You have been temporarily restricted. Please be more thoughtful when adding content for your portfolio. Your portfolio and digital media kit and should be reflective of the professional image you wish to convey. Accounts may be temporarily restricted if we receive reports of spamming or if the system detects excessive entries.
Publish your original ideas on the Thinkers360 platform!
This feature is available for Pro and Pro-Plus Members Only.
Speaker Bureau functionality whereby individuals can be featured speakers within our Speaker Bureau service and enterprises can find and work with speakers.
This feature is available for Pro, Pro-Plus, Premium and Enterprise Members Only.
Highlight your featured products and services within our company directory for enhanced visibility to active B2B buyers worldwide. This feature is available for Pro, Pro Plus, Premium and Enterprise Members Only.
Contribute to the Thinkers360 Member Blog and have your thought leadership featured on our web site, newsletter and social channels. Reach our opt-in B2B thought leader community and influencer marketplace with over 100M followers on social media combined!
I help businesses get heard over the noise on social media.
There is so much confusion out there, with everyone peddling their wares, and claiming to be #1.
Whom do you believe?
I started #AskTheCEO to help you cut through the noise by authentically addressing the concerns of your customers. We educate them and build trust, which gets you noticed and accepted, not as a vendor, but as an industry leader! They feel safe and secure doing business with you, over the other players.
Are you looking for a high-energy technology Influencer to move your campaign forward?
Reach out to me at https://asktheceo.biz
Available For: Authoring, Consulting, Influencing, Speaking Travels From: NYC Speaking Topics: AI, IoT, Cybersecurity, Cloud, Digital Disruption
Points based upon Thinkers360 patent-pending algorithm.
Business Unit: High Tech, CyberSecurity, AI, IoT, Emerging Technologies
Minimum Project Size: Undisclosed
Average Hourly Rate: Undisclosed
Number of Employees: Undisclosed
Company Founded Date: Undisclosed
Media Experience: 3 Years
Last Media Interview: 01/15/2020
Areas of Expertise
Digital Disruption 31.00
Digital Transformation 30.79
Emerging Technology 30.15
Future of Work 30.21
Health and Safety
Customer Experience 30.15
Design Thinking 30.09
Business Strategy 30.47
Supply Chain 30.11
Diversity and Inclusion 30.41
Health and Wellness 30.26
Smart Cities 39.01
High Tech & Electronics
Hybrid Cloud and IBM Z
September 03, 2019
I invited the director of IBM Z to share with me some of the challenges businesses encounter when deploying their mission-critical workloads between off-premises and on-premises hybrid cloud environments. We discuss the resiliency and security on IBM Z, scalability and multicloud trends.
What will shape the Internet of Things (IoT) in 2019? Cognitive IoT. On my #AskTheCEO show, I recently interviewed guest Sudha Jamthe, CEO of IoT Disruptions and Professor at Stanford University in Palo Alto. I asked Sudha how she defines Cognitive IoT and her answer was “the strategic combination of Artificial Intelligence (AI) with IoT.”
Cybersecurity Solutions for Telecom Providers
July 30, 2018
In a recent Cybersecurity briefing for the Telecom Industry, Deloitte published an article (https://www2.deloitte.com/global/en/pages/risk/articles/Telecommunications.html) that discussed three case studies illustrating how and why cybercriminals target Telecom Providers. Deloitte states "Telecom companies are a big target for cyber-attacks because they build, control, and operate critical infrastructure that is widely used to communicate and store large amounts of sensitive data." It's important to note that the specific threats facing Telecom companies are not only referring to the Telecom providers themselves. Instead, they include every organization that provides Telecom services, such as Contact Centers, which include functions such as Customer Support, Sales Hotlines, and Help desks.
Amazon Prime Day, Self-Driving Cars, and IoT
July 25, 2018
The date was July 16, 2018. Amazon Prime Day, which was touted as a day of epic deals, suffered from an embarrassing technological snafu, where Amazon's website content was replaced by a picture of a cute, white puppy dog, and the message "SORRY, something went wrong on our end." It goes without saying that people were extremely upset.
TEX2018 and The Evolution of Telecom
July 15, 2018
If you work in the Telecom Industry, or if your business operates in the Telecom ecosystem, then one event that is a must to attend is Telecom Exchange - TEX2018. This event spans both coasts of the United States, taking place yearly in New York City in June, and in Los Angeles in November. For those unfamiliar with Telecom, it is usually thought of as a legacy industry from a bygone era; a dinosaur of sorts, taking its place alongside mainframes and gramophones, in the annals of history.
