Episode Transcript
Transcripts are displayed as originally observed. Some content, including advertisements may have changed.
Use Ctrl + F to search
0:03
The idea of digital sovereignty is really about
0:05
questions of control. Who is able to control that
0:07
data and on what terms? Data spaces
0:09
are a systemic approach to
0:11
increase trust and sovereignty in
0:14
sharing data. And no matter how much there is
0:16
a desire for increased control, in
0:18
reality, cooperation is absolutely essential. Hello
0:25
and welcome to Insight Story, Tech Trends
0:27
Unpacked for Business Leaders. The podcast that
0:29
gives you the insight you need to
0:31
make the right decisions about how to
0:33
use tech to benefit your organisation. I'm
0:37
Susie O'Neill and this is brought to
0:39
you by Kaspersky, the cybersecurity specialists. This
0:42
time we're asking, what
0:44
is digital sovereignty and why does it
0:46
matter to your business? In
0:53
our increasingly interconnected world, the concept of
0:56
digital sovereignty has become more and more
0:58
important. It's about a nation's ability to
1:00
govern and control its digital assets, data
1:02
and technologies. Yet it's also
1:05
a concept that has significant implications for
1:07
businesses as they navigate a landscape where
1:09
data is essentially the fuel that drives
1:11
everything they do. It
1:13
poses important questions. Who owns
1:16
and manages data? How do
1:18
national regulations affect data flowing across borders?
1:21
And what does that mean for data security,
1:23
compliance and market access? It's
1:25
about making strategic decisions on how you
1:27
handle and use data that could affect
1:29
future business value. So how
1:31
do management teams get the info they need to
1:33
make the right decisions? I'm going
1:35
to be joined by two people who can give us some
1:37
insights into all of this. Professor
1:40
Ben Farand is an academic whose work
1:42
focuses on the intersection of policy and
1:44
emerging technologies. And then Silas
1:46
Sepp is Director of Operations for MyDataGlobal,
1:48
an organisation helping to solve some of
1:51
the commercial world's digital sovereignty challenges with
1:53
the concept of data spaces. But
1:56
let's get a bit clearer on the issues we're
1:58
talking about. Dolly,
2:00
you're inside assistant. Dolly, just the
2:02
help I need. We're talking
2:04
about digital sovereignty and how it affects
2:06
businesses. Can you start with the definition?
2:09
Digital sovereignty is a country's jurisdiction
2:11
over its digital world and its
2:14
power to control its data, technology,
2:16
and online space. For
2:18
businesses, it means having the authority to
2:20
manage their data, decide where it's kept,
2:23
and who gets to use it. Why
2:25
is that so important? Data is
2:27
essential to businesses. A
2:29
recent McKinsey Global Institute survey says
2:32
data-driven organizations are 23 times more
2:34
likely to acquire customers and
2:36
19 times more likely to
2:39
be profitable. So I can see the importance
2:41
of control, but we live in a global economy.
2:43
How does that affect digital sovereignty? Different
2:45
countries have different rules about
2:47
data. Businesses must follow these
2:49
regulations, decide where to keep
2:51
data, deal with security, and
2:54
pick technology partners who respect
2:56
these rules. So for businesses,
2:58
is this particularly about data control?
3:01
Data control is significant. Businesses want
3:03
to decide who can see, use, and
3:06
store their data. With digital sovereignty, they
3:08
have more say in this. They
3:10
might need to keep data in specific
3:13
places or use certain tech to meet
3:15
a country's rules. Think of it
3:17
as having a lock on a box. Only certain
3:19
people should have the key. Okay,
3:21
thank you. Is this within your data regulations
3:23
to be sharing this info, your virtual key
3:26
with me here? Of course. We
3:29
operate by the same rules. I
3:31
have confirmed that. Nice
3:33
one. Thanks, Billy. So
3:35
let's find out more about exactly what
3:37
digital sovereignty means to companies operating in
3:39
this increasingly digital world. Professor
3:42
Ben Farand is a professor in
3:44
law and emerging technologies at Newcastle
3:46
University. His particular area of
3:48
research is lawmaking and political processes
3:50
concerning new and emerging technologies, including
3:53
in the field of intellectual property.
