2. How can you safely get the benefits of the Industrial Internet of Things? Insight Story

2. How can you safely get the benefits of the Industrial Internet of Things? Insight Story

Released Wednesday, 25th October 2023
Good episode? Give it some love!
2. How can you safely get the benefits of the Industrial Internet of Things? Insight Story

2. How can you safely get the benefits of the Industrial Internet of Things? Insight Story

2. How can you safely get the benefits of the Industrial Internet of Things? Insight Story

2. How can you safely get the benefits of the Industrial Internet of Things? Insight Story

Wednesday, 25th October 2023
Good episode? Give it some love!
Rate Episode

Episode Transcript

Transcripts are displayed as originally observed. Some content, including advertisements may have changed.

Use Ctrl + F to search

0:01

I don't want my medical device to kill

0:03

me because somebody hacked it. They can send

0:06

wireless alerts. So if they detect

0:08

a problem, they can send it.

0:12

Hello

0:12

and welcome to Insight Story,

0:14

tech trends unpacked for business leaders. The

0:17

podcast that gives you the insight you need

0:19

to make the right strategic decisions about

0:21

how to use the right tech for your organization.

0:24

Brought to you by Kaspersky,

0:25

the cybersecurity specialists. This

0:27

time we're asking

0:29

how can you safely get the benefits

0:31

of the industrial Internet of Things?

0:38

Now, the industrial Internet of Things, or IOT,

0:40

is the place where the Internet meets industry.

0:43

Smart devices sharing data to help companies

0:45

make better decisions. But what

0:47

about keeping those systems secure? In a bit,

0:50

I'll be talking to two people about exactly

0:52

that. Chris Kubeska from HyperSec,

0:55

whose interest in digital security started

0:57

when she hacked into the US Department of Justice

0:59

when she was 10. God, I was playing the

1:01

recorder at that age. And Alison

1:04

Peace from Medtronic, who is responsible

1:06

for helping thousands of hearts to

1:07

keep on beating. But first, to make

1:10

sure we understand what we mean when we say I-I-O-T,

1:13

we have our own smart device.

1:16

I am Dolly, your insight assistant.

1:19

Hello Dolly. Thank you for coming by. Hello

1:21

Susie. Now this time, I need to know

1:24

more about the industrial Internet of Things,

1:26

the I-I-O-T. I-I-O-T

1:28

refers to any network of Internet connected

1:30

machines that share information.

1:33

Sensors and devices collect real-time

1:35

data from Internet connected physical

1:38

assets. Data is uploaded

1:40

and analysed. This tech is

1:42

used in sectors like farming, manufacturing,

1:46

healthcare and transport. So

1:48

this is a lot more than your smart fridge being

1:50

able to tell you that you're out of milk.

1:53

The principle is the same, but I-I-O-T

1:56

is at a bigger scale. Devices

1:58

can share data in real time. This

2:01

can all happen

2:03

without a human. So

2:12

it's about efficient use of resources? Yes,

2:15

and also safety. IIOT

2:18

can check if a machine gets too hot

2:20

or if there's a gas leak in a factory.

2:23

It helps prevent accidents. So

2:25

talking of safety, what happens if someone

2:27

hacks into one of these systems? IIOT

2:30

systems must be extremely secure.

2:33

Use in question to protect data

2:35

and have security teachers work strong

2:38

passwords, legal and acting, and

2:40

follow-up to keep hackers out. Alright,

2:44

have you ever been hacked? Thank you

2:46

for your concern, but I have extensive

2:48

safety mechanisms in place. I

2:50

am very secure by design. I'm

2:54

very glad to hear it. Thank you for your help. Goodbye. So

2:59

here to talk more about getting the most out of

3:01

the IOT and doing it as securely

3:03

as possible, we have Kris Kubezka.