Blockchain, Artificial Intelligence, and Virtual Reality
January 21, 2018
Three of the hottest technologies currently on the market are Blockchain, Artificial Intelligence (AI), and Virtual Reality (VR). Each one, individually, is worth mentioning. However, putting all three of them together creates a solution of epic proportions, of which one must take note.
Smart Cities Around The World
October 27, 2017
“Smart” technology is only as good as the value it provides. Let’s look at how a few cities around the world are deploying smart technology in order to bring greater value to their residents and visitors.
Disruptive Technology in Today's World
December 16, 2019
We are living in an era of information overload, where there is an overabundance of information, yet at the same time, it's hard to ascertain what's credible and what's not. Technology changes rapidly, and innovation is on the rise.
We cover some of the latest trends in Digital Disruption / Disruptive Technology, Artificial Intelligence (AI), the Internet of Things (IoT), 5G, and CyberSecurity.
Audience: Individuals, Associations, Organizations, Corporations, Entrepreneurs, Non-profits, C-Suite Executives
BECOMING COMPETENT, CONFIDENT AND COMFORTABLE CREATING YOUR INTERNET OF THINGS (IOT) STRATEGY
December 16, 2019
A First-Hand Look at the Current Best Practices around the world.
Description: Every new device now seems to be "smart." Commercial or consumer; factory, home, or street corner; equipment, machines, appliances, electronics, databases, and software are all now connected to the internet. Whether you now have, will soon have, or aren't quite convinced you want to have smart devices, this session is designed to help you the decision-maker become competent, confident, and comfortable when creating or overseeing the creation of the IoT strategy for your enterprise, city, or country.
What keeps #AskTheCEO podcaster, Avrohom Gottheil up at night?
August 01, 2018
Each week from his Zero Day Studios, cybersecurity expert Scott Schober discusses the most terrifying and apocalyptic cyber scenarios including ransomware, breaches, identity theft, IoT device security and more with fellow experts to find out what keeps us up at night. This week, Avrohom Gottheil weighs in.
Industrial IoT Cybersecurity with Mirko Ross
August 15, 2019
Mirko is Co-Founder and CEO of Digital Worx, a mobile Software Development Company.
He is also the co-founder of asvin.io, a new venture that provides a secure, open source-based update and patch delivery for the Internet of Things.
Mirko is a well-practiced international speaker and coach on the field of Open Innovation, Internet of Things, IoT Security, and disruptive business modeling.
00:30 –Mirko, as we know, you’re a Cybersecurity expert, not a day goes by where we don’t hear about some data breach or ransomware attack. What concerns me greatly about all this, is that with the prevalence of IoT and Industrial IoT, we’re putting all these connected devices all over the place, and some of these devices were not manufactured with security in mind. Tell us about some of the challenges that the industry faces.
02:00 –To drive this message home, some of these IoT devices were hacked to mine Bitcoins, or to form a Botnet to carry out malicious attacks. If these devices are so easy to hack, what can we do about it? We can’t just bring them all back and fix them?
03:00 – California passed a security bill in 2018 banning default passwords in connected devices, removing a major attack vector for connected devices.
04:00 – What’s the big deal if my smart toaster gets hacked?
04:15 – What dangers can a smart toaster pose to FinTech executives?
05:00 – Just because devices are secure today doesn’t mean they are protected against the threats of tomorrow. How do you go about securing devices that are already deployed in the field, and possibly in hard to reach places?
06:20 – You need a good patch management strategy for all connected devices.
06:25 – There should be NO single connected device out there that does not have the ability to be updated.
07:00 – The Law of Economics will drive IoT Security
07:10 – Liabilities will drive Cyber Security of Consumer Devices
08:50 – Implementing an Over The Air Cyber Security Patch Management Strategy will yield more favorable Cyber Security insurance rates.
10:13 – What’s the challenge with patching IoT devices? Why can’t you just connect to them remotely and update them?
10:35 – Many IoT devices reside at the Edge with no direct IP connection, making it challenging to patch them.
11:10 – The large scale of deployed Industrial IoT devices makes it difficult, if not impossible, to apply patches manually.
11:30 – A big challenge with IoT devices is Lifecycle management – After a period of time you can’t get replacement parts for it anymore! To address this issue, you need a support contract with your vendor to maintain the hardware and software for a set period of time.
14:00 – To maintain a secure infrastructure we need to move to a Hardware as a Service model – HaaS.
