wef15 Archives - WISeKey https://www.wisekey.com/tag/wef15/ The Human-Driven Technology Platform Wed, 19 Feb 2020 03:28:22 +0000 en-GB hourly 1 https://wordpress.org/?v=6.5.3 https://cdn.wisekey.com/wp-content/uploads/2019/11/cropped-favicon-32x32.png wef15 Archives - WISeKey https://www.wisekey.com/tag/wef15/ 32 32 Should Big Trust replace Big Data? https://www.wisekey.com/press/big-trust-replace-big-data/ Thu, 29 Jan 2015 10:56:09 +0000 https://www.wisekey.com/?p=8899

What is the difference between ‘security’ and ‘trust’ on the internet? Trust is local, security is global. 2015 is shaping up to be the year that consumers and companies both come to this realization. Opportunities to bridge this gap abound as cyber-security start-ups quickly become Silicon Valley’s most recent fascination and venture capitalists have flooded the sector with investment as they look to back the latest technology used to fight criminals online.

On the whole, we’re doing a great job at securing the internet and developing new technologies to allow for enhanced personal data protection. But if security is to be viable, it must be engineered at the global level. Enter Big Trust, the new coin of the realm that is rapidly replacing the market’s fascination with Big Data.

At the recent World Economic Forum in Davos 2015, Big Trust emerged as a concept that gives due weight to trust’s importance in the digital age. Companies that embrace Big Trust and prioritize security over customer-data commercialization will be rewarded by consumers who tire of repeated intrusions into their privacy.

At this year’s Davos Conference, I moderated a round table on CyberSecurity and participated as panelist at the New Business Context: Risky Business session. One conclusion was that with billions of people around the world have grown increasingly distrustful of the internet and that the urgent necessity for a new model has emerged. Big Trust.  Our panel also concluded that there is actual commercial value in offering trust and security.  The fundamental right to privacy is at stake and if users begin to abandon the Internet because of security concerns, the multitude of recent positive developments in digital communications will be lost. All kinds of applications and firms will be negatively affected, including social networks that need further customers and governments that rely on cloud computing.

Our Davos panel also weighed the challenges of scaling up user-centric solutions and they loom large. Sufficient venture capital funds must be sourced. Support from professional business service firms must be won.  Mobile telecommunications networks, typically the least secure, have undergone massive expansion. Finally, our world is becoming increasingly interconnected and multipolar.

Other participants called for collaboration around faster-moving experimental projects in which the new demands of users help feed processes of entrepreneurial innovation in digital identity and personal data management.

One of the most mature and concrete examples of Big Trust on the Internet are the root systems we have developed in Switzerland in collaboration with OISTE*. These systems are created and maintained in secure military bunkers under the Swiss Alps. In the past these vaults held gold, but now they protect something more important – your privacy.

Project DIKTYO:

Recognizing:

  • With big data, the Internet of things and the arrival of new generations of powerful ubiquitous communication along with convergence and cloud computing, we are on the move into yet unchartered territory in digital communications.
  • A wealth of new services, meeting our outstanding needs in health, education, commerce, and public services, stand to be developed and scaled in ways never seen before.

Aware that

  • Continued disorderly access and uncontrolled diffusion of personal information without our knowledge harbours significant risks for misuse.
  • Usability and security are currently subjected to trade-offs that create difficult choices for how to strike the balance.
  • It is becoming increasingly expensive and distortive for financial and other sectors to insure and protect themselves against the risks of cybercrime taking advantages of security glitches.

Against the background of

  • Billions of new human users – most of them members of a young generation – are set to join the Internet.
  • Trillions of devices, ranging from critical infrastructures to sensors to cars to refrigerators to toys or even watches and clothes, stand to go on line.
  • Each user and device will have to be embedded in trusted frameworks of authentication and authorisation framed, in a myriad of constant borderless exchanges and transactions.
  • Devices will be set to take decisions automatically and autonomously.

