5. What is digital sovereignty and why does it matter to your business? Insight Story

5. What is digital sovereignty and why does it matter to your business? Insight Story

Released Thursday, 7th December 2023
Good episode? Give it some love!
5. What is digital sovereignty and why does it matter to your business? Insight Story

5. What is digital sovereignty and why does it matter to your business? Insight Story

5. What is digital sovereignty and why does it matter to your business? Insight Story

5. What is digital sovereignty and why does it matter to your business? Insight Story

Thursday, 7th December 2023
Good episode? Give it some love!
Rate Episode

Episode Transcript

Transcripts are displayed as originally observed. Some content, including advertisements may have changed.

Use Ctrl + F to search

0:03

The idea of digital sovereignty is really about

0:05

questions of control. Who is able to control that

0:07

data and on what terms? Data spaces

0:09

are a systemic approach to

0:11

increase trust and sovereignty in

0:14

sharing data. And no matter how much there is

0:16

a desire for increased control, in

0:18

reality, cooperation is absolutely essential. Hello

0:25

and welcome to Insight Story, Tech Trends

0:27

Unpacked for Business Leaders. The podcast that

0:29

gives you the insight you need to

0:31

make the right decisions about how to

0:33

use tech to benefit your organisation. I'm

0:37

Susie O'Neill and this is brought to

0:39

you by Kaspersky, the cybersecurity specialists. This

0:42

time we're asking, what

0:44

is digital sovereignty and why does it

0:46

matter to your business? In

0:53

our increasingly interconnected world, the concept of

0:56

digital sovereignty has become more and more

0:58

important. It's about a nation's ability to

1:00

govern and control its digital assets, data

1:02

and technologies. Yet it's also

1:05

a concept that has significant implications for

1:07

businesses as they navigate a landscape where

1:09

data is essentially the fuel that drives

1:11

everything they do. It

1:13

poses important questions. Who owns

1:16

and manages data? How do

1:18

national regulations affect data flowing across borders?

1:21

And what does that mean for data security,

1:23

compliance and market access? It's

1:25

about making strategic decisions on how you

1:27

handle and use data that could affect

1:29

future business value. So how

1:31

do management teams get the info they need to

1:33

make the right decisions? I'm going

1:35

to be joined by two people who can give us some

1:37

insights into all of this. Professor

1:40

Ben Farand is an academic whose work

1:42

focuses on the intersection of policy and

1:44

emerging technologies. And then Silas

1:46

Sepp is Director of Operations for MyDataGlobal,

1:48

an organisation helping to solve some of

1:51

the commercial world's digital sovereignty challenges with

1:53

the concept of data spaces. But

1:56

let's get a bit clearer on the issues we're

1:58

talking about. Dolly,

2:00

you're inside assistant. Dolly, just the

2:02

help I need. We're talking

2:04

about digital sovereignty and how it affects

2:06

businesses. Can you start with the definition?

2:09

Digital sovereignty is a country's jurisdiction

2:11

over its digital world and its

2:14

power to control its data, technology,

2:16

and online space. For

2:18

businesses, it means having the authority to

2:20

manage their data, decide where it's kept,

2:23

and who gets to use it. Why

2:25

is that so important? Data is

2:27

essential to businesses. A

2:29

recent McKinsey Global Institute survey says

2:32

data-driven organizations are 23 times more

2:34

likely to acquire customers and

2:36

19 times more likely to

2:39

be profitable. So I can see the importance

2:41

of control, but we live in a global economy.

2:43

How does that affect digital sovereignty? Different

2:45

countries have different rules about

2:47

data. Businesses must follow these

2:49

regulations, decide where to keep

2:51

data, deal with security, and

2:54

pick technology partners who respect

2:56

these rules. So for businesses,

2:58

is this particularly about data control?