14:45 – What are some of the risks with allowing people to patch their own Industrial IoT Devices?
18:00 – A patch downloaded from the Internet might actually be Malware in disguise!
18:25 – We need a chain of trust from the publisher of the patch all the way down to the application of the patch onto the device.
19:00 – How did you get started in this?
21:15 – How do people connect with you?
22:05 – Do you have any parting words of wisdom to share with the audience?
The AI in our lives, with Tamara McCleary
November 13, 2017
Tamara is an International branding expert, technology futurist, marketing/digital strategy consultant, and Thulium CEO. She is ranked by Klear in the Top 1% of global Social Media Influencers and listed as one of the Top 50 Social Influencers of 2015, 2016, and 2017 by Onalytica.
She ranks Top 5 in AI, Robotics, & IoT. Top 50 inn Big Data as well as Top 15 Machine to Machine (M2M), Top 50 Blockchain & Top 50 Digital Transformation influencer 2016.
She was named #1 Most Influential Woman in MarTech by B2B Marketing and ranked by LeadTail as the 2nd most mentioned person on Twitter by Chief Marketing Officers. She is also an IBM Futurist & creator of the trademarked RelationShift method.
She is a frequent keynote speaker, and was ranked as the #1 social influencer at numerous recent conferences in 2016 & 2017 including: IBM Amplify, DistribuTECH, Enterprise Connect, Channel Partners, RSA, NAB Show, Gartner Security, and IBM Interconnect.
Tags: AI, Digital Disruption, Digital Transformation
Microsoft Azure for Corporate Wellness
February 20, 2020
Robert Smith is the founder & CEO of Fan Health Network which provides enterprises with turnkey well-being programs, including fun challenges. They connect you directly to professional athletes, sports personalities, and celebrities who want you to improve your fitness, diet, and well-being.
Robert is also a Fox Sports Analyst and Former NFL Running back.
Narinder Makin is the founder and CEO of Healthper USA, a company that offers an engagement services platform that is used to create well-being programs and digital interventions. Healthper is the underlying platform on which the Fan Health Network programs are built on top of.
Narinder is a technologist and Innovator with a deep passion to solve problems for the masses.
[01:26] Avrohom: Employer wellness programs are on the rise, with an average cost of $742 per employee, per year, according to a 2017 survey conducted by UnitedHealthcare. What are the drivers behind the growing trend of employer wellness programs?
[02:26] Avrohom: What are the challenges faced by companies looking to offer employer wellness programs?
Robert: Either you are just checking out whether to have a wellness solution or are coming from an existing well-being offering that had an anemic engagement or looking to extend a current well-being offering, we cover it all.
You can start with HUDDLE where you engage with the celebrities including Hollywood, TV and Sports personalities, and run a holistic challenge like Find Your Purpose & Get Moving or a Take a Hike Step Challenge that can be run independently or co-exist with your existing solution.
You can mature to a HEALTHY YOU program that includes personalization and complete program customization with challenges, coaching, branding, and incentives.
[12:49] Where did this idea, for Fan Health Network, come from?
[14:39] How has partnering with Microsoft helped you grow and scale your business?
[17:54] Avrohom: There is definitely a huge emphasis, nowadays, on healthy living as evidenced by the growing market on wearable technologies; which, according to a recent report by PRNewswire, is estimated to reach a market size of over $57M by the end of 2022. Besides corporate wellness, where else do you see Fan Health Network playing a role in the overall healthy living marketplace?
Robert: Fan Health Network envisions not only to increase the participation in device reported data through its integrated experience but also sustain the engagement through its rich influencer network and incentive capability.
At Fan Health, we believe that our engagement capabilities promote device adoption in workplace populations. It also drives to increase data collection for patient engagement solutions that are either Digital Therapeutics Interventions or Provider backed interventions.
[20:21] Avrohom: How do people connect with you?
Narinder: You can go to Microsoft’s App Source or Azure Marketplace and search for Fan Health Network to get started with your well-being solution within moments.
Links to Azure Market Place:
1. Take A Hike Challenge https://azuremarketplace.microsoft.co...
2. Healthy You https://azuremarketplace.microsoft.co...
3. Find Your Purpose & Get Moving Challenge https://azuremarketplace.microsoft.co...
4. HUDDLE https://azuremarketplace.microsoft.co...
You can visit our website www.fanhealthnetwork.com or email us at email@example.com for more information.
[21:35] Do you have any parting words of wisdom to share with the audience?
You can listen to this episode on Sound Cloud as a podcast: https://soundcloud.com/asktheceopodca...