3:55
He joins me now. Hello, Ben.
3:57
Aye, thank you very much for having me. So then just building.
4:00
Moving on to some of the definitions we
4:02
heard there from Dolly, and again as a
4:04
way of helping people to understand, let me
4:06
pose a hypothetical. If a French company's data
4:08
is stored on services in America, which country's
4:10
regulations would that be subject to? Well,
4:13
that's an interesting question. Under the general
4:16
data protection regulation implemented
4:18
by the European Union, the general
4:20
principle is that if that data
4:23
is about European Union citizens and
4:25
there's any potentially identifying information there
4:27
that could be considered as either
4:29
personal data or sensitive personal data,
4:31
which is an item category of
4:33
protection, that data should be
4:35
governed by the EU's laws and policies
4:38
so long as that American company has
4:40
some sort of activity in the European
4:42
Union. Now there have
4:44
been measures and some of your
4:46
listeners may be familiar with things such as
4:48
the Shrem's decisions, where there have been discussions
4:51
about the extent to which the United States
4:53
is compliant with these principles and
4:55
whether there can actually be any sharing of data with the
4:57
United States on that basis. The
5:00
European Union has become increasingly concerned
5:02
with what happens with its data
5:04
outflows. This means that
5:06
if the data concerns European citizens,
5:09
then the European Union's position is
5:11
that that law is applicable to that data
5:13
regardless of where it's being sent to. Right.
5:16
Now, in sight story, we're aimed at businesses
5:18
trying to make those strategic decisions and they
5:20
don't always have the same priorities as those
5:22
nations. So what do you think are the
5:24
challenges for companies when it comes to operating
5:26
within these frameworks? The
5:29
challenge really more than anything else
5:31
is that digital sovereignty
5:33
is really a question of contemporary geopolitics.
5:36
So we're seeing that there are increasing tensions
5:38
between states, but there is
5:40
also a level of concern over the
5:42
power of big corporations as well. So
5:44
if you look at the origins of
5:47
the EU's digital sovereignty agenda, a
5:49
lot of this is based around the concerns
5:51
over the power of very big market players,
5:54
particularly in the United States, which they refer
5:56
to as GAFAM, which covers Google, Amazon, Facebook,
5:58
Microsoft. soft apple, but
6:02
also in terms of Chinese
6:04
companies as well. So companies
6:06
such as Baidu, Alibaba, Tencent,
6:08
etc. Now it may not always be
6:10
the case that the state actors and
6:12
the private actors are aligned, but
6:15
nevertheless the concern is that if data
6:17
is being transferred to other places for example,
6:19
regardless of the relationships that the European Union
6:22
or private sector actors may have in the
6:24
European Union, there may
6:26
nevertheless be the impact of
6:28
geopolitics and sort of national
6:30
regimes, regulations, or even just
6:32
policies that could have a
6:35
potential detrimental impact on those European Union
6:37
interests. So the idea of digital
6:39
sovereignty when applied to data is
6:41
really about questions of control. Who is able to
6:43
control that data and on what terms? So
6:46
corporations particularly operating within the European Union
6:48
need to be thinking very carefully about
6:51
who it is they're interacting with in other states, but
6:54
also having an eye to international politics as
6:56
much as just corporate reality. What is happening
6:58
in the world at this point in time
7:00
that could potentially shape the responses to particular
7:02
countries and the companies based within them at
7:05
some point in the immediate future? Companies
7:07
that are really thinking internationally. So
7:09
for example, if I am running a
7:12
tech firm in India, I want to
7:14
start doing more trade internationally. Within
7:16
the business, do you think it's important,
7:19
Ben, that there are people specifically dedicated
7:21
to looking at data security and involved
7:23
in the digital sovereignty discussion? Yes, very
7:26
definitely. Generally, they need to have somebody that
7:28
is aware of the general data protection regulation,
7:30
its requirements, and what it requires for that
7:32
company to be compliant. So
7:34
within the European Union and the UK,
7:36
because of the implementation of the GDPR
7:38
before the UK left the European Union,
7:41
we have data protection officers whose positions are
7:43
essentially one of data controller where they
7:45
have an idea of how exactly data should
7:48
be managed, what sort of security protocols that
7:50
should be over that data, the
7:52
purposes for which it should and should not be used. And
7:55
having somebody that is an equivalent of a data protection
7:57
officer within those companies that's able to provide that sort
7:59
of a oversight definitely makes
8:01
it easier for those companies to engage with the
8:03
European Union and the companies operating
8:05
inside it. And you said in
8:07
the past that the sovereignty agenda is much
8:10
about international trade, it is about the technology.