3:01

Data control is significant. Businesses want

3:03

to decide who can see, use, and

3:06

store their data. With digital sovereignty, they

3:08

have more say in this. They

3:10

might need to keep data in specific

3:13

places or use certain tech to meet

3:15

a country's rules. Think of it

3:17

as having a lock on a box. Only certain

3:19

people should have the key. Okay,

3:21

thank you. Is this within your data regulations

3:23

to be sharing this info, your virtual key

3:26

with me here? Of course. We

3:29

operate by the same rules. I

3:31

have confirmed that. Nice

3:33

one. Thanks, Billy. So

3:35

let's find out more about exactly what

3:37

digital sovereignty means to companies operating in

3:39

this increasingly digital world. Professor

3:42

Ben Farand is a professor in

3:44

law and emerging technologies at Newcastle

3:46

University. His particular area of

3:48

research is lawmaking and political processes

3:50

concerning new and emerging technologies, including

3:53

in the field of intellectual property.

3:55

He joins me now. Hello, Ben.

3:57

Aye, thank you very much for having me. So then just building.

4:00

Moving on to some of the definitions we

4:02

heard there from Dolly, and again as a

4:04

way of helping people to understand, let me

4:06

pose a hypothetical. If a French company's data

4:08

is stored on services in America, which country's

4:10

regulations would that be subject to? Well,

4:13

that's an interesting question. Under the general

4:16

data protection regulation implemented

4:18

by the European Union, the general

4:20

principle is that if that data

4:23

is about European Union citizens and

4:25

there's any potentially identifying information there

4:27

that could be considered as either

4:29

personal data or sensitive personal data,

4:31

which is an item category of

4:33

protection, that data should be

4:35

governed by the EU's laws and policies

4:38

so long as that American company has

4:40

some sort of activity in the European

4:42

Union. Now there have

4:44

been measures and some of your

4:46

listeners may be familiar with things such as

4:48

the Shrem's decisions, where there have been discussions

4:51

about the extent to which the United States

4:53

is compliant with these principles and

4:55

whether there can actually be any sharing of data with the

4:57

United States on that basis. The

5:00

European Union has become increasingly concerned

5:02

with what happens with its data

5:04

outflows. This means that

5:06

if the data concerns European citizens,

5:09

then the European Union's position is

5:11

that that law is applicable to that data

5:13

regardless of where it's being sent to. Right.

5:16

Now, in sight story, we're aimed at businesses

5:18

trying to make those strategic decisions and they

5:20

don't always have the same priorities as those

5:22

nations. So what do you think are the

5:24

challenges for companies when it comes to operating

5:26

within these frameworks? The

5:29

challenge really more than anything else

5:31

is that digital sovereignty

5:33

is really a question of contemporary geopolitics.