Tags: AI, HealthTech, Health and Wellness, SportsTech
IT Infrastructure Spending With Misha Rangel
January 30, 2020
Misha Rangel, the Senior Product Marketing Manager for IBM to share shared her insights on a recent IT Infrastructure spending study that was conducted by Forrester Research on behalf of IBM Systems.
The study can be accessed here: ibm.biz/Avrohom-HMC-Study
One of the key findings mentioned in the report is that on-premises solutions continue to play a key role in IT Infrastructure spending decisions, with 90% of IT decision-makers agreeing that on-premises infrastructure is a critical part of their hybrid cloud strategies.
Another key finding of the report is that IT decision-makers anticipate that more than half of mission-critical workloads and 47% of data-intensive workloads will be run either on-premises or in an internal private cloud within the next two years. This does not mean that organizations have stopped investing in on-premises. Misha goes into this topic in greater detail during our discussion.
Another key finding is that companies that delay IT Infrastructure upgrades are opening themselves up to serious vulnerabilities.
Misha Rangel has spent 13+ years as a product marketing leader for B2B technology companies.
[00:34] IBM just published the findings of an IT Infrastructure study conducted by Forrester Research. Can you help us understand, what are the current trends for IT Infrastructure spending?
[01:44] What’s driving the conversations around IT Infrastructure refresh?
[03:13] As you know, many companies are delaying upgrading their infrastructure, for various reasons. Be it budget cuts, lack of resources, or something else. What are the ramifications to delaying an infrastructure upgrade?
[03:13] Companies that delay IT Infrastructure upgrades are opening themselves up to serious vulnerabilities.
[04:54] Security doesn’t stop at the software level. Hardware has a security component, as well.
[05:21] One of the things the Forrester study talks about is that we’re seeing growth in Public Cloud spending across all types of workloads. Does this also refer to mission-critical workloads, or are there any kind of workloads where, perhaps, an on-prem or a hybrid cloud configuration might be a better choice?
[10:25] Where can people go to learn more about the Forrester IT Infrastructure study?
[11:02] How do people connect with you?
[11:36] Do you have any parting words of wisdom to share with the audience?
[11:40] Being consistent with IT Infrastructure refreshes can make a big difference with regards to preventing risks and threats to a company.
[12:17] Maintaining consistent IT Infrastructure refreshes is like going for an annual checkup at your doctor.
Tags: Cloud, Cybersecurity, Digital Transformation
Diversity and Inclusion with Debra Ruh
January 21, 2020
Debra Ruh is a Global Disability Inclusion Strategist, Market Influencer, internationally recognized keynote speaker, published author, branding expert, successful entrepreneur, and an exceptional mother. She is the host of the popular program: Human Potential at Work.
[00:43] We are at the cusp of the mainstream adoption of 5G, which will enable us to massively scale up our install base of connected devices. When thinking about IoT, there will be so many applications for Smart Homes, Smart Industries, and Smart Cities. This also means that there will be lots of competition for IoT manufacturers (and this is not necessarily limited to the field of IoT), which means that they have to really understand what their customers want, and HOW they’re using their products, in order to stay ahead of the game. What are the challenges that manufacturers have about understanding how people use their products?
[01:23] Many manufacturers assume one size fits all.
[01:23] Listening to your customers about how they use your technology gives you a competitive edge in the marketplace.
[05:35] How do Diversity and Inclusion apply to Autonomous Vehicles?
[07:05] Technologies like autonomous vehicles enable seniors and people with disabilities greater independence.
[07:05] One of the key benefits emerging technologies offers seniors is the freedom to age in place, on their own terms.
[08:52] How can technology help seniors and people with disabilities?
[09:00] Smart Home technology enables people with disabilities to live independently while keeping them safe.
[12:30] Smart Home technology can ensure that seniors are taking their pills!
[14:27] Emerging Technologies, such as Autonomous Vehicles and Smart Homes, can give seniors back their independence and dignity.
[15:49] CyberSecurity and hacking are topics that dominate today’s social media discussions. Can you help us understand, what are the CyberSecurity challenges for seniors and people with disabilities?
[21:07] How can we protect seniors and people with disabilities from online predators?
[21:07] A great resource to educate seniors about the Cybersecurity pitfalls of the online world is Scott Schober’s book, CyberSecurity is Everybody’s Business.
[21:07] The world is changing so fast that we have to keep educating ourselves about the latest technologies.
