TCEA Technology Leadership Summit
December 9, 2016
"The information stored by the doll could allow hackers to take over a home Wi-Fi network and from there gain access to other internet connected devices, steal personal information and cause other problems for the owners, potentially without their knowledge."
38%, as of July 2016
Trust the URL.
Security precautions can create assets we now need to protect.
Anyone who touches our network has needs that must be met, yet anyone who touches our network can compromise it.
Sometimes these tensions are irreconcilable. When that happens, what processes do we have in place for determining priority?
Can We Stop Doing This
Can I get a shout out for free wireless with no password?
(not in a good way)
What is the shortest possible amount of time I will need this information?
what is PII, what is sensitive - and really, it's all sensitive
(people should know who to talk to about issues they experience, and the decision making process should be clear)