and technology get closer and closer, as brains become linked directly to networks so security will become absolutely vital.” 

Additional show highlights included:

•         Founder and CEO of BH Consulting Brian Honan took his place in Infosecurity Europe’s Hall of Fame, joining industry luminaries including Jack Daniel, Dr Eric Cole, Mikko Hypponen, Shlomo Kramer, David Lacey, Professor Fred Piper, Professor Howard Schmidt, Bruce Schneier, Whitfield Diffie, Paul Dorey, Stephen Bonner, Dan Kaminsky, Eugene Kaspersky and Phil Zimmerman

•         The fifth annual European Security Blogger Awards were announced. Nominated and voted for by the public, with votes added by judges including Infosecurity Europe Hall of Fame member Jack Daniel, journalists Matthew Schwartz and John Leyden and others, the awards were presented in a reception held in the Pillar Hall, Olympia.

•         Keynote Stage seminars that continued the core themes if this year’s event around ‘securing the connected human’ and ‘building cyber resilience in a connected enterprise’ included events on: Fostering Better Engagement Between Business & Law Enforcement to Effectively Respond to Cybercrime; Managing & Mitigating 3rd Party Information Risk in the Connected Enterprise; and Secure Coding & Development: Embedding Application Security into Business Processes

Above, image credited to Infosecurity Europe
valorar este articulo:
Your rating: None

Post new comment

Datos Comentario
The content of this field is kept private and will not be shown publicly.
Datos Comentario
Datos Comentario
Submit