5:36

So we're seeing that there are increasing tensions

5:38

between states, but there is

5:40

also a level of concern over the

5:42

power of big corporations as well. So

5:44

if you look at the origins of

5:47

the EU's digital sovereignty agenda, a

5:49

lot of this is based around the concerns

5:51

over the power of very big market players,

5:54

particularly in the United States, which they refer

5:56

to as GAFAM, which covers Google, Amazon, Facebook,

5:58

Microsoft. soft apple, but

6:02

also in terms of Chinese

6:04

companies as well. So companies

6:06

such as Baidu, Alibaba, Tencent,

6:08

etc. Now it may not always be

6:10

the case that the state actors and

6:12

the private actors are aligned, but

6:15

nevertheless the concern is that if data

6:17

is being transferred to other places for example,

6:19

regardless of the relationships that the European Union

6:22

or private sector actors may have in the

6:24

European Union, there may

6:26

nevertheless be the impact of

6:28

geopolitics and sort of national

6:30

regimes, regulations, or even just

6:32

policies that could have a

6:35

potential detrimental impact on those European Union

6:37

interests. So the idea of digital

6:39

sovereignty when applied to data is

6:41

really about questions of control. Who is able to

6:43

control that data and on what terms? So

6:46

corporations particularly operating within the European Union

6:48

need to be thinking very carefully about

6:51

who it is they're interacting with in other states, but

6:54

also having an eye to international politics as

6:56

much as just corporate reality. What is happening

6:58

in the world at this point in time

7:00

that could potentially shape the responses to particular

7:02

countries and the companies based within them at

7:05

some point in the immediate future? Companies

7:07

that are really thinking internationally. So

7:09

for example, if I am running a

7:12

tech firm in India, I want to

7:14

start doing more trade internationally. Within

7:16

the business, do you think it's important,

7:19

Ben, that there are people specifically dedicated

7:21

to looking at data security and involved

7:23

in the digital sovereignty discussion? Yes, very

7:26

definitely. Generally, they need to have somebody that

7:28

is aware of the general data protection regulation,

7:30

its requirements, and what it requires for that

7:32

company to be compliant. So

7:34

within the European Union and the UK,

7:36

because of the implementation of the GDPR

7:38

before the UK left the European Union,

7:41

we have data protection officers whose positions are

7:43

essentially one of data controller where they

7:45

have an idea of how exactly data should

7:48

be managed, what sort of security protocols that

7:50

should be over that data, the

7:52

purposes for which it should and should not be used. And

7:55

having somebody that is an equivalent of a data protection

7:57

officer within those companies that's able to provide that sort

7:59

of a oversight definitely makes

8:01

it easier for those companies to engage with the

8:03

European Union and the companies operating

8:05

inside it. And you said in

8:07

the past that the sovereignty agenda is much

8:10

about international trade, it is about the technology.

8:12

Can you talk a bit more about that

8:14

and what that could mean for business? The

8:17

issue with digital sovereignty, it goes

8:19

far beyond just the purely digital.

8:21

Digital sovereignty really covers the entire

8:23

supply chain from the critical raw

8:25

materials as a use for producing

8:27

semiconductors all the way through to

8:29

the provision of cyber security services

8:31

to end users. What

8:34

this means is that because there is increasing

8:36

geopolitical concern over things such as control

8:38

and access to these natural resources and

8:41

a good example of this is the

8:43

way that supply chains for semiconductors largely

8:45

seem to collapse at during certain points

8:47

during the lockdown where particular

8:50

German manufacturers found they were not able

8:52

to get the semiconductors required for the

8:54

automobile industry. As a result

8:56

there's been an increasing focus on the part

8:58

of the European Union but also increasingly China

9:00

and the US as well to

9:02

ensure control over these resources and to

9:04

ensure that in the event of more

9:06

supply chain shocks they are

9:08

able to still provide their companies and their

9:10

citizens with the technologies that are required. Interdependence

9:14

is just the nature of 21st century

9:16

life and no matter how much there

9:18

is a desire for increased control and

9:20

this idea of demonstrating the sovereignty of

9:22

different regional actors. In

9:24

reality the supply chains have become so

9:27

global, they've become so independent that cooperation

9:29

is absolutely essential. There is no way

9:31

that we can replace cooperation, trade

9:34

agreements, relationships with other states, other

9:36

companies within those states with

9:39

some system of what they call pure

9:41

strategic autonomy where you are completely self-sufficient.

9:44

In terms of how a lot of the supply chains

9:46

work this is just not feasible in the long term

9:48

which means there is always going to be an element

9:50

of trying to cooperate even if there is this idea

9:53

of digital sovereignty in the background. Yes, so

9:55

digital sovereignty isn't just about compliance is

9:57

it? It's about strategic planning and ethics.

