When technology lost its way to utopia
SCSD 2021 will dedicate two full days to those who believe in the promise of a reasonable Internet being restored: The local heroes, the security ideologues, but also the giants who have shaped the world today.
The technology behind the Internet was created to bring new transparency and undiscovered value to the user. Today we experience the hangover after the rush. The longer our lives are dependent on the dimension cyber, the more one-sided its advantages have become. It became a medium for providers and data collectors..
Today we are data suppliers for a system that is almost exclusively profit-oriented. Exclusive? No! More and more actors are trying to bring sense and purpose back into the Cyber. Can Cyber do more? What about its influence on health systems, politics or even individuals?
The curated program on our six stages will focus on four main themes. Particular attention will be paid to SME:
The Glassy Citizen is moving ever closer to reality. One man’s joy, another man’s sorrow. What is Switzerland’s position in terms of securing its digitalisation. How important is progress in the areas of Smart City, e-Government, hyperconnected society and what security measures are being taken. Where is there still a need for discussion? Those are the questions that will be discussed before and during the third edition of the Swiss Cyber Security Days!
Small and medium-sized enterprises (SME)
Digitization offers opportunities for small and medium-sized enterprises. However, there are also hurdles on the way to success. Every sector is already benefiting from the advantages of cyberspace and many will be taking big steps in this area in the upcoming months. But without conscious and proactive action, managers are creating ticking time bombs there.
- Regulations like the new Swiss eDSG are a priority for legally and ethically appropriate behavior.
- The technical possibilities are wide ranging, from cloud applications to intelligent enterprise environments, the use of AI, 5G and robots. Each technology has its opportunities, but often expands the attack vectors of companies and individuals by leaps and bounds.
- In addition, small businesses must create new areas of responsibility, implement new processes and review their customer promises.
On our SME Day we will share knowledge, tips and especially a lot of practical experience!
It has been known for a long time that our #identity in the cyber must be protected not only there. Our actions, our footprints, our connections on the web have an impact on our physical #security. Whose responsibility is it to protect the privacy and security of the individual? What do providers of services and technologies (such as facial recognition) have to consider and where must the user himself control his own security? All those topics will be covered at our event in march!
Each industry has its own specifics, its own “opponents”, regulations and priorities. In addition, these industry-specific regulations will change dramatically due to volatile market and technology developments. Let us take a closer look at this:
Finance: How safe is your money in Switzerland? What influence have virtual currencies on the security of an investment?
Health: Hospitals are often the sites of the most complex data networks. How secure is a stay there? Frequently, the most sensitive personal data is exchanged between doctors and insurance companies. Is security sufficiently taken into consideration here?
Mobility: Digitization has had and continues to have an enormous influence on the way our mobility changes. Digital offerings ranging from e-scooters to car sharing are flourishing. Digital measurements try to optimize traffic control. Through high connectivity, attempts are being made to create ecological and economic mobility. Is that still healthy?
(Producing) Industry: Sensors, robots, algorithms, BI, AI – there is a wide range of optimization technologies for industry. However, this is also associated with the demand for a sustainable data policy and protection against attacks. Do these projects go hand in hand?