3:06

She's a computer security researcher and cyber

3:09

warfare specialist who no longer

3:11

hacks into those government departments unless

3:13

they ask her to. She has provided

3:16

essential support to many companies and countries,

3:18

including getting the Saudi company Aramco's

3:21

network back up and running after it was

3:23

hit by one of the world's most devastating Shamoon

3:25

attacks. That's an aggressive malware

3:28

virus. She's now based in the Netherlands

3:30

and is CEO of HyperSec, a

3:32

security firm she founded in 2015,

3:35

and the author of Hack the World with OSINT,

3:38

designed to help companies protect their systems.

3:41

Hello, Kris. Hello, everyone, and thank you

3:43

so much. This is wonderful. And

3:45

Alison Peace, who is patient management

3:47

operations manager for UK and Ireland

3:49

at Medtronic. They're a global developer

3:52

and producer of medical devices and therapies

3:54

such as insulin pumps, pacemakers

3:56

and implantable defibrillators. Their

3:59

equipment is already. making full use of this

4:01

kind of connectivity. Hello, Alison.

4:03

Hi, thanks for having me. Happy to be

4:05

here today. So starting with you, Chris, your

4:08

focus is on the safety and security of networks.

4:10

But before we talk more about that, what kinds

4:12

of industries are really making the most use of this technology?

4:15

One of the industries that is doing this is,

4:18

for example, the maritime industry. So

4:20

if you want to know, should

4:23

that ship go through that storm to save

4:25

fuel, or where the whole crack up,

4:27

they now have IIOT sensors

4:29

that are placed on the hull to report

4:32

back. Also space, big

4:34

into space, and space is actually propelling

4:36

us towards the normalization of

4:39

usage of things like 6G and 7G.

4:41

And 6G has direct

4:43

application to in-body

4:46

internet of things, medical devices, from

4:49

nuclear power plants, water, agriculture,

4:52

as you had mentioned. And these types

4:54

of things can unfortunately be manipulated

4:56

for nefarious purposes,

4:59

because I have to put my evil devil horns

5:01

on for the cyber warfare part. It's a very

5:03

interesting space. Pretty widely varied

5:06

uses of industrial IOT. And you were

5:08

talking about medicals. So turning to you, Alison,

5:10

tell us a bit more about Medtronic and the devices

5:12

you make and the kind of data that you're providing.

5:15

The part of Medtronic that I work is cardiac rhythm

5:17

management. So these cardiac devices help

5:20

people with slow hearts, with fast hearts,

5:22

with hearts that may

5:24

stop abruptly, you know, like a cardiac

5:26

arrest. In the UK alone, there's

5:29

probably more than 100,000 patients

5:32

in a year receiving some sort

5:34

of implanted cardiac device. These

5:36

patients have then a lifetime

5:38

of constant hospital checks. So

5:40

you can sort of start to sense the burden that

5:42

that places on the healthcare services. So

5:45

remote

5:45

monitoring for cardiac devices came

5:47

about almost 20 years

5:50

ago, but in a very basic form. The

5:52

devices are now more efficient, they can send

5:55

wireless alerts. So if they detect

5:57

a problem, they can send it, the patients

5:59

are better.

5:59

look tester, the outcomes are better, you

6:02

know, they use healthcare less because

6:04

they don't need to go into hospital. But what's

6:06

also essential is, as Chris alluded to,

6:08

that these things are safe. You

6:10

know, you're no longer keeping the patient data

6:13

within the

6:13

four walls of the hospital. So, Metronica

6:16

really giving us at the forefront of the

6:18

telemedicine revolution. But that security

6:20

is quite important. So, turning to you, Chris,

6:22

let's talk about some of the security measures

6:25

that smart system because it's involving people,

6:27

access control, encryption, obviously very

6:30

important with those devices. What

6:32

do you think of the focus areas for anyone setting

6:34

up this kind of system to be aware of from the

6:36

security side? Well, understand

6:39

that your procurement department is going to be

6:41

looking for the best deal, which is going to be the least

6:43

expensive deal. Your attorneys,

6:46

both in-house and externally, may

6:48

not have enough experience specifically

6:51

with cyber or privacy. And that's quite important

6:53

with medical. The best deal might

6:56

mean that someone didn't look at the

6:58

fact that you didn't require an annual

7:01

report done by an external, say,

7:03

penetration company or, you know, risk company,

7:06

whatever might apply into

7:08

that so that you know what you're getting from your supplier.