8:12
Can you talk a bit more about that
8:14
and what that could mean for business? The
8:17
issue with digital sovereignty, it goes
8:19
far beyond just the purely digital.
8:21
Digital sovereignty really covers the entire
8:23
supply chain from the critical raw
8:25
materials as a use for producing
8:27
semiconductors all the way through to
8:29
the provision of cyber security services
8:31
to end users. What
8:34
this means is that because there is increasing
8:36
geopolitical concern over things such as control
8:38
and access to these natural resources and
8:41
a good example of this is the
8:43
way that supply chains for semiconductors largely
8:45
seem to collapse at during certain points
8:47
during the lockdown where particular
8:50
German manufacturers found they were not able
8:52
to get the semiconductors required for the
8:54
automobile industry. As a result
8:56
there's been an increasing focus on the part
8:58
of the European Union but also increasingly China
9:00
and the US as well to
9:02
ensure control over these resources and to
9:04
ensure that in the event of more
9:06
supply chain shocks they are
9:08
able to still provide their companies and their
9:10
citizens with the technologies that are required. Interdependence
9:14
is just the nature of 21st century
9:16
life and no matter how much there
9:18
is a desire for increased control and
9:20
this idea of demonstrating the sovereignty of
9:22
different regional actors. In
9:24
reality the supply chains have become so
9:27
global, they've become so independent that cooperation
9:29
is absolutely essential. There is no way
9:31
that we can replace cooperation, trade
9:34
agreements, relationships with other states, other
9:36
companies within those states with
9:39
some system of what they call pure
9:41
strategic autonomy where you are completely self-sufficient.
9:44
In terms of how a lot of the supply chains
9:46
work this is just not feasible in the long term
9:48
which means there is always going to be an element
9:50
of trying to cooperate even if there is this idea
9:53
of digital sovereignty in the background. Yes, so
9:55
digital sovereignty isn't just about compliance is
9:57
it? It's about strategic planning and ethics.