We, the under signers, agree on the importance of:

  • Mitigating security risks and increasing trust in this dense digital environment, with much higher precision and at lower cost than is the case today
  • Initiating effective collaboration to put in place a coherent system for electronic identities, capable of handling derived identities, operating for humans as well as for devices.
  • Putting users in better control of their digital identity, including what data they share and of their privacy,
  • Ensuring trust interoperability between Cryptographic Rootkeys.
  • Paving the way for trusted search and other e-services,operating across sectorial and national boundaries

We therefore agree to

  • Plug into the proposed Single European Digital Identity Community as envisaged by the Digital Agenda (DAE) in its Key Action 16, collaborate with ETSI, W3C, and IEEE, and engage with the ITU,OECD, ISO and other multilateral and international bodies of relevance to the global linkages and ramifications.
  • Build upon the Davos Charter of 2014 “Addressing Identity Management, Privacy, Security and Trust in Digital Communications” ()
  • Draw upon the work that has been undertaken on new frameworks and business models, e.g., an Individual Digital Identity (INDI) by the GINI project (), comprising user control in sharing personal information, a new generation of service delivery, public data provision and user-driven operator services ensuring the integrity of data, reputational protection, intellectual property rights protection and trust;
  • Benefit from the provision of OISTE ‘s Rootkey () and its innovative neutral Trust Framework.
  • Further examining how to recognize diverse technical solutions, including requirements of common protocols, Defining what legal cross-border interoperability is required for orderly authentication and authorisation in the world of tomorrow?

In order to Achieve:

  • A coherent system for trusted identities, operating for humans as well as for digital devices.
  • A neutral platform for all stakeholders, bridging Multiple Jurisdictions, to address issues of Cyber Security, Search,Privacy and Data Governance in a secure and open Internet.

* The OISTE Foundation, is a Geneva-based, not for profit organization, founded in 1988 was created with the objectives of promoting the use and adoption of international standards to secure electronic transactions, expand the use of digital certification and ensure the interoperability of certification authorities’ e-transaction systems.

This article is published in collaboration with WISeKey. Publication does not imply endorsement of views by the World Economic Forum.

To keep up with Forum:Agenda subscribe to our weekly newsletter.

Author: Carlos Creus Moreira is Founder and CEO of WISeKey, a Geneva-based World Economic Forum Global Growth Company and.pioneer in digital protection, online trust and privacy protection since 1999.

 

]]>
WISeKey and OISTE.ORG launch a CyberSecurity Alliance at Davos https://www.wisekey.com/press/wisekey-oiste-org-launch-cybersecurity-alliance-davos/ Mon, 26 Jan 2015 14:49:36 +0000 https://www.wisekey.com/?p=8877 Davos, 22 January-WISeKey, one of the Global Growth Partner Companies of the World Economic Forum is launching this year at Davos a Cybersecurity alliance at the Annual Meeting taking place in Davos, Switzerland 21-24 January 2015.
WISeKey and the OISTE Foundation organized yesterday a CyberSecurity Roundtable and signed a Cybersecurity alliance with a group of companies and organizations participating at Davos.
The CyberSecurity alliance proposed at Davos follow a year of high-profile news stories about hacks of major brands, including, JP Morgan, Sony, Home Depot, Target, Staples and others. Those attacks exposed various customer data, including, in some cases, email accounts, passwords, numbers and verification codes for payment cards. Following these developments, trust in the privacy and security of digital communication has reached a new low.
Carlos Moreira, Founder and CEO of WISeKey and OISTE.ORG said, Cyber security is one of the biggest challenges facing chief executives and political leaders around the world. Much is at stake, given the share of the global economy that is already based upon digital communication and its growing reach into new domains. We cannot work alone on this, we need a strong alliance to fight together as a failure to adequately protect against cyber-attacks, could cost the global economy dearly.. See also interview with Mr. Moreira on Cybersecurity from BBC http://www.bbc.com/news/30925696
Capturing the opportunities and countering the threats requires new responses. More sophisticated passwords and identity protection alone will not achieve the goal. A myriad of interconnected links supported by a range of trusted communication platforms and tools requires a seamless and systemic response.
Global regulation, legislation and data protection initiatives need to be proposed as echoed by the United States President Barack Obama’s recent proposition to boost online security and Internet access to increase privacy and identity protection, improve cybersecurity for both private companies and the government, and expand access to broadband Internet.
The most logical conclusion is the establishment of a common framework for trusted identity management to allow borderless communication and transactions in an increasingly fast-moving digitalized global economy.
More information on how to join the CyberSecurity Alliance is available at http://davos.wisekey.com
 
Panelist Cybersecurity Roundtable
Roundtable about Digital Identities Carlos Moreira, David Fergusson, Thomas Andersson, Jean-Manual Rozan

Cybersecurity Roundtable
 
 
 
 
 
 
 
 
 