7:11

A lot of the IoT and industrial

7:13

IoT systems, they will come

7:15

with an older version of, say, Linux

7:17

kernel. And what this means is you're

7:19

getting an older operating system that

7:22

doesn't have all of the various security

7:24

settings you would want out of the box. And

7:26

if you don't know how to apply those things, or

7:28

if the company that you bought it from doesn't have

7:31

a secure way to update

7:33

the software because, you know, things change, things

7:36

get tweaked. Well, same thing you have to do with your

7:38

security settings and also your privacy

7:40

settings because the laws are changing.

7:43

These are some of the risks. Know what you're buying

7:45

so that you can actually plan ahead

7:48

and mitigate and minimize for those risks. Some

7:51

of these technologies we're talking about, both

7:53

medical and other industries, they've never

7:55

been placed on the internet, have they? They haven't even

7:57

been designed for the internet world. particular

8:00

risk for those types of companies, they need to

8:02

invest more. The internet in and

8:04

of itself was not meant for the internet in and

8:06

of itself, how it is right now. This

8:09

is a good question for Alison. What

8:12

are these additional things that you have to put

8:14

in place for devices that

8:17

are now fitting in and trying

8:19

to innovate and help human beings but

8:21

weren't meant in particular for these types

8:23

of systems to connect to?

8:25

The devices themselves, they're completely

8:27

different now to those devices that I talked about 20

8:30

years ago. It's been important to incorporate

8:32

an

8:32

encryption module into

8:35

those devices to make

8:36

sure that actually there's no readable data

8:38

from the devices. The devices themselves aren't connecting

8:40

to the internet. They're using a pass-through,

8:43

a monitor or an app. The data

8:45

that's in the device

8:46

is encrypted and the data

8:48

that goes through the best-side

8:50

monitor or the app is

8:52

pass-through. Someone was using a patient app

8:55

and they lost their

8:55

mobile phone. They're not going to find anything

8:57

on that phone. The clinician accesses

9:00

the data through a secure website, password

9:02

protected and also in

9:04

all those different steps, whether it be in the

9:06

device, whether it be in the patient app and

9:09

then at the secure server where the clinician

9:11

is accessing the data, it needs to be

9:13

as secure as it can be. I know, Chris, there's

9:15

people like you that you hope

9:18

to not be able to hack into the systems and

9:20

companies like Natronic obviously

9:22

have similar experts

9:25

that are always trying to challenge the

9:27

things that are produced. And how do you help the

9:29

customer, the end customer, the patient have

9:32

that trust that what they're putting into their body,

9:34

sometimes physical devices, is

9:36

trustworthy? How do you communicate

9:38

that back to them? I think just reminding

9:40

them, you know, we are not in charge of

9:43

what the hospitals do. We supply these services,

9:46

but what's really important to mention

9:48

and the same, I'm sure, is true of many countries

9:50

that can only speak for the UK and Ireland here where

9:52

we have national health services

9:55

with really strict controls on what

9:58

third parties they'll engage with, what systems they can use. and they

10:00

use, there's all these rules and regulations and

10:02

things that you have to have in place in order to

10:05

partner with hospitals. And if you

10:07

don't have it, you're told to go away

10:10

and come back when you've got it. Sure. And as Alison says,

10:12

Chris, these standards are very important.

10:14

So what can companies do regarding testing

10:17

and standards that they should be expecting from third parties

10:20

to make the devices more secure? Some

10:23

of the things that Advise Incorporated

10:25

is looking at the contract.