10:00
So how can organizations make sure they're doing the right
10:02
thing and where can they get the info they need
10:04
to keep up with development? It's important
10:06
to bear in mind that digital sovereignty is essentially
10:08
still something that's happening very much at the level
10:11
of states. It's something that states are thinking about
10:13
rather than necessarily transferring in
10:15
all cases to specific concrete obligations
10:17
on individual companies. This will often
10:19
come downstream in the form of
10:21
particular regulatory requirements, for example. Also,
10:24
not only the sort of the stick of
10:26
regulation, but also carrots as well. So thinking about
10:28
the Chipps Act, for example, there
10:30
is a lot in this legislation
10:33
about investment, how companies can actually
10:35
cooperate and then seek funding
10:38
essentially for diversification of
10:40
supply chains, for
10:42
improving trade relations with third parties in
10:44
such a way that it actually helps
10:46
to build up general resilience at the
10:48
international level. Increased cooperation
10:50
there is really sort of central to
10:52
what's happening, but it is actually being
10:54
underscored by actions at the state level
10:56
to try and facilitate some of this
10:58
interstate trade. And let's
11:00
talk about something. Everyone seems to have an opinion
11:03
on social media. And nearly
11:05
every company in the world is using
11:07
one of those social media platforms to
11:09
communicate to their customers or prospects. How
11:12
do you actually affect what happens on platforms that
11:14
you don't have any control over? That's
11:17
a really, really good question. So
11:19
the European Union has recently passed something
11:21
called the Digital Services Act. The
11:24
Digital Services Act essentially is a set
11:26
of requirements placed on platforms
11:28
and search engines. The European Union
11:30
has made it relatively clear that
11:32
this legislation applies
11:34
to content on these platforms
11:37
that may be considered illegal. What
11:39
is required of the platforms is not that they're
11:41
able to deal with every single instance. But
11:43
what it is requiring is that
11:45
they have systems, again, of transparency, accountability,
11:48
and oversight, where they perform
11:50
risk assessments and are able to demonstrate how
11:52
exactly they are approaching these issues at a
11:54
broad level. Now, how this is relevant to
11:56
companies is that in terms of
11:59
brand reputation, it's not perspective,
14:00
that can increasingly become the international
14:03
standard. So the recent AI
14:05
summit that was held in Bletchley Park
14:07
in the UK called the Frontier AI
14:10
Summit that was hosted by Prime Minister
14:12
Sunak, where there has actually
14:14
been an agreement over particular uses
14:16
of AI between 28 different states,
14:18
but including all the big players
14:21
in the digital sovereignty debate such
14:23
as the EU, US, China, UK,
14:25
that there are certain uses of AI
14:27
that require global systemic responses. And
14:29
so despite the digital sovereignty agenda
14:31
and the amount of competition between
14:33
different states as to who sets
14:35
the rules. So we are
14:38
seeing that again, despite the discussion of digital sovereignty,
14:40
there are some issues where the big players are
14:42
relatively on the same page when it comes to
14:44
the things where they think that the risks
14:47
of non-intervention can actually be greater than
14:50
losing some sort of competitive advantage against other
14:52
states. In terms of
14:54
individual companies, and particularly in the field
14:56
of data sovereignty, something that's
14:58
increasingly developing is an approach to something called
15:01
Stedterated Computing, with the idea being that if
15:03
you were involved in trying to train
15:06
AI on different datasets, you
15:09
can actually minimise the data privacy implications
15:12
by having that done remotely, and then
15:14
by communicating essentially the outcomes of that
15:16
data at the central level. So everything
15:18
stays relatively at arm's length. So
15:20
there are new technologies that are also
15:23
arising as a result of these regulatory
15:25
interventions that companies may
15:27
be interested in pursuing further. The generative
15:29
AI has all sorts of other potential
15:31
implications as well, increasing questions over intellectual
15:33
property and the potential for these systems
15:36
to be infringing copyright, for
15:38
example, through to, again,
15:40
potentially data protection and security issues
15:42
that arise from having massively open
15:45
datasets being trained on material online,
15:48
which may or may not be factually correct. Yeah,
15:50
absolutely. Great discussion. And
15:52
we like to conclude every episode of Insight's
15:54
story with a final nugget of insight if
15:57
they're taking the very first step on the
15:59
journey in any... project. So
16:01
for a business owner or leader
16:03
taking their first steps into digital
16:05
sovereignty, what would your advice be to
16:07
them? What's the first thing they should be thinking about? I
16:10
think the first thing they should really be thinking about
16:12
is in the context of the
16:14
business they operate, what sort of data are they
16:16
likely to be using? What sort of data are they
16:18
likely to be collecting and where is that data likely to
16:20
be going? Once they've got a fairly
16:22
good idea of what that is, even if it's just at
16:24
the level of writing on a piece of paper where
16:26
they think the flows could be coming and going, think
16:29
about the potential implications of that. Think
16:32
about what security provisions you may need to put
16:34
in to ensure that data is protected within your
16:36
company as well as outside, as
16:38
well as again, if you're
16:40
dealing with a large entity such as
16:42
the European Union, what sort of regulatory
16:44
compliance issues could arise? So think very
16:46
much first about why do I
16:48
need this data in the first place? And
16:51
this question will then help you to define every other
16:53
step of that particular process. We
16:59
know that using data successfully is an
17:01
exceptionally powerful tool for businesses. It
17:04
drives strategy, service, innovation, growth, pretty
17:06
much all aspects of doing business.
