00:30 Is data security a new issue?
01:58 Why is hacking a problem that seems to be occurring more and more frequently?
02:57 What techniques can you use in order to ensure your data is secure?
04:38 How can we know which companies we should trust?
06:09 What other techniques can we use to ensure that our system is safe?
09:10 What are the cultural issues that a company should be aware of and promote in order to increase their data security?
11:35 What are those white hats actually doing?
14:35 How do you draw the line between what is a white hat attack and something more malevolent?
16:36 Even governments are being hacked now, so how can you possibly be confident in the safety of your data?
20:48 What about those private networks that make things more vulnerable?
24:00 Can you ever envisage a day where hacking is a thing of the past?
Data is both an asset and a liability. Supply chains require extensive historical records for tracability purposes and to ensure the accuracy of the demand forecasts. However, data leaks are damaging events both for the company and its clients. Supply chains have to protect both their physical and software infrastructures.
With celebrities, businesses and even governments falling victim to hackers, data security has become a topic of huge media interest. In this episode of LokadTV, we discuss how, as cloud computing continues to gain in popularity and hacking techniques become more and more sophisticated, we can be fully confident that our data is safe.
Nowadays we are more dependent on software and online services than ever and it’s no surprise if cyber attacks are on the rise. In this video, we learn which criteria you should consider when determining if a company can be trusted, or instead should be avoided at all costs. For example, would you consider a large company who exposes tons of resources online as being cyber-secure? Would you outsource your systems to such a company?
What do we, at Lokad, do as a company in order to keep our own systems safe from attacks? For us, security is one of our major concerns, running parallel to the accuracy of the forecasts we deliver. In this video, we reveal some of our own “secrets” and explain why we choose to rely on Microsoft Azure for our security and why we decided not to use any sequel or relational databases.
We also look at the concept of hackers and “Whitehats”, freelancers who spend their time trying to hack into companies’ codes in order to find security issues that they will subsequently report to the company itself. Are they our allies in improving the security of IT systems? In addition, we debate on why the systems used by governments or military forces are among the most vulnerable in the world and why “security by obscurity” is no longer something to long for.
Finally, we talk about the future. Can we possibly envisage a day when IT systems are completely safe and hacking becomes a relic of the past? Even though we are far from idle, there’s a field where this can happen faster. Are you wondering which one? Supply Chain…