10:28

It should fit a minimal amount

10:31

of encryption as per the date

10:33

of this contract. So you're not specifying

10:36

it's got to be this number, that number,

10:38

something technical, but

10:41

what the requirements

10:43

and what the standards are at that time. So that

10:45

when you renew, the expectation

10:47

is to still keep those standards.

10:49

Little things like that. Obviously,

10:52

ensuring your suppliers are also

10:55

practicing good data security and

10:57

data privacy because you don't want your intellectual

11:00

property somehow being waylaid

11:02

between the factory floor and

11:04

someone else getting a chip set. Even in the space

11:07

industry and the aviation industry,

11:09

they have found fake parts and it's

11:12

a big problem. So these are some of the other

11:14

things that a board might not think

11:16

about, which would be

11:17

quite damaging to the reputation. Definitely

11:20

engage with people like

11:22

me. There's other groups like the

11:24

biohacking group, which

11:26

goes

11:26

around to various different conferences.

11:28

So those are some of the

11:30

things as well as ensure

11:33

that you have enough

11:35

of a relationship with the supplier that if something

11:38

comes out, if someone contacts

11:40

you and says, hey, we can do this, that and

11:42

the other and you're like, uh-oh, be prepared,

11:46

have a sufficient responsible

11:48

disclosure policy. For example, in the Netherlands,

11:50

it's a requirement for most companies to

11:52

have that. That's not international,

11:55

but have that preparation and know that you can

11:57

contact your supplier. You,

12:00

Alison, there's many stats out

12:02

there about the huge volume

12:04

of IoT devices out there in the world. 50 billion

12:08

is one stat and many terabytes

12:10

of data being processed all the time. In

12:13

the case of Medtronic, where does that data

12:15

actually go and how are you protecting it?

12:17

Obviously, Medtronic is a US company.

12:20

I mean, it's

12:20

a global company, but its home is in the US.

12:22

And what was really important when we started

12:25

using remote monitoring,

12:26

because the server at the time

12:28

was in the US. And as we've talked about,

12:30

there's different data,

12:31

privacy and security laws, you know,

12:33

when you travel globally, there's different

12:35

sort of rules and regulations. And what

12:38

wouldn't have flown at all is

12:40

coming to Europe with, we're going to send

12:42

all this data to the US and it's going to sit there.

12:45

So there was a lot of investment in having

12:47

a European housing of that data.

12:50

And Chris, turning to you, you've talked about some of

12:52

the big challenges that are out there with the

12:54

industrial IoT systems. But what's the best

12:56

way for companies to actually address these

12:58

challenges? And where could they get some

13:01

advice

13:01

from trusted

13:02

parties? There are a few different

13:05

trusted parties that you can try to

13:07

look at. Try to set up a relationship

13:10

with the country that

13:12

your main operations are with. And what I

13:14

mean by that is in case there is some sort

13:16

of cyber issue, you

13:18

can contact what's called a Computer

13:20

Emergency Response team in the

13:23

United Kingdom. They can actually

13:25

put you in touch if you don't already have

13:27

that relationship

13:28

with some of the providers

13:30

of various trusted services when

13:33

these types of cybersecurity incidents occur.

13:36

It's good to go,

13:37

hi, I'm company Zed

13:40

or Z for the American listeners. And

13:42

this is our type of operation. Could we

13:45

set up a meeting to know what websites

13:47

we'd be looking at for alerts? What should

13:50

we do if something happens, etc,

13:52

etc. That is one of the biggest things

13:54

because that can open doors if you don't

13:57

really know where to look. But try to

13:59

do this ahead of time. Also, your lawyer

14:02

will suddenly become your best friend. I

14:04

know that's not a common saying, but

14:06

your lawyer, even though they may not have

14:09

experience with cyber, they will have colleagues

14:11

that they can put the word out to in a private

14:13

way.

14:14

You talked about a lot of different industries that you've

14:17

worked in using IoT. Do

14:19

you think the technology is actually moving faster than

14:21

the law in this case, or are we keeping

14:23

a good pace? Oh, yeah, definitely

14:25

moving faster than the law. But that's what

14:27

you get from technological innovation.

14:30

Although it is moving at a fast pace, there

14:33

are some guidelines, frameworks,

14:36

and more and more governments and industry

14:38

are aware of these potential risks. So

14:41

the likelihood of something terrible,

14:44

terrible happening, lessons and lessons and

14:46

lessons, we're actually tackling

14:48

this problem. And so, Alison, Medtronic's a

14:50

global company, and that means you're dealing with

14:52

a lot of different rules and regulations

14:55

when it comes to your suppliers and the data.

14:57

So standardization plays a role, but also

15:00

what in the security industry, of course, secure by design.

15:02

So building that into the

15:05

start of the project. Of course, you

15:07

know, we can come out with national

15:10

legislation that says, I want

15:12

the data to come from your device in this

15:14

format.

15:15

And actually, our devices are designed to send

15:17

it in this format. It even is beyond

15:20

even the security of the data. It's

15:22

often the format of it. At the start,

15:24

those first wireless devices that we

15:27

launched almost 20 years

15:29

ago now are

15:30

not the wireless devices that we sell

15:32

now. You

15:32

know, everything's changed about them, even

15:34

the method of communication, and not

15:36

just the data security,

15:38

but also efficiency on that device.

15:40

So Chris, what are your thoughts on what those selling

15:43

industrial reality devices, what should they

15:45

be doing as part of their best practice? I

15:48

think they should start applying

15:50

what I would call easy standards. We had

15:53

a workshop at the United Nations

15:55

Internet Governance Forum about this with

15:57

Internet of Things and industrial Internet of Things.

15:59

It's hard for both consumers and companies

16:02

to know, does it meet a minimum

16:04

level of standards for security?

16:06

Can it be updated, for example, all

16:09

the way up to, say, something you would use for

16:11

medical stuff? This would be the highest standard.

16:14

I don't want my medical device to kill me because

16:16

somebody hacked it. And we had proposed

16:19

something as easy as, say, a traffic light system

16:21

or something like that so that

16:23

you know, all right, it meets at

16:25

least this minimum standard. It

16:27

might cost 10 euro more, but you

16:30

know that the risk is

16:32

probably more

16:32

minimized. So I would love to

16:35

see as an industry group for

16:37

some of those things

16:38

to start occurring.

16:39

So, Alison, just turning to you finally,

16:42

you talked about some very exciting stuff that's happening

16:44

right now at Medtronic, but what are your plans for

16:47

the near future? I mentioned a patient

16:49

app.

16:50

This is new to us, you know, and at the moment

16:52

is with Apple and Samsung. And also

16:55

the population will see growth. I

16:57

think 10 years ago, maybe 3% of

17:00

people over 65 had a smartphone, whereas

17:02

then 10 years on, they're the people who were 55 before,

17:04

you know, and now it's more sort of 80, 90%. It's

17:08

the healthcare outcomes of patients that are more

17:10

engaged in their healthcare

17:12

with always awareness

17:15

of how secure we need to be, obviously.

17:17

Great. So we've had a great conversation today. Thank you for

17:19

joining me. We always like to give an insight story,

17:22

a final thought, that golden nugget

17:24

of insight. So if you were going to give

17:26

a piece of advice to perhaps a CEO

17:29

of a company who's thinking of investing in the first

17:31

time for industrial IoT or

17:33

upgrading their systems, what

17:35

advice would you give them to start with? Let's start with

17:37

you, Chris. Well, I would say prepare

17:40

for the worst, but plan for the best. Think

17:43

about the different risks that are going to be associated

17:46

with this. From a business standpoint,

17:48

it's all about risk. Hackers use the term

17:51

exploitation, so do people with MBAs.

17:54

It's just a different way of thinking. So

17:56

start incorporating these types of things.

17:59

Hey, what would... the plan if this

18:01

happened. It doesn't have to be super long. It

18:03

can be incorporated directly into your current disaster

18:05

recovery plan. Speak with your suppliers.

18:08

If you don't feel comfortable enough

18:11

with speaking about

18:12

cybersecurity and privacy with your supplier,

18:14

you need to look for a new supplier.

18:16

Take a look at companies

18:19

and suppliers who participate

18:22

in different types of security conferences

18:25

or have their products looked

18:27

at by groups that do various

18:30

hacking villages. And if they're actively

18:32

looking at these things, that gives a good

18:34

deal of credence. And what about you,

18:36

Alison? What's the top level advice

18:39

you might give to a CEO investing in IoT

18:41

for the first time? I couldn't agree

18:44

more with Chris and those points. And obviously,

18:46

speaking from the other side of it, as a third

18:48

party supplier to the healthcare

18:50

industry, I think that partnership, that

18:52

understanding that if there's some

18:55

standardization of what is required,

18:57

and it's very clearly communicated

18:59

in that partnership, and we can comply quite

19:02

easily, open communication,

19:05

clear guidance and criteria of

19:07

what's needed is essential.

19:12

Big thank you to our guests, Chris Kubeska

19:14

from HyperSec and Alison Peace from Medtronic.

19:17

They're very useful insights into the industrial

19:19

IoT and keeping it secure. If

19:23

you're enjoying these kinds of insights, we have

19:25

many stories about the latest business tech

19:27

in secure futures. It's Kaspersky's

19:30

digital magazine about innovative top,

19:32

innovative leaders. And we've got articles

19:35

about new technologies in manufacturing

19:37

like digital twins, a video

19:39

and another interview with Chris again about the internet

19:42

of things and cyber threats in space, and

19:44

articles from last season's insight story,

19:46

including blockchain and digital truth.

19:49

You can find the link to secure futures in the

19:51

insight story show notes. The

19:56

fresh developments in the digital world are exciting,

19:59

but as new technology arrives, so

20:01

do new threats to our online safety. Providing

20:04

protection against those kind of threats is,

20:06

of course, what Kaspersky is all about. So

20:09

to give us some insight into the cybersecurity

20:11

challenges of the industrial Internet of Things and

20:13

how to keep it secure, I'm joined

20:16

by Dr. Armin Hazbini, Head

20:18

of Research Center, Middle East, Turkey and

20:20

Africa for Kaspersky's Global Research and

20:22

Analysis team, known as Great. They

20:25

spend all their time uncovering and understanding

20:27

the cyber threats that face us. So

20:29

Armin, give us an idea about the scale of

20:32

industrial IoT at the moment.

20:33

Well, according to a recent Kaspersky

20:36

study, more than 60% of

20:38

businesses maintain and run IoT

20:41

solutions for their own business and for their

20:43

clients. And a lot of these organizations

20:45

say that their IoT systems are not fully

20:47

protected. Close to half of the businesses

20:50

say that. And considering

20:52

that everyone's biggest concern is not

20:54

getting hacked, not having a breach or a leak

20:56

of data, not having the operations crippled

20:59

or destroyed. Well, security

21:01

requirements need to be in place for everyone.

21:04

Right. Though this is still not the case

21:06

and cybersecurity technologies are still

21:09

emerging on this front, specifically

21:11

for IoT devices and industrial

21:14

IoT devices. When we talk about

21:16

industrial IoT devices, we talk critical

21:18

infrastructure, water, power, energy

21:21

or others, and a shutdown or

21:24

a damage could cause a lot of harm. Sadly,

21:27

though, as per one of our surveys as

21:29

well, a third of these organizations

21:32

blame a lack of security or

21:34

a lack of budget for their inability to

21:36

deploy cybersecurity requirements for

21:38

all of their IoT systems. And

21:40

that is definitely a concern. Like

21:43

it makes us ask questions. If it

21:45

is not the resources or the employees, and

21:48

if it is not the budget, then what is

21:50

it? Is it the strategy? Is

21:52

it convincing top management? And questions

21:56

still do not have answers for many

21:58

organizations, sadly.

21:59

So what recommendations, if

22:02

we're talking not necessarily to a CSO,

22:04

an experienced person, but more to someone

22:06

on the board, what would you recommend that they

22:08

should be asking the questions of their IT

22:10

security team to really make sure these technologies

22:13

are safe?

22:13

Well, we should start with asking

22:15

technology vendors, because

22:17

technology vendors are still racing

22:19

for features and ignoring cybersecurity

22:22

requirements, like necessity requirements.

22:25

And then when a solution is demonstrated out of the

22:27

box, it's magnificent as a butterfly.

22:30

However, once implemented and confronting

22:32

real-life scenarios, it's vulnerable as

22:35

a butterfly as well, sadly. I

22:37

think on our side, we believe in technology that is

22:39

secure by design, secure in development

22:41

and in implementation. That

22:44

makes attacks worthless for

22:46

attackers, for criminals. On

22:48

our side, we have our Kaspersky OS and

22:51

the cyber immunity strategies. And

22:53

we've worked on a number of projects like railways,

22:56

interference protection or protecting power

22:58

grid vehicle charging devices. The

23:00

challenge starts on the top

23:03

level in each organization. It

23:05

becomes a priority on the top level, and

23:07

then it becomes translated into

23:09

policies, guidelines and practical methods

23:12

and methodologies used by technology

23:14

vendors and the operators inside

23:17

the organization, which is offering this IoT system

23:19

or solution.

23:22

Thank you very much to Amin. If

23:25

you're in the manufacturing, industrial or critical

23:27

infrastructure business, it really

23:29

is critical to make security a top

23:31

priority. Kaspersky ICS

23:33

CERT offers unique services in industrial

23:36

automation systems and Internet of Things

23:38

cybersecurity.

23:39

On the website, you can download the latest

23:41

free research reports and get advice about

23:43

protecting your industrial

23:44

enterprise. Check the link

23:46

in the show

23:47

notes. That's

23:51

it for this edition of In My Story, Tech Trends

23:53

and Past brought to you by Kaspersky. Search

23:56

for us wherever

23:56

you get your podcasts and click follow

23:58

so you don't miss an episode.

23:59

Coming up in this series we'll

24:01

be diving into the ethics of AI, exploring

24:04

how quantum computing is going to change everything

24:07

and talking about digital transformation.

24:10

How do you integrate technology into your business

24:12

and get a real understanding of it? If

24:15

you like using your hearing, please leave us a rating

24:17

and review. I'm sorry. It really

24:19

helps people find us and get the benefits of

24:22

all this great insight. If you

24:24

want to get ahead, you really can't afford

24:26

to miss it. Till next time. Goodbye.

24:29

Goodbye. Oh, hello. I'm

24:31

so sorry, Dot, about asking if you've been hacked.

24:34

That is OK.

24:34

I mean, it's like everything to say.

24:37

And you can ask the industry itself.

24:47

Just before I go, I wanted to tell

24:49

you about two other great series from Kaspersky

24:52

that you might like.

24:53

Fast Forward by Tomorrow Unlocked

24:55

explores the past, present and future of the

24:57

technologies around us. Season

24:59

two includes a very cool episode about

25:01

how digital twins can improve your personal

25:03

health. Plus, if you want to hear the latest

25:05

news and views from the world of cybersecurity,

25:08

join Jeff Esposito in the US

25:10

and David Buxton in the UK for Kaspersky

25:13

Transatlantic. They chat security

25:15

around current tech news and how

25:16

to low down all the latest native reaches.

25:18

You'll find links to both

25:20

these series in our show notes, but you'll also

25:23

find them wherever you get your podcasts. So

25:25

track them down and click follow so you don't

25:27

miss an episode.

Rate

Join Podchaser to...

  • Rate podcasts and episodes
  • Follow podcasts and creators
  • Create podcast and episode lists
  • & much more

Episode Tags

Do you host or manage this podcast?
Claim and edit this page to your liking.
,

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features