17:09
But using data securely, fairly and in
17:11
a way that customers can trust is
17:13
not always easy. Data
17:15
spaces are becoming an increasingly important way
17:17
of addressing the issues involved in using
17:20
customer data safely and ethically. Dolly,
17:22
are you still there? I am
17:24
Dolly, your insight assistant. Great. What is
17:27
a data space? A data
17:29
space is a data relationship
17:31
between trusted partners who use
17:33
the same standards and guidelines
17:35
for data storage and sharing
17:37
within one or many vertical
17:39
ecosystems. That means sectors like
17:41
agriculture, tourism, energy or finance.
17:44
Data is not stored centrally but with
17:47
the members of the data space. These
17:49
might be data providers, users and
17:52
intermediaries. Data spaces
17:54
can be nested and overlapping. For
17:56
instance, a data provider can participate
17:58
in several data. data spaces at
18:00
once. And who's doing this? This
18:03
is happening all over the world, but
18:05
Europe is very active in promoting data
18:08
spaces. The International Data
18:10
Spaces Association was founded in Germany
18:12
in 2017 and regularly releases and
18:16
maintains a reference architecture model. That's
18:18
a software template for anyone wanting
18:20
to create a data space. Great,
18:23
thank you. That was quite a download. You can
18:25
head back to your own private data space to
18:27
rest. Sounds like this
18:29
could be a way of helping businesses navigate
18:31
the maze of digital rules and make sure
18:33
their data is safe and authenticated. So
18:36
to tell us more about data spaces, I'm
18:39
joined by Cilla Sepp, Director of
18:41
Operations for My Data Global, a
18:43
nonprofit dedicated to what they call
18:45
a human-centric approach to the use of personal
18:47
data. Hello, Cilla. Hello,
18:49
thank you for having me. So we
18:51
heard from Ben all about the importance
18:53
of data sovereignty in the use of
18:55
data for businesses. Can you tell us
18:58
a bit more about what your organization
19:00
is doing in this area? So I
19:02
start always by reminding that data spaces
19:04
are a systemic approach to increase trust
19:06
and sovereignty in sharing
19:08
data and using data across
19:10
different organizations and even across
19:12
sectors. So it's not simply
19:15
a yet another technological approach
19:17
to provide infrastructure for data sharing,
19:19
but really a combination of business,
19:22
legal, operational, functional, and technical
19:24
layers to really enable that
19:27
trustworthy data sharing. There
19:29
are a number of different data space
19:31
initiatives already existing. We know
19:34
many of those initiatives from the
19:36
market, like the Smart Connected Supplier
19:38
Network or Katena X in the
19:40
mobility sector, et cetera. And
19:43
this is also a historical context that
19:45
data spaces have spun out
19:47
of industrial developments. The European
19:49
data strategy and following funding
19:51
programs are now financing also
19:53
several database projects in various
19:56
sectors. And we at MyData
19:58
are particularly interested in involved
20:00
in the horizontal project called
20:02
Dataspace Support Center, as
20:05
well as in the preparatory action for the data
20:07
space for skills. In that
20:09
context, EU is also financing
20:12
several sectoral data spaces that
20:14
are preparing specifically for common
20:16
European data spaces that look
20:18
out for interoperability among different
20:20
initiatives in that space. Different
20:23
businesses and companies can, of course,
20:26
join existing projects and initiatives to
20:28
be one of the participants there,
20:30
either as a data provider or
20:32
a data user, maybe even as
20:35
a data space enabling service, or
20:38
then also start to explore opportunities
20:40
to create one data space with
20:42
its own collaborators, really depending on
20:44
the context, the business case that
20:47
they're involved in, et cetera. Brilliant.
