Data Realities: 2017 & Beyond

Data matters. You don’t need to be a professionally trained futurist to see that a critical driving force in the global economy for the next 10 years will be data exploitation, creation of value with data, data-sharing and data protection. Executives need to examine what they know and how they think about data.

That’s because data matters, now more than ever. The recent CES in Las Vegas drove this home. If you hadn’t accepted the reality of the Internet of Things (IoT), you couldn’t escape it at CES 2017.

When the IoT becomes dominant, every object will be collecting and sharing data. Smart beds will be sharing data with smart thermostats, smart refrigerators will be sharing data with smart product packaging, and smart hairbrushes will be sharing data with human hair brushers. And everything will be a source of data.

Proof, a prototype wearable from Milo Sensors, measures blood alcohol level through your skin. Aspiring baseball superstars can use a virtual batting cage in which they practice against a database of every pitch ever thrown by a particular pitcher.

The nature of relationships will change. Everything will have a relationship with everything, objects with other objects, objects with their manufacturers, objects with their human users.

The robots showcased at CES 2017, such as Mayfield Robotics’ Kuri and LG’s Hub Robot, were notable not so much for what they could do as for the relationship their interface enabled, their personality.

The Yui interface of Toyota’s “Concept-i” concept car collects data that apparently can tell when the driver is happy or sad and adjust the mood inside the car accordingly. The NeuV concept vehicle puts Honda on a path that will “enable machines to artificially generate their own emotions,” according to the company.

Data is Power

For 420 years, no one has challenged Sir Francis Bacon’s formulation that knowledge is power. But in 2017 and beyond, data is power. The differences run deep. Knowledge is gained through study and experience. Data is merely collected, and in such a quantity that no human mind can begin to contain it.

And those who collect it are divvying up the spoils in a data cold war, with Google accumulating a data set that reflects what we want to know, Amazon what we buy, Apple what we listen to and where we go, and Facebook how we connect. What is the Geneva Convention that governs what can be done with that data? And, with carmakers entering the fray with a focus on what we feel, are there different rules for collecting, managing and acting upon emotional data?

Who determines what data will be shared with what devices under which circumstances? Will we need a database to keep track of all the devices we have relationships with, another of which devices have relationships with which other devices and yet another of data permissions we have granted and revoked? A question looming in the not-so-distant future is how much of machine-to-machine language humans will need to understand.

Two ways of considering the balance of power between individuals and the data colossi are data empowerment and transparency. Data empowerment is the degree to which you can decide who knows what about you and when, now and in the future.

Transparency is how knowable an individual or organisation is. In this early stage of our digital society, individuals are becoming more and more transparent, while some organisations are becoming more opaque. But marketers tell me that consumers will influence companies by valuing transparency.

To be successful, brands will have to be transparent about diversity in their workforce, sources of their raw materials, their eco-behaviors and more.

Sadly, although we live in a data-defined reality, the vast majority of executives leading major institutions today have received no formal training in data management.

It will be fascinating to see what path individuals and organisations follow as they seek to hone and enhance data skills and rectify data deficiencies. Will universal measures of data skills be created? To be employable in the future, will one need to possess as-yet-un-agreed-upon data skills certifications?

The bottom line is we exist at a moment when individuals have infinite choice regarding what data they wish to collect, analyse and act upon.

Computerworld

 

« Google's New AI System Unscrambles Pixelated Faces
Does Russia’s Election Meddling Break International Law? »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Centre for Secure Information Technologies (CSIT)

Centre for Secure Information Technologies (CSIT)

CSIT is a UK Innovation and Knowledge Centre (IKC) for secure information technologies. Our vision is to be a global innovation hub for cyber security.

SolarWinds

SolarWinds

SolarWinds as a worldwide leader in solutions for network and IT service management, application performance, and managed services.

Academic Centres of Excellence in Cyber Security Research

Academic Centres of Excellence in Cyber Security Research

The ACE-CSRs scheme is part of the UK Government’s National Cyber Security Strategy, working with academia and industry to make the UK more resilient to cyber attacks.

Wooxo

Wooxo

Wooxo provides business security and continuity solutions to protect business data for organisation of all sizes.

PRODAFT

PRODAFT

PRODAFT, Proactive Defense Against Future Threats, is a cyber security and cyber intelligence company providing solutions to commercial customers and government institutions.

Cybersecurity Coalition

Cybersecurity Coalition

The mission of the Cybersecurity Coalition is to bring together leading companies to help policymakers develop consensus-driven policy solutions to achieve improvements in cybersecurity.

Highland Capital Partners

Highland Capital Partners

Highland Capital Partners is an early stage venture capital firm focused on category-defining businesses in consumer and enterprise technology, including cybersecurity.

Coveware

Coveware

Coveware helps businesses remediate ransomware. We help companies recover after files have been encrypted, and our analytic, monitoring and alerting tools help companies prevent ransomware incidents.

SessionGuardian

SessionGuardian

SessionGuardian (formerly SecureReview) is the world's first and only technology which ensures second-by-second biometric identity verification of your remote user, from log on to log off.

Start Left® Security

Start Left® Security

From Posture to Performance—The System That Improves How Software Gets Built.

HolistiCyber

HolistiCyber

HolistiCyber provide state-of-the art consulting, services, and solutions to help proactively and holistically defend against a new era of constantly evolving cyber threats.

BigBear.ai

BigBear.ai

BigBear.ai delivers high-end analytics capabilities across the data and digital spectrum to deliver information superiority and decision support.

Birch Cline Cybersecurity

Birch Cline Cybersecurity

Birch Cline specializes in helping Local Government and Education agencies, as well as mid-market organizations, build and maintain successful cybersecurity programs.

ASRC Federal

ASRC Federal

ASRC Federal’s mission is to help federal civilian, intelligence and defense agencies achieve successful outcomes and elevate their mission performance.

SafeLiShare

SafeLiShare

SafeLiShare’s data security platform unifies encryption strategies for organizations with hybrid and multi-cloud infrastructures, ensuring data is secure regardless of its location.

Krash Consulting

Krash Consulting

Krash Consulting is a premier provider of Cyber Security solutions, offering a range of services to safeguard businesses against cyber-attacks, minimize fraud, and protect brand reputation globally.