Contact Person: Youmna Abisaleh, +41799460089, yabisaleh@wisekey.com

]]>
Andorra Telecom and WISeKey Forge Trusted Encrypted Clouds partnership at the World Economic Forum in Davos https://www.wisekey.com/press/andorra-telecom-wisekey-forge-trusted-encrypted-clouds-partnership-world-economic-forum-davos/ Mon, 26 Jan 2015 14:18:53 +0000 https://www.wisekey.com/?p=8875 Davos, Geneva, Principality of Andorra, 21 January 2015WISeKey, one of the Global Growth Partner Companies of the World Economic Forum participating in the Annual Meeting taking place in Davos, Switzerland 21-24 January 2015 announce a partnership agreement with Andorra Telecom to develop a joint WISeID Personal Cloud App that will store data in Andorra Telecom Data Centers in the Principality of Andorra. The App will provide and support personal cloud computing services under a platform developed by both companies.
WISeID Personal Cloud provides trusted digital identities via mobile and desktop Apps for individuals and corporations performing confidential transactions on open Internet. The WISeID Cloud App is a set of online tools to empower the user by providing secure, authenticated, private digital identification and personal data storage on a Secure Vault on the Cloud. The App enables users to protect and sync their data and passwords across their personal mobile devices. The partnership with Andorra Telecom guarantees that the encrypted personal authentication key is stored in Andorra Telecom Data Centers in the Principality of Andorra. The WISeID Personal Cloud App is free but users will be requested to pay for incremental Personal Cloud storage usage. The recent awareness about e-mail security made Telcos to announce the future implementation of encryption solutions in their services. Additionally, WISeKey technology is based on industry standards for PKI, as S/MIME, being the base for legally recognized digital signatures.
“WISeKey launched the Personal Cloud concept during the last year World Economic Forum in Davos. WiseKey is predicting that personal clouds will move to the gravity center from application-centric to personal centric models where users will retake the control of their personal data. Gone are the days of huge centralized clouds and ID metasystems with no respect to personal data. The trend WISeKey is launching this year in cooperation with Andorra Telecom via the joint project is a special version of WISeID Personal Clouds designed to complement Andorra Telecom cyber security services”, said Carlos Moreira, Founder/CEO, WISeKey.
“We are very proud of this strategic partnership between WISeKey and Andorra Telecom as this new service is really about providing a diversification of our product portfolio to our customers. Our joint products will increase the Cybersecurity offering by applying measures to ensure confidentiality, integrity, and availability of data in our Principality” said Jordi Nadal Bentadé, CEO of Andorra Telecom.
About Andorra Telecom
Andorra Telecom is the incumbent and state owned operator that manages and operates the telecommunications services exclusively in the Principality of Andorra – fixed line, mobile, data transmission, Internet, national broadcasting networks related to radio and Terrestrial Digital Television (TDT).  On December 2014 Andorra Telecom has been ranked number 1 on Ranking of Countries Mobile Networks SS7 Security*. On November 2014 the Principality of Andorra became the first country to have 100% coverage on optical fiber and to turn down Adsl from its portfolio. Those goals aim to provide state-of-the-art telecom and media services to its customers with the fastest and securest communications services.
* http://ss7map.p1sec.com/ranking_country/
About WISeKey
Established in 1999 and headquartered in Geneva, Switzerland, WISeKey is a leading Cyber Security company, providing specialized technologies for trusted digital identities for people, objects and mobiles, personal clouds and authentication to secure communications and transactions without compromising trust. WISeKey Swiss bunker.
 
Carlos Moreira Bunkers Swiss Alps
Video: http://www.bloomberg.com/video/zone-of-mobile-privacy-secured-in-the-swiss-alps-pDXsw7qdRkKk95koRT4~hw.html
Contact Person : Youmna Abisaleh, yabisaleh@wisekey.com, +41 79 946 00 89

]]>
THE RISE OF BORDERLESS ELECTRONIC IDENTITIES: ADDRESSING PRIVACY SECURITY AND TRUST IN THE POST-PASSWORD ERA https://www.wisekey.com/events/techevents/davos-2015-roundtable/ Wed, 17 Dec 2014 12:02:15 +0000 https://www.wisekey.com/?p=8740 roundtable-h Belvédere Hotel, DavosWednesday 21 January 2015 07:15 – 08:30

 