20:50
So there's lots of different opportunities to get
20:52
involved. How could businesses find out where to
20:54
go and what would be
20:56
the best starting point to explore
20:58
participation in data space? So I
21:00
mentioned the project called Dataspace Support
21:03
Center. That is not only developing
21:05
the blueprint for common European data
21:07
spaces, but more importantly, even identifies
21:10
different data space initiatives and provides
21:12
support to them. So
21:14
I encourage you to explore the
21:16
websites of the project for an
21:18
overview of currently engaged initiatives, as
21:21
well as the resources available already
21:23
today. Moreover, do also check
21:25
out the contributing partners to
21:27
the support center, such as
21:29
International Data Spaces Association, the
21:32
GaiaX initiative, and others. And
21:34
of course, reach out
21:37
to also MyDataGlobal for more insights
21:39
and examples about human-centric approach to
21:41
data and data spaces. Great. So lots
21:43
of opportunities to get involved. Now, is
21:46
it just a European Union thing, data
21:48
spaces, or could businesses from other parts
21:50
of the world get involved in some
21:52
of these projects? So while the European
21:55
data strategy sets the course for emerging
21:57
data spaces, particularly in the European context,
22:00
It is definitely not limited to
22:02
Europe only. We're already seeing significant
22:04
developments also in other regions such
22:06
as Japan or the US to
22:09
deploy the data spaces approach. And
22:12
this is important because, as mentioned,
22:14
data doesn't recognize national or regional
22:16
borders, especially in today's digital economy.
22:19
And it is important that data
22:21
space initiatives will be able to
22:24
mature enough to provide the infrastructure
22:26
and necessary governance for international data
22:28
sharing at scale. I'm thinking
22:30
about the future now. How do you think CELO
22:32
data spaces might evolve? And what role do you
22:34
think they will play? And what will that mean
22:36
for our business listeners? Well, data
22:39
spaces are in a developing
22:41
stage. But what is important is also
22:43
that those data space developments remain to
22:45
be open and collaborative with
22:47
other initiatives in order to
22:50
then really start to actually work towards
22:52
a duration of data spaces or
22:55
an ecosystem of data spaces. In
22:58
that context, the point of interoperability is
23:00
really key. What we are also looking
23:03
at is the convergence of different architectures
23:05
and decisions regarding those points. Lastly,
23:08
I want to also mention that the key
23:10
there is really how do we empower the
23:12
different users in the end to
23:15
actually make use of the data spaces,
23:17
both in terms of the different businesses
23:19
and companies, but also citizens
23:21
involved. So currently, when we
23:23
are developing the design principles and
23:26
the architectures for data spaces, we
23:28
really need to take into account
23:30
also how the principles
23:32
of human-centric approach, for example, is embedded
23:34
into the setup. So when you say
23:36
human-centric approach, does that mean that I
23:39
would be empowered about how my data
23:41
is used by a business and I
23:43
would have some say over it? Definitely.
23:46
And there are different levels how to introduce
23:48
that in the design choices. I
23:51
mentioned that one of the participants, let's
23:53
say roles that are carried by
23:55
different actors in data spaces is the enabling
23:57
service. One of those enabling services is the
23:59
enabling service. could be an
24:01
intermediary that actually serves the interest
24:03
of individuals and citizens and actually
24:05
helps to have an overview how
24:08
data is being used as well
24:10
as manage the permissions and actually
24:12
getting the value back to individuals.
24:14
So in different parts of the
24:17
setup of the data spaces the
24:19
human-centric principles could be embedded. Big
24:24
thank you to Professor Ben Farand and
24:26
Silas Zep for sharing their insights on
24:29
digital sovereignty and data spaces. If
24:33
you're enjoying these kinds of insights
24:35
we have so many great articles
24:37
in Secure Futures, Kaspersky's digital magazine
24:39
about innovative tech for innovative leaders.
24:42
We've got an interview with a world-leading
24:44
expert on trust management, articles on the
24:47
benefits of digital trust and topics from
24:49
this season's Insight Story including making the
24:51
most of generative AI and the industrial
24:54
Internet of Things. You can find
24:56
the link to Secure Futures in the Insight Story show
24:58
notes. Digital
25:02
sovereignty is very closely aligned to
25:05
Kaspersky's own area of focus, cybersecurity.
25:08
So to give us some insight into
25:10
what that means I'm joined by Dr.
25:12
Armin Hasbini, Head of Research Centre, Middle
25:14
East Turkey and Africa for Kaspersky's global
25:16
research and analysis team known as Great.
25:18
They spend all their time working to
25:21
keep threats on the outside of our
25:23
networks. So I mean what
25:25
are the key points that businesses should be thinking about in
25:27
this area? Going back to
25:29
basics, digital sovereignty encompasses the idea
25:31
that a country or an organization
25:33
should have the ability to govern
25:35
its own digital space like
25:38
a country governs its borders. This
25:40
means that corporations, especially multinationals operating
25:43
in the digital space need to
25:45
provide the tools that allow the
25:47
compliance with laws and regulations
25:50
in every single country where they
25:52
operate. An example of such is
25:54
the Transparency Centers for example that
25:56
we have at Kaspersky deployed in
25:58
many countries around the world. And
26:00
these allow legal entities to come,
26:02
ask, verify, check code, procedures,
26:05
in order to make sure that
26:07
operations are running in compliance with
26:09
the country's laws. And
26:11
in case they have any needs or requests, they
26:14
can submit them, of course, and they will be
26:16
dealt with. And for those who
26:18
are actually developing new softwares and different
26:20
types of technologies, are there
26:22
other ways that they can think about
26:24
building in that user trust that perhaps
26:26
regulation isn't there yet? Almost
26:28
all countries in the world
26:30
nowadays have at least a certain
26:32
level of compliance requirements from technology
26:34
vendors. And cooperation is
26:38
the way to go, asking questions,
26:40
like trying to engage with
26:42
the legal entities that
26:44
are responsible for such. On
26:46
our side, as an example, we start
26:48
with sharing some information or intelligence about
26:51
recent threats or attacks that are happening
26:53
in the region, for example, around the
26:55
country or in the country itself. And
26:58
this brings in discussions
27:00
into a better place. We
27:02
start cooperating on our side and then
27:04
others do the same. Is it
27:06
right that people can get for free and
27:09
also on subscription some of these threat reports,
27:11
which helps to enrich their own data? Well,
27:13
we do publish a lot of our
27:16
threat intelligence findings and investigations, and
27:18
that allows better visibility for everyone
27:21
around the threats that are targeting
27:23
users and organizations. But
27:25
also it allows the cybersecurity community to build
27:27
on these findings and try to find the
27:30
other angles for these attacks. Are
27:32
there any specific digital sovereignty projects the
27:34
research community is involved in that you've
27:36
heard about? There are multiple
27:38
initiatives that are trying to
27:41
establish some kind of international
27:43
conventions or agreements around the
27:45
cooperation between vendors and
27:48
countries and even between vendors themselves.
27:51
It's a tough challenge to have
27:53
everyone agree on something globally speaking,
27:55
and we hope to see that in
27:57
the future. It would allow us to be able to do that.
28:00
allow much better safety and much
28:02
better cooperation around dealing
28:04
with cyber attacks and cyber attackers. Sadly,
28:06
we see a lot of
28:08
attacks still happening from the same attackers. We
28:11
know where they are. We
28:13
know who they are sometimes.
28:15
And that information is
28:18
shared with law enforcement agencies. However,
28:21
these people are not reachable. So
28:24
if there were more global standards which
28:26
digital sovereignty is helping to build, would
28:29
it actually be easier to fight cyber
28:31
crime, do you think? Absolutely. It's
28:33
like nuclear global agreements where
28:35
countries agree on how to
28:37
use nuclear energy and nuclear
28:40
technology. Well, we need something
28:42
like that for the cybersecurity. Because as of
28:44
today, everyone has access to the internet. Everyone
28:46
has access to tools that could cause damage
28:49
on the internet. They can download them and
28:51
try them and test them. We call them
28:53
script kiddies. Without the right collaboration and cooperation
28:55
around the world, there is almost no way
28:58
to take down starting
29:00
from underground operations or
29:02
underground groups that cooperate together
29:04
to achieve hacking operations on
29:06
especially bigger targets. But
29:08
also on companies that operate in what
29:11
we call the gray area. The
29:13
gray area is a gray legal
29:15
area where legal matters are not
29:17
very clear. Is hacking in
29:20
some cases allowed? Or is
29:22
the use of certain technology or the
29:25
collection of certain data from this client
29:27
or this user allowed? And
29:29
this is what we call the hack
29:31
for hire groups that are
29:33
currently becoming very trendy. Thank
29:38
you very much to Amin. An
29:41
important way to secure data and increase
29:43
customer trust happens at the design stage.
29:46
Consider security at the core of your technology
29:48
to make it harder and less profitable
29:50
for criminals to attack. This
29:53
is security by design, also known
29:55
as cyber immunity. Kaspersky
29:57
has cyber immune solutions for protecting
29:59
connected. cars, industrial manufacturing, smart cities
30:01
and more. There's a handy video
30:04
explaining more about this new way
30:06
of thinking about security. We'll
30:08
drop the link in the show notes so you can watch it. That's
30:15
it for this edition of Insight Story,
30:17
Tech Trends Unpacked, brought to you by
30:19
Kaspersky. Search for us wherever you
30:21
get your podcasts and click follow so you
30:23
don't miss an episode. And you really don't
30:25
want to. In this series we're
30:28
diving into the ethics of AI, working out
30:30
how to get real returns on your technology
30:32
investments and gazing into the future of the
30:34
ones on computing. If you
30:37
like what you're hearing, please leave us a rating
30:39
and give us an excellent review. It
30:41
really helps people find us and get the benefits
30:44
of all this great insight. If
30:46
you want to get ahead, you really can't afford to
30:48
miss it. Till next time,
30:50
goodbye. Goodbye. Ask the dolly. You
30:53
said you're concerned to operate by the same data
30:55
rules. Of course. How did
30:57
you do that? Are we in the same
30:59
vertical ecosystem? No things that I...
31:11
Hi Insight Story listeners. Gillian Boddington
31:13
here. Are you ready for an immersive
31:23
journey through the past, present and
31:25
future of the technologies that shape
31:27
our world? Look no further
31:30
than the second season of the
31:32
award-winning podcast from Tomorrow Unlocked by
31:34
Kaspersky, where we bring together global
31:37
experts to delve into the latest
31:39
advancements and trends. Across
31:42
season two, we cover a range
31:44
of fascinating topics including women in
31:46
gaming, the ever-growing prevalence of data
31:49
in and out of the home
31:51
in telegram to telepresence, the
31:54
metaverse, the concepts of
31:56
extended self and digital health in
31:58
extended self and our future digital
32:01
twins and the world of cyborg
32:03
and embedded technologies in cyborg shifts.
32:06
We also celebrate the contributions of
32:08
women in STEM and discuss
32:11
the need for greater representation in
32:13
the field. Whether you're
32:15
interested in digital wellbeing or
32:17
the latest innovations, Fast
32:19
Forward has got you covered. So
32:21
why wait? Search Tomorrow
32:23
Unlocked Fast Forward on your
32:26
smart speaker or your favourite
32:28
podcast platform and join us
32:30
on this incredible journey.
Podchaser is the ultimate destination for podcast data, search, and discovery. Learn More