10:00

So how can organizations make sure they're doing the right

10:02

thing and where can they get the info they need

10:04

to keep up with development? It's important

10:06

to bear in mind that digital sovereignty is essentially

10:08

still something that's happening very much at the level

10:11

of states. It's something that states are thinking about

10:13

rather than necessarily transferring in

10:15

all cases to specific concrete obligations

10:17

on individual companies. This will often

10:19

come downstream in the form of

10:21

particular regulatory requirements, for example. Also,

10:24

not only the sort of the stick of

10:26

regulation, but also carrots as well. So thinking about

10:28

the Chipps Act, for example, there

10:30

is a lot in this legislation

10:33

about investment, how companies can actually

10:35

cooperate and then seek funding

10:38

essentially for diversification of

10:40

supply chains, for

10:42

improving trade relations with third parties in

10:44

such a way that it actually helps

10:46

to build up general resilience at the

10:48

international level. Increased cooperation

10:50

there is really sort of central to

10:52

what's happening, but it is actually being

10:54

underscored by actions at the state level

10:56

to try and facilitate some of this

10:58

interstate trade. And let's

11:00

talk about something. Everyone seems to have an opinion

11:03

on social media. And nearly

11:05

every company in the world is using

11:07

one of those social media platforms to

11:09

communicate to their customers or prospects. How

11:12

do you actually affect what happens on platforms that

11:14

you don't have any control over? That's

11:17

a really, really good question. So

11:19

the European Union has recently passed something

11:21

called the Digital Services Act. The

11:24

Digital Services Act essentially is a set

11:26

of requirements placed on platforms

11:28

and search engines. The European Union

11:30

has made it relatively clear that

11:32

this legislation applies

11:34

to content on these platforms

11:37

that may be considered illegal. What

11:39

is required of the platforms is not that they're

11:41

able to deal with every single instance. But

11:43

what it is requiring is that

11:45

they have systems, again, of transparency, accountability,

11:48

and oversight, where they perform

11:50

risk assessments and are able to demonstrate how

11:52

exactly they are approaching these issues at a

11:54

broad level. Now, how this is relevant to

11:56

companies is that in terms of

11:59

brand reputation, it's not perspective,

14:00

that can increasingly become the international

14:03

standard. So the recent AI

14:05

summit that was held in Bletchley Park

14:07

in the UK called the Frontier AI

14:10

Summit that was hosted by Prime Minister

14:12

Sunak, where there has actually

14:14

been an agreement over particular uses

14:16

of AI between 28 different states,

14:18

but including all the big players

14:21

in the digital sovereignty debate such

14:23

as the EU, US, China, UK,

14:25

that there are certain uses of AI

14:27

that require global systemic responses. And

14:29

so despite the digital sovereignty agenda

14:31

and the amount of competition between

14:33

different states as to who sets

14:35

the rules. So we are

14:38

seeing that again, despite the discussion of digital sovereignty,

14:40

there are some issues where the big players are

14:42

relatively on the same page when it comes to

14:44

the things where they think that the risks

14:47

of non-intervention can actually be greater than

14:50

losing some sort of competitive advantage against other

14:52

states. In terms of

14:54

individual companies, and particularly in the field

14:56

of data sovereignty, something that's

14:58

increasingly developing is an approach to something called

15:01

Stedterated Computing, with the idea being that if

15:03

you were involved in trying to train

15:06

AI on different datasets, you

15:09

can actually minimise the data privacy implications

15:12

by having that done remotely, and then

15:14

by communicating essentially the outcomes of that

15:16

data at the central level. So everything

15:18

stays relatively at arm's length. So

15:20

there are new technologies that are also

15:23

arising as a result of these regulatory

15:25

interventions that companies may

15:27

be interested in pursuing further. The generative

15:29

AI has all sorts of other potential

15:31

implications as well, increasing questions over intellectual

15:33

property and the potential for these systems

15:36

to be infringing copyright, for

15:38

example, through to, again,

15:40

potentially data protection and security issues

15:42

that arise from having massively open

15:45

datasets being trained on material online,

15:48

which may or may not be factually correct. Yeah,

15:50

absolutely. Great discussion. And

15:52

we like to conclude every episode of Insight's

15:54

story with a final nugget of insight if

15:57

they're taking the very first step on the

15:59

journey in any... project. So

16:01

for a business owner or leader

16:03

taking their first steps into digital

16:05

sovereignty, what would your advice be to

16:07

them? What's the first thing they should be thinking about? I

16:10