Electronic communication keeps expanding. With big data, convergence and the Internet of things we are on the move into yet unchartered territory. A wealth of new services, meeting our outstanding needs in health, education, commerce, and public services, could be developed and scaled in ways never seen before. Conversely, however, the disorderly access and diffusion of personal information without our knowledge harbours unknown risks. Following developments ranging from the Snowden revelations to major hacks by criminal gangs, trust in the privacy and security of digital communication has come to a new low. Much is at stake, given the share of the global economy that is already based upon digital communication and its growing reach into new domains. Not only has the number of Internet users passed 2 billion. Another 5 are set to join in a few years down the road. 50 billion electronically communicating devices will emerge as well, each one embedded in frameworks of authentication and authorisation framed to decide who calls the shots, and who does not, in a myriad of exchanges and transactions every minute around the world. It is in this context that the development and usability of trustworthy eServices need to be shaped. Multi-factor authentications and hardware based credentials, a sound approach to privacy protection of biometric credentials, and for interoperability of different authentication methods, along with a common understanding of their respective credentials, are in demand. So is the rise of support actions including better harmonized and more compatible regulation, legislation and data protection schemes. Capturing the opportunities and countering the threats requires new responses. More sophisticated passwords and heavier PKI will not do the trick. A myriad of interlinkages supported by a range of communication tools requires a seamless and systemic response. It appears necessary to move towards a common framework for identity management. One way or the other, this seems inevitable building block in the discourse of achieving cross border or borderless communication and transactions in an increasingly fast-moving digitalised global economy. But how are different technological solutions to be reconciled? At what level are common protocols required? What cross-border legal interoperability is required for orderly authentication and authorisation in the world of tomorrow? Is the introduction of a common system for electronic identities the response that we need? A globally valid ID? Or a common European ID, in our part of the world, as a first step? Is successful collaboration in this respect the platform on which we can build trusted e-services, with the certification and support mechanisms that are required? If that is not happening, or cannot be achieved in Europe; why is that so? Will a common effort of this kind then instead take hold in other parts of the world? Or is there another way of coordinating and enabling joint progress? The situation at hand calls for immediate actions to increase security, interoperability, and privacy in order to regain trust. Following an initiative from WISEKey, OISTE, GINI S.A., IKED and the Fraunhofer Innovation Cluster next generation ID this topic is featured at the World Economic Forum in Davos 2015 in an event that brings together decision makers from in policy, industry, research and civil society around the world to discuss this most relevant topic involving all relevant stakeholders. Following the great success of the Davos 2014 Roundtable “Addressing Identity of People and Things, Privacy, Security and Trust on the Cloud“, sponsored by WISeKey, in which selectedalpha, including Neelie Kroes, European Commissioner; Humberto Ribeiro, SCS – Ministry of Development, Brazil; Prof. Thomas Andersson, IKED; Prof. Alex “Sandy” Pentland, MIT and Marina Grigorian, Fraunhofer FOKUS, discussed the future of identity management and data governance under the moderation of Carlos Moreira.

https://www.wisekey.com/press/wisekey-exclusive-panel-identity-security-big-success-world-economic-forum-annual-meeting-davos/

During the 2015 edition a second roundtable on the subject will be organised, this time addressing

 

THE RISE OF BORDERLESS ELECTRONIC IDENTITIES:  ADDRESSING PRIVACY SECURITY AND TRUST IN THE POST-PASSWORD ERA.

 

The objective for the 2015 edition will be to provide a neutral platform for all the stakeholders working on Cybersecurity, Trust Models and Digital Identification to work together and collaborate on a common electronic identity system. For Europe this responds directly to the proposed Single European Digital Identity Community as envisaged by the Digital Agenda (DAE) in its Key Action 16. Other regions, the ITU and other multilateral bodies are likewise increasingly engaged with these issues.

The roundtables will also explore the direct significance of such a common identity system for realising trusted e-services in diverse markets. This includes a financial track bringing experts from M&A to discuss trends Global Cyber Security as the spending on this market is expected to reach $100 billion in 2015 and is forecast to grow at an annual rate of 22 percent in the next five years to reach 160 million in 2018. The United States, China, Brazil and Europe account for 90% all deals globally triggered by growing cyber threats and increasing awareness among both organizations and consumers of accelerating breaches and attacks, from our report. In most regions, the private sector accounts for the majority of Cyber Security spending, with the U.S. the notable exception where government spending is almost equal to that of the private sector. The strong U.S. technology industry combined with the fact that the U.S. defence and intelligence budgets are significantly larger than in any other country are key market drivers. Other key drivers underpinning growth in Cyber Security spending include: Increasing cyber threats, both from new actors and new threat vectors (the paths that attacks can take). Greater vulnerabilities due to the more pervasive use of technology, particularly mobile devices and cloud computing. Increasing awareness by organizations and consumers of the threats and potential threats. Changes in technology driving product and service innovation of security solutions. Increasing regulation, particularly those enforcing the requirement to secure personal data. Changes in outsourcing; some organizations are increasingly relying on partners for security, whilst others are growing internal security spending to maintain greater levels of control.

 

]]>