[22:00] Jack Ma, Founder of Alibaba once said: “Today, making money is very simple. But making sustainable money while being responsible to the society and improving the world is very difficult.” As the world is changing, what obligations do corporations have to show that they care more about people than profits?
[22:36] Many corporations are realizing that Tech For Good and complying with the United Nation’s Sustainable Development Goals (SDGs) can also be good for profits.
[24:35] Younger generations have vowed that they won’t do business with companies that don’t make a difference in the world.
[25:53] Diversity and Inclusion is good for profits!
[26:04] By valuing Diversity and Inclusion you turn your employees into your most vocal fans.
[26:11] Mattel programmed Barbie with AI to speak to girls about employment options. Unfortunately, things did not go as planned when Barbie told girls to choose careers in Fashion, as opposed to becoming a computer scientist! It turns out that they programmed their programmer’s inherent biases into the AI.
[29:00] How do people connect with you?
[30:09] Do you have any parting words of wisdom to share with the audience?
[34:42] We have to care about all people. We need to understand what it means to be human, and how do we celebrate that.
Tags: Cybersecurity, Diversity and Inclusion, Smart Cities
Cloud Migrations With Tina Gravel
December 26, 2019
Tina Gravel is the Senior Vice President of Channels and Alliances at Cyxtera Technologies, where she helps businesses migrate their mission-critical applications to The Cloud. She is an award-winning executive with more than 25 years of experience in the IT outsourcing, cloud, security and SaaS industries.
[01:09] Cloud is becoming more prevalent in the Enterprise space, with companies migrating more of their mission-critical applications to The Cloud. One of the more recent buzzwords permeating today’s vernacular is Hybrid Cloud. What does Hybrid Cloud really mean?
[02:47] What are the considerations businesses need to have when thinking about moving their mission-critical applications to The Cloud?
[03:53] A critical requirement for mission-critical applications is uptime. After all, you can’t have a global bank just go offline during a stock trade! One of the inherent benefits of migrating to The Cloud is the Service Level Agreement for guaranteed uptime. Many providers use a term called five 9’s of reliability. IBM just launched the z15 mainframe platform which offers seven 9’s. What do all these 9’s mean, and why are they important to businesses?
[05:24] The more 9’s you have, the more expensive it is!
[05:24] With regards to Cloud migrations, you need to balance the service level you want, with what you can afford to pay for.
[07:03] How does Cyxtera help businesses with their Cloud migrations?
[10:44] It’s no question that Cloud is the way to go for Enterprises that are launching brand new mission-critical applications. However, in the real world, the playing field is not so cut and dry. Let’s say, for example, that one of your core business applications is a COBOL program, which resides on a server in a backroom closet and stores its data in a huge flat file. First of all, how do you even begin to “cloud-enable” this ancient application along with its archaic flat-file database? The second challenge is that for that last 50 years no one has had to worry about cybersecurity. The application is running on a server in a secure location, and no one has access to it. As soon as this crucial and sensitive application moves to the cloud, suddenly, you have a new problem to worry about! Is it even worth it?
[13:33] What is Zero Trust?
[15:57] When migrating to The Cloud, make sure to only provide access to people who absolutely need it.
[17:49] How do people connect with you?
[18:17] Do you have any parting words of wisdom to share with the audience?
Tags: Cloud, Cybersecurity, Digital Transformation
Deep Tech with Avrohom Gottheil
December 17, 2019
We are living in an era of information overload, where there is an overabundance of information, yet at the same time, it’s hard to ascertain what’s credible and what’s not. Technology changes rapidly, and innovation is on the rise. How can we educate ourselves to know:
(1) What products are available on the market?
(2) What solutions to search for?
(3) Which technology trends will be long-lasting, and which ones will become fads?
This episode of #AskTheCEO features a presentation Avrohom Gottheil gave in New Delhi, India for India’s First Annual Deep Tech Summit, titled Deep Tech for All.
[08:05] Paul Colmer, a digital coach and global influencer in Cybersecurity, Cloud, and Digital Disruption, shares his perspective on how everyone’s going to get disrupted, and predicts that this will even affect Governments!
[11:11] We discussed the reason behind the latest trend of speech enabling smart devices. “Time is the new currency, and that is what’s driving the mass adoption of voice-based technology in the marketplace”, said Avrohom
[13:30] J. Dianne Dotson, Science Fiction Writer and Research Scientist, shares how in the future we will be able to leverage AI to search global DNA databases, such as 23 and me, and analyze people’s genomes for disease-causing proteins so that we can disable them and stop diseases from spreading, right from the source.
