Technology is advancing at pace never seen before and the newest tech, applications and widgets are being widely adopted at an even quicker rate. 

Just look at A.I. and machine learning tools,which are now used to identify things once thought unimaginable — whether it's to figure out simple things such as what clothes best suit consumers or completing everyday work tasks, the endstate for these technologies appear endless... 

But as technology grows more sophisticated, why is the software that operates it not being secured?

“The human without the suit is weak and the suit without the human is dumb. A.I. and machine learning, these different computer learnings we've got to work with now in cybersecurity and across the board, they're levers. They're not a replacement in my mind for human intelligence. When that happens, we're going to be worried about Skynet, not these conversations. And I'm going to be thinking about how to hack that stuff, to make sure that humans stay safe.”

The future of A.I. and machine learning is mostly rooted in Hollywood sci-fi; Tony Stark’s Jarvis, or Skynet represent the full advancement of our imaginations of these technologies so far. But the reality of these tools isn’t there, but the power is. So why are we not protecting ourselves from it? On this roundtable episode of IT Visionaries, we explore the impact A.I. and technology are having on society and cybersecurity with Casey Ellis, the founder and CTO of BugCrowd, andMalcolm Harkins, a cybersecurity advisor, coach and board member. 

The two discuss why you’ll never be able to eliminate risk and why the lack of financial incentives is leaving most companies vulnerable to nefarious attacks. Enjoy this episode!

Main Takeaways

Just Throw Money at the Problem: One of the leading issues right now when it comes to cybersecurity is that app developers are not incentivized to protect products during the development lifecycle. When there is no monetary incentive for developers to protect their software, the needed layers of security are not built in. This leads to security teams doing patch work on problems that could have been architected during the development process.  Two Repelling Magnets: Security and privacy are consistently bound together but the reality is that good security can encroach on a user’s privacy. When designing products, developers must be thinking first about the layer of security they are placing within the code, but also how those security measures will infringe on the user’s rights.Working Hand-in-Hand: Your cybersecurity strategy should be a mix of technology and human creativity. While A.I and machine learning algorithms can help detect irregularities within a platform, most of those algorithms are not trained to learn from mistakes, leaving them open to vulnerabilities. Instead of relying just on technology, deploy a hybrid model using crowdsourced protection which allows for highly-trained and skilled hackers to test the vulnerabilities within a system that can then be fixed immediately. 

IT Visionaries is brought to you by the Salesforce Platform - the #1 cloud platform for digital transformation of every experience. Build connected experiences, empower every employee, and deliver continuous innovation - with the customer at the center of everything you do. Learn more at salesforce.com/platform