It was a bright, cold day in June, and the clocks were striking thirty past nine in the morning. On this last day on the Olympia show floor in London, after a few unsuccessful attempts, Sean and I were finally able to say hi, sit down, and have a good ole chat with Troy Hunt while we sipped on a cup of hot coffee. Yes, a podcast with Mr. Troy Hunt!

Australian, security researcher, software developer, founder of Have I Been Pwned, blogger, public speaker, keynote and overall 'very busy guy.' Especially this week in London, where the opportunities to talk CyberSecurity are plenty: Infosecurity Europe, Bsides London, and the many satellite events taking place around the main event such as cybersecurity Rants, company events, and even some industry awards.

We actually met Troy on the first day of our adventures at one of those extracurricular industry events where he won a top bloggers award (and we did not). It indeed was one of those De Coubertin situations where the most important thing for us was not to win but to take part; it sure was great to be nominated and be there with everyone to celebrate our global community.

But let's get back to the podcast. As an Australian that travels the world speaking at all sorts of conferences and winning European awards for his contributions to the InfoSec community, the first part of the conversation was naturally dedicated to discussing and appreciating the concept of cybersecurity as a global phenomenon which allows for dialogue to happen between and within InfoSec communities without any geographic boundaries. Clearly, the exchange of information is a strong driving force for the future of this industry and society.

On this topic, being in Europe, Sean and I took the opportunity to carry on our mission to explore the different ways that cybersecurity is perceived, promoted, and practiced in different parts of the world. We invited Troy to share his point of view on the subject, and we found ourselves talking about the perception of privacy and its consequent regulations and application in Europe vs. the USA. Troy rightfully suggest that one of the key differences is the attribution of ownership of private data and retention. By the way, do companies really need data from 19 years ago - especially sensitive data? Do they just see those — any data actually — as an asset that increases the value of their users' "experience" and never consider the fact that they could quickly become a liability?

Have I Been Pwned? Have you? I am sure you have asked yourself this question, utilized this service, or at least heard about it. How could we have a conversation with Troy and not ask him about his creation and how he sees society leveraging such a unique and valuable service? Interestingly enough, it was built as an experiment that has become exceptionally popular, truly appreciated, and used in the most diverse of individual, commercial, and even public sector case studies all over the world.

___________________

We'd like to thank our conference coverage sponsors for their support.
Visit their directory pages on ITSPmagazine.
Bugcrowd: https://www.itspmagazine.com/company-directory/bugcrowd
CyberCyte: https://www.itspmagazine.com/company-directory/cybercyte
Devo: https://www.itspmagazine.com/company-directory/devo
Nintex: https://www.itspmagazine.com/company-directory/nintex
STEALTHbits: https://www.itspmagazine.com/company-directory/stealthbits

________

Want more from InfoSec Europe in London? https://www.itspmagazine.com/infosec-europe-2019-event-coverage-london-uk-cybersecurity-news-coverage-and-podcasts