[15:47] Jola Burnett, VP of GfK Consumer Life in NYC, studies the consumer behavior that drives industry trends. Jola answers the question about whether people will accept companies leveraging AI for their customer interactions. Jola spoke about a scenario where you call into a contact center and ask to speak with a representative but got routed to an AI instead. “Does the customer have an out?”, she asks. It all boils down to the customer experience on whether or not people will accept interactions with AI.
[18:00] Inma Rodriguez, VP of 5G Core, Cloud & OSS, for Ericsson’s Europe and Latin America Market Area, shares her perspective on the considerations business executives need to think about before making an investment in 5G technology
[20:29] Avrohom discusses the Cybersecurity implications of adding massive amounts of IoT devices on our networks. We’re adding 20.4 billion devices by 2020, yet the number of records exposed during data breaches are shooting up exponentially. From January – November 2019 there have already been 4 billion records exposed!
[22:40] To combat the increasing volume of Cybersecurity threats we need to follow the three S’s: Share Information, Secure our networks, and Serve our communities.
[23:40] Kai Hermsen, Global Coordinator for Siemens’ Charter of Trust, introduces this global initiative of 17 companies that are working together to bring trust to a Digital World.
[27:34] Mirko Ross, CEO asvin.io in Stuttgart, Germany shares some of the challenges associated with patching IoT devices.
[28:36] Mirko then goes on further to talk about how we need a secure and automated method of applying patches, as it’s very risky to do this manually. One example he give was with regards to an autonomous vehicle that has an accident. Who is responsible? The owner of the car, the manufacturer, or the software vendor? Which updates were installed at the time of the accident? This issue can become very complex, which is why you need an automated process to streamline the updates.
[32:02] We must serve our community by inspiring and mentoring our children, especially our girls, so that they feel comfortable choosing careers in Cybersecurity.
[37:17] Tyler Cohen Wood is a cyber-authority with 18+ years of highly technical experience. She is working on a very ambitious initiative to inspire girls all around the world to become excited about choosing careers in Cybersecurity. Her project is the all-new Cybergirlpower Conference, which is launching in the summer of 2020. The project’s website is https://cybergirlpower.com/.
AI & Tech For Good With Adam LG Ring
December 16, 2019
Adam LG Ring is a startup mentor who’s helped many startups & organizations change the world for the better. He has 25 years' digital experience and has helped businesses through the digital transformation process, as well as comply with GDPR data privacy regulations.
[01:06] Entrepreneurship is a really hot topic, nowadays. I believe it’s because of the way the gig economy has completely altered the way people earn a living, that people are turning to entrepreneurship en masse as they believe it to be their only ticket to financial freedom. What are your thoughts on this topic?
[03:45] What is TechForGood?
[05:19] Data Privacy is a human right.
[05:45] Businesses that look after their user’s Data Privacy have a competitive edge in the marketplace.
[11:19] You’ve worked with many GDPR clients, so you know that Data Privacy is a serious thing. With the ubiquity of Artificial Intelligence, what role do you see it having in helping businesses keep their customer’s data safe?
[12:33] AI and Machine Learning have become so commonplace that, unfortunately, people are mistakenly using the terms interchangeably. Can you share with us the proper definitions and applications of those terms?
[15:23] Let’s make sure our young people learning AI can invent things, because in 10-20 years, the Artificial Intelligence that will be, won’t be anything like the AI everyone’s predicting.
[17:00] Why do you need to leverage AI for Data Privacy and Cybersecurity?
[21:54] Just like we’re advancing with AI for good, hackers are developing AI for bad, and without any oversight.
[22:55] Tony Flath: In the future, it’s going to be a war of machines.
[23:39] According to an article published by Forbes in 2015, 9 out of 10 startups fail. This is a really big number and very painful, especially considering the way we started our conversation where startups are a critical component of our economy. Where do Entrepreneurs go wrong?
[28:00] Successful Entrepreneurs are the ones who get a co-founder.
[28:15] You can’t rely on employees to have the same passion as founders do, because they don’t have the same equity in the business.
[28:55] What is the one question that will determine if an entrepreneur will be successful?
[29:53] I understand that you help startups to not repeat the mistakes that others before them have made. Can you share with us a little bit about the work that you do?
[32:27] How do people connect with you?
[36:08] Do you have any parting words of wisdom that you’d like to share with the audience?