think the first thing they should really be thinking about

16:12

is in the context of the

16:14

business they operate, what sort of data are they

16:16

likely to be using? What sort of data are they

16:18

likely to be collecting and where is that data likely to

16:20

be going? Once they've got a fairly

16:22

good idea of what that is, even if it's just at

16:24

the level of writing on a piece of paper where

16:26

they think the flows could be coming and going, think

16:29

about the potential implications of that. Think

16:32

about what security provisions you may need to put

16:34

in to ensure that data is protected within your

16:36

company as well as outside, as

16:38

well as again, if you're

16:40

dealing with a large entity such as

16:42

the European Union, what sort of regulatory

16:44

compliance issues could arise? So think very

16:46

much first about why do I

16:48

need this data in the first place? And

16:51

this question will then help you to define every other

16:53

step of that particular process. We

16:59

know that using data successfully is an

17:01

exceptionally powerful tool for businesses. It

17:04

drives strategy, service, innovation, growth, pretty

17:06

much all aspects of doing business.

17:09

But using data securely, fairly and in

17:11

a way that customers can trust is

17:13

not always easy. Data

17:15

spaces are becoming an increasingly important way

17:17

of addressing the issues involved in using

17:20

customer data safely and ethically. Dolly,

17:22

are you still there? I am

17:24

Dolly, your insight assistant. Great. What is

17:27

a data space? A data

17:29

space is a data relationship

17:31

between trusted partners who use

17:33

the same standards and guidelines

17:35

for data storage and sharing

17:37

within one or many vertical

17:39

ecosystems. That means sectors like

17:41

agriculture, tourism, energy or finance.

17:44

Data is not stored centrally but with

17:47

the members of the data space. These

17:49

might be data providers, users and

17:52

intermediaries. Data spaces

17:54

can be nested and overlapping. For

17:56

instance, a data provider can participate

17:58

in several data. data spaces at

18:00

once. And who's doing this? This

18:03

is happening all over the world, but

18:05

Europe is very active in promoting data

18:08

spaces. The International Data

18:10

Spaces Association was founded in Germany

18:12

in 2017 and regularly releases and

18:16

maintains a reference architecture model. That's

18:18

a software template for anyone wanting

18:20

to create a data space. Great,

18:23

thank you. That was quite a download. You can

18:25

head back to your own private data space to

18:27

rest. Sounds like this

18:29

could be a way of helping businesses navigate

18:31

the maze of digital rules and make sure

18:33

their data is safe and authenticated. So

18:36

to tell us more about data spaces, I'm

18:39

joined by Cilla Sepp, Director of

18:41

Operations for My Data Global, a

18:43

nonprofit dedicated to what they call

18:45

a human-centric approach to the use of personal

18:47

data. Hello, Cilla. Hello,

18:49

thank you for having me. So we

18:51

heard from Ben all about the importance

18:53

of data sovereignty in the use of

18:55

data for businesses. Can you tell us

18:58

a bit more about what your organization

19:00

is doing in this area? So I

19:02

start always by reminding that data spaces

19:04

are a systemic approach to increase trust

19:06

and sovereignty in sharing

19:08

data and using data across

19:10

different organizations and even across

19:12

sectors. So it's not simply

19:15

a yet another technological approach

19:17

to provide infrastructure for data sharing,

19:19

but really a combination of business,

19:22

legal, operational, functional, and technical

19:24

layers to really enable that

19:27

trustworthy data sharing. There

19:29

are a number of different data space

19:31

initiatives already existing. We know

19:34

many of those initiatives from the

19:36

market, like the Smart Connected Supplier

19:38

Network or Katena X in the

19:40

mobility sector, et cetera. And

19:43

this is also a historical context that

19:45

data spaces have spun out

19:47

of industrial developments. The European

19:49

data strategy and following funding

19:51

programs are now financing also

19:53

several database projects in various

19:56

sectors. And we at MyData

19:58

are particularly interested in involved

20:00

in the horizontal project called

20:02

Dataspace Support Center, as

20:05

well as in the preparatory action for the data

20:07

space for skills. In that

20:09

context, EU is also financing

20:12

several sectoral data spaces that

20:14

are preparing specifically for common

20:16

European data spaces that look

20:18

out for interoperability among different

20:20

initiatives in that space. Different

20:23

businesses and companies can, of course,

20:26

join existing projects and initiatives to

20:28

be one of the participants there,

20:30

either as a data provider or

20:32

a data user, maybe even as

20:35

a data space enabling service, or

20:38

then also start to explore opportunities

20:40

to create one data space with

20:42

its own collaborators, really depending on

20:44

the context, the business case that

20:47

they're involved in, et cetera. Brilliant.