Tags: AI, Digital Transformation, Entrepreneurship
Implementing 5G With Inma Rodriguez
December 16, 2019
Inma Rodriguez is the VP of 5G Core, and Cloud Solution and Service Line for Ericsson’s Europe and Latin America Market Area, where she supports Digital Services Operators and their customers with complex Cloud transformation projects, including the introduction to 5G technology.
[00:42] Inma, I’m so excited to be speaking with you today, because 5G is one of the most talked-about technologies in the market, as it is seen as an enabler of things from Smart Cities to Healthcare; and Ericsson is a global leader in 5G as well as a trusted partner in helping businesses prepare for 5G. What are some of the considerations business executives need to think about before making an investment in 5G technology?
[01:40] 5G will be more than just an incremental upgrade from 4G. It will be an enabler to many enterprises for their digitalization process.
[03:10] 5G will enable healthcare providers to remotely deliver emergency medical care during the wait for an ambulance!
[04:50] Many businesses in your market area are still on 3G, and in the bigger cities, some of them might already be on 4G. What are your customers struggling with as they prepare for the jump to 5G, and how is Ericsson supporting them?
[06:55] 5G Technology is more than just the speed. It encompasses the entire infrastructure!
[07:44] What is Network Slicing?
[11:05] 5G is so new that people might be struggling to visualize the migration process, end to end, so it's wonderful that you're actually working with real people who are already implementing this technology! Who's doing it right, and what kind of new market opportunities are some of these service providers experimenting with?
[13:46] Telefonica, Vodafone, Telecom Italia, and Swisscom are paving the way with regards to their implementation of 5G.
[14:30] There’s an event coming up shortly, it’s the SDN NFV World Congress in The Hague, Netherlands. I know you will be speaking there. What will be some of the hot topics at this event?
[16:22] How do people connect with you?
[17:04] Inma, it’s very fortuitous that we’re speaking now because we’re recording this conversation during the month of October, which is Global Diversity Awareness Month. As a Woman in Tech, do you have any words of wisdom that you’d like to share with the audience?
[17:04] We need to ensure that we make a career path in technology attractive to women and teenage girls.
Tags: Digital Transformation, IoT, 5G, Smart Cities
Secure Computing Endpoints With Rob Kirk
December 16, 2019
Rob Kirk has been with IBM and Lenovo for a combined 32 years of experience in the PC industry.
As currently a member of Lenovo's Technical Client Advisor unit, Rob covers Corporate and Healthcare customers, providing technical expertise regarding Lenovo's end-user services, products, and capabilities. With a strong focus on Lenovo's security products and solutions, Rob has been a part of the team representing Lenovo at conferences like BlackHat and Ignite, among other public events. Lenovo makes some of the best and most secure products in the PC industry, and Rob Kirk is part of the team that presents them to the marketplace and educates customers in their use.
Lenovo site filled with imaging and security information, plus much more! https://pcsupport.lenovo.com/us/en/so...
Read more about Lenovo Thinkshield:
[00:25] Rob, I’m so excited to be speaking with you today, because not a day goes by without us hearing about the dreaded Data Breach. Whether it’s a computer getting hacked, or someone’s laptop getting stolen, it seems like CIOs and CISOs have their work cut out for them. What are some of the considerations CIOs should be having when thinking about selecting their next refresh of computing endpoints without having that additional worry about data breaches?
[00:55] Securing against a data breach starts way before assets even come into the company!
[01:05] Cybersecurity is a holistic process which starts with a vetted secure supply chain.
[02:45] Step 2 of Cybersecurity is ensuring that all software has been updated to the latest release level.
[03:00] How Lenovo helps companies maintain the Cybersecurity status of their assets, even when the customer’s IT department removes the pre-loaded OS.
[04:00] What client security advisory process does Lenovo have in place, in the event they get hacked and breached?
[05:50] A docking station is a Cybersecurity vulnerability!
[08:40] The process of security needs to extend to cover the full life cycle of the product.
[09:28] One of the things that keep me up at night, as a person who is very active in the Cybersecurity industry, is the fact that no matter how secure your technology is today – even if it’s a veritable Fort Knox; impervious to any and all attacks known to man – you and I both know that in 6 months from now, a new vulnerability will either be discovered, or created by new technology that’s unimaginable, even today. I’m certain that CISCOs around the world are concerned about that as well. How can we EVER be secure from threats that don’t even exist yet?!
[11:00] Manufacturers that have few updates on their website should be taken as a warning sign.
[11:20] Manufacturers that have many updates, listed on their websites, means that they’re paying attention.