20:50

So there's lots of different opportunities to get

20:52

involved. How could businesses find out where to

20:54

go and what would be

20:56

the best starting point to explore

20:58

participation in data space? So I

21:00

mentioned the project called Dataspace Support

21:03

Center. That is not only developing

21:05

the blueprint for common European data

21:07

spaces, but more importantly, even identifies

21:10

different data space initiatives and provides

21:12

support to them. So

21:14

I encourage you to explore the

21:16

websites of the project for an

21:18

overview of currently engaged initiatives, as

21:21

well as the resources available already

21:23

today. Moreover, do also check

21:25

out the contributing partners to

21:27

the support center, such as

21:29

International Data Spaces Association, the

21:32

GaiaX initiative, and others. And

21:34

of course, reach out

21:37

to also MyDataGlobal for more insights

21:39

and examples about human-centric approach to

21:41

data and data spaces. Great. So lots

21:43

of opportunities to get involved. Now, is

21:46

it just a European Union thing, data

21:48

spaces, or could businesses from other parts

21:50

of the world get involved in some

21:52

of these projects? So while the European

21:55

data strategy sets the course for emerging

21:57

data spaces, particularly in the European context,

22:00

It is definitely not limited to

22:02

Europe only. We're already seeing significant

22:04

developments also in other regions such

22:06

as Japan or the US to

22:09

deploy the data spaces approach. And

22:12

this is important because, as mentioned,

22:14

data doesn't recognize national or regional

22:16

borders, especially in today's digital economy.

22:19

And it is important that data

22:21

space initiatives will be able to

22:24

mature enough to provide the infrastructure

22:26

and necessary governance for international data

22:28

sharing at scale. I'm thinking

22:30

about the future now. How do you think CELO

22:32

data spaces might evolve? And what role do you

22:34

think they will play? And what will that mean

22:36

for our business listeners? Well, data

22:39

spaces are in a developing

22:41

stage. But what is important is also

22:43

that those data space developments remain to

22:45

be open and collaborative with

22:47

other initiatives in order to

22:50

then really start to actually work towards

22:52

a duration of data spaces or

22:55

an ecosystem of data spaces. In

22:58

that context, the point of interoperability is

23:00

really key. What we are also looking

23:03

at is the convergence of different architectures

23:05

and decisions regarding those points. Lastly,

23:08

I want to also mention that the key

23:10

there is really how do we empower the

23:12

different users in the end to

23:15

actually make use of the data spaces,

23:17

both in terms of the different businesses

23:19

and companies, but also citizens

23:21

involved. So currently, when we

23:23

are developing the design principles and

23:26

the architectures for data spaces, we

23:28

really need to take into account

23:30

also how the principles

23:32

of human-centric approach, for example, is embedded

23:34

into the setup. So when you say

23:36

human-centric approach, does that mean that I

23:39

would be empowered about how my data

23:41

is used by a business and I

23:43

would have some say over it? Definitely.

23:46

And there are different levels how to introduce

23:48

that in the design choices. I

23:51

mentioned that one of the participants, let's

23:53

say roles that are carried by

23:55

different actors in data spaces is the enabling

23:57

service. One of those enabling services is the

23:59

enabling service. could be an

24:01

intermediary that actually serves the interest

24:03

of individuals and citizens and actually

24:05

helps to have an overview how

24:08

data is being used as well

24:10

as manage the permissions and actually

24:12

getting the value back to individuals.

24:14

So in different parts of the

24:17

setup of the data spaces the

24:19

human-centric principles could be embedded. Big

24:24

thank you to Professor Ben Farand and

24:26

Silas Zep for sharing their insights on

24:29

digital sovereignty and data spaces. If

24:33

you're enjoying these kinds of insights

24:35

we have so many great articles

24:37

in Secure Futures, Kaspersky's digital magazine

24:39

about innovative tech for innovative leaders.

24:42

We've got an interview with a world-leading

24:44

expert on trust management, articles on the

24:47

benefits of digital trust and topics from

24:49

this season's Insight Story including making the

24:51

most of generative AI and the industrial

24:54

Internet of Things. You can find

24:56

the link to Secure Futures in the Insight Story show

24:58

notes. Digital

25:02

sovereignty is very closely aligned to

25:05

Kaspersky's own area of focus, cybersecurity.

25:08

So to give us some insight into

25:10

what that means I'm joined by Dr.

25:12

Armin Hasbini, Head of Research Centre, Middle

25:14

East Turkey and Africa for Kaspersky's global

25:16

research and analysis team known as Great.

25:18

They spend all their time working to

25:21

keep threats on the outside of our

25:23

networks. So I mean what

25:25

are the key points that businesses should be thinking about in

25:27

this area? Going back to

25:29

basics, digital sovereignty encompasses the idea

25:31

that a country or an organization

25:33

should have the ability to govern

25:35

its own digital space like

25:38

a country governs its borders. This

25:40

means that corporations, especially multinationals operating

25:43

in the digital space need to

25:45

provide the tools that allow the

25:47

compliance with laws and regulations

25:50

in every single country where they

25:52

operate. An example of such is

25:54

the Transparency Centers for example that

25:56

we have at Kaspersky deployed in

25:58

many countries around the world. And

26:00

these allow legal entities to come,

26:02

ask, verify, check code, procedures,

26:05

in order to make sure that

26:07

operations are running in compliance with

26:09

the country's laws. And

26:11

in case they have any needs or requests, they

26:14

can submit them, of course, and they will be

26:16

dealt with. And for those who

26:18

are actually developing new softwares and different

26:20

types of technologies, are there

26:22

other ways that they can think about

26:24

building in that user trust that perhaps

26:26

regulation isn't there yet? Almost

26:28

all countries in the world

26:30

nowadays have at least a certain

26:32

level of compliance requirements from technology

26:34

vendors. And cooperation is

26:38

the way to go, asking questions,

26:40

like trying to engage with

26:42

the legal entities that

26:44

are responsible for such. On

26:46

our side, as an example, we start

26:48

with sharing some information or intelligence about

26:51

recent threats or attacks that are happening

26:53

in the region, for example, around the

26:55

country or in the country itself. And

26:58

this brings in discussions

27:00

into a better place. We

27:02

start cooperating on our side and then

27:04

others do the same. Is it

27:06

right that people can get for free and

27:09

also on subscription some of these threat reports,

27:11

which helps to enrich their own data? Well,

27:13

we do publish a lot of our

27:16

threat intelligence findings and investigations, and

27:18

that allows better visibility for everyone

27:21

around the threats that are targeting

27:23

users and organizations. But

27:25

also it allows the cybersecurity community to build

27:27

on these findings and try to find the

27:30

other angles for these attacks. Are

27:32

there any specific digital sovereignty projects the

27:34

research community is involved in that you've

27:36

heard about? There are multiple

27:38

initiatives that are trying to

27:41

establish some kind of international

27:43

conventions or agreements around the

27:45

cooperation between vendors and

27:48

countries and even between vendors themselves.

27:51

It's a tough challenge to have

27:53

everyone agree on something globally speaking,

27:55

and we hope to see that in

27:57

the future. It would allow us to be able to do that.

28:00

allow much better safety and much

28:02

better cooperation around dealing

28:04

with cyber attacks and cyber attackers. Sadly,

28:06

we see a lot of

28:08

attacks still happening from the same attackers. We

28:11

know where they are. We

28:13

know who they are sometimes.

28:15

And that information is

28:18

shared with law enforcement agencies. However,

28:21

these people are not reachable. So

28:24

if there were more global standards which

28:26

digital sovereignty is helping to build, would

28:29

it actually be easier to fight cyber

28:31

crime, do you think? Absolutely. It's

28:33

like nuclear global agreements where

28:35

countries agree on how to

28:37

use nuclear energy and nuclear

28:40

technology. Well, we need something

28:42

like that for the cybersecurity. Because as of

28:44

today, everyone has access to the internet. Everyone

28:46

has access to tools that could cause damage

28:49

on the internet. They can download them and

28:51

try them and test them. We call them

28:53

script kiddies. Without the right collaboration and cooperation

28:55

around the world, there is almost no way

28:58

to take down starting

29:00

from underground operations or

29:02

underground groups that cooperate together

29:04

to achieve hacking operations on

29:06

especially bigger targets. But

29:08

also on companies that operate in what

29:11

we call the gray area. The

29:13

gray area is a gray legal

29:15

area where legal matters are not

29:17

very clear. Is hacking in

29:20

some cases allowed? Or is

29:22

the use of certain technology or the

29:25

collection of certain data from this client

29:27

or this user allowed? And

29:29

this is what we call the hack

29:31

for hire groups that are

29:33

currently becoming very trendy. Thank

29:38

you very much to Amin. An

29:41

important way to secure data and increase

29:43

customer trust happens at the design stage.

29:46

Consider security at the core of your technology

29:48

to make it harder and less profitable

29:50

for criminals to attack. This

29:53

is security by design, also known

29:55

as cyber immunity. Kaspersky

29:57

has cyber immune solutions for protecting

29:59

connected. cars, industrial manufacturing, smart cities

30:01

and more. There's a handy video

30:04

explaining more about this new way

30:06

of thinking about security. We'll

30:08

drop the link in the show notes so you can watch it. That's

30:15

it for this edition of Insight Story,

30:17

Tech Trends Unpacked, brought to you by

30:19

Kaspersky. Search for us wherever you

30:21

get your podcasts and click follow so you

30:23

don't miss an episode. And you really don't

30:25

want to. In this series we're

30:28

diving into the ethics of AI, working out

30:30

how to get real returns on your technology

30:32

investments and gazing into the future of the

30:34

ones on computing. If you

30:37

like what you're hearing, please leave us a rating

30:39

and give us an excellent review. It

30:41

really helps people find us and get the benefits

30:44

of all this great insight. If

30:46

you want to get ahead, you really can't afford to

30:48

miss it. Till next time,

30:50

goodbye. Goodbye. Ask the dolly. You

30:53

said you're concerned to operate by the same data

30:55

rules. Of course. How did

30:57

you do that? Are we in the same

30:59

vertical ecosystem? No things that I...

31:11

Hi Insight Story listeners. Gillian Boddington

31:13

here. Are you ready for an immersive

31:23

journey through the past, present and

31:25

future of the technologies that shape

31:27

our world? Look no further

31:30

than the second season of the

31:32

award-winning podcast from Tomorrow Unlocked by

31:34

Kaspersky, where we bring together global

31:37

experts to delve into the latest

31:39

advancements and trends. Across

31:42

season two, we cover a range

31:44

of fascinating topics including women in

31:46

gaming, the ever-growing prevalence of data

31:49

in and out of the home

31:51

in telegram to telepresence, the

31:54

metaverse, the concepts of

31:56

extended self and digital health in

31:58

extended self and our future digital

32:01

twins and the world of cyborg

32:03

and embedded technologies in cyborg shifts.

32:06

We also celebrate the contributions of

32:08

women in STEM and discuss

32:11

the need for greater representation in

32:13

the field. Whether you're

32:15

interested in digital wellbeing or

32:17

the latest innovations, Fast

32:19

Forward has got you covered. So

32:21

why wait? Search Tomorrow

32:23

Unlocked Fast Forward on your

32:26

smart speaker or your favourite

32:28

podcast platform and join us

32:30

on this incredible journey.

Rate

Join Podchaser to...

  • Rate podcasts and episodes
  • Follow podcasts and creators
  • Create podcast and episode lists
  • & much more

Episode Tags

Do you host or manage this podcast?
Claim and edit this page to your liking.
,

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features