[12:50] Even if you have a secure device, end-users are a major Cybersecurity vulnerability!
[14:30] Facial recognition and biometrics help with Cybersecurity by preventing people from seeing you type a password.
[15:19] When using a laptop in a public area, facial recognition can trigger your monitor to blur when it detects someone looking over your shoulder.
[16:49] As a global leader in secure computing endpoints, can you share some best practices on how businesses can be Cyber-Safe without slowing people down or sacrificing on productivity?
[19:31] What are some of the considerations business executives need to have when selecting their next computing assets, to cut down on occurrences of end-users disabling security software?
[22:11] How do people connect with you?
[26:18] Do you have any parting words of wisdom that you’d like to share with the audience?
[26:30] “If it ain’t broke, don’t fix it” is the wrong philosophy when it comes to Cybersecurity!
FinTech and Digital Transformation With Xavier Gomez
September 12, 2019
Xavier Gomez is founder & COO of INVYO, a SaaS company that uses machine learning and Natural Language Processing (NLP) to help financial institutions see tomorrow’s opportunities in Fintech. He is also Co-Editor-in-Chief at Invyo Insights powered by INVYO, a global provider of Fintech insights and analysis. As a banker, Xavier has been sharing his vision of the sector with industry pioneers over the past 18+ years.
He holds a certification from the Massachusetts Institute of Technology (MIT) specialization Fintech (2016) and is a graduate of HEC Paris in Private Equity (Leadership Executive program in Private Equity in partnership with AFIC – French Association of Investors for Growth) in 2017.
In 2000, he started his career at Credit Suisse (private banking) in Paris as a portfolio management consultant (2000-2004), selling structured products in Zurich, Switzerland (2005-2007), assistant vice president in charge Investment Consulting in Paris (2007 – 2008), Vice President in charge of Investment Consulting (2009 – 2013) in Paris, Director in charge of investment and trading in Paris and Treasurer of Credit Suisse France. From 2016 to 2018, he became Global Senior Portfolio Manager and Asset Allocator at Pictet & Cie.
He is an expert in banking, finance, and economics as well as banking and digital transformation.
He is interested in the digital economy and especially in innovations in the field of finance (Fintech), an area in which he sometimes writes some articles in the specialized media. Moreover, he is a speaker in various global FinTech conferences around the world.
Tags: Cybersecurity, Digital Transformation, FinTech
How Science Fiction Influences Technology With J. Dianne Dotson
August 01, 2019
[00:30] Give us a short synopsis of The Questrison Saga.
[07:13] As you know, #AskTheCEO is a technology show, where we talk about technologies, such as IoT, Cybersecurity, AI, and the tie-in to Science Fiction is that science fiction influences technology. As a Sci-Fi writer, and a research scientist, what technology trends are you seeing, that might have been influenced by Science Fiction?
[07:13] Star Trek influenced technology!
[08:07] The movie Gattaca influenced AI in HealthCare, such as
[08:07] What is the future of healthcare?
[10:15] Sci-Fi influences AI to deliver mental health care.
[12:00] The future of AI is Fairness – it will eliminate bias, such as racial, gender, and color.
[13:48] I’m truly amazed by the constant and rapid innovation in technology, such as AI, The Internet of Things, and 5G. Just imagine, within a few short years (if not sooner), there will be billions of these connected devices connecting our cities, homes, and businesses. We’re literally living in science fiction!
[14:28] What will the future be like?
[14:50] We have replicators!
[16:24] Virtual Reality will help deliver better mental health care by connecting people around the world.
[17:24] Question from Tamara McCleary, CEO Thulium: As a novelist and someone who has a visionary mind, what would the Singularity look like?
[19:25] Question from Tamara McCleary, CEO Thulium: They say real life is stranger than fiction. How does real life fuel your science fiction writing?
[22:30] Question from Jola Burnett, VP GfK Consumer Life: What are some of the sources of inspiration for the Sci-Fi world - and the technology/tools that exist in this universe?
[25:00] We live in a time of powerful technology, but it’s our connection to each other that forms our happiness and well being. The technology is just the icing on the cake.
[25:14] I understand that when you’re not writing spellbinding novels, you’re working with clients on projects, such as writing about technology, the environment, and other interesting topics. What kinds of topics do you love to write about, and how do people connect with you to engage you on a project? Connect with Dianne here: https://jdiannedotson.com/
[28:43] Do you have any parting words of wisdom to share with the audience?
The Charter of Trust With Kai Hermsen
March 21, 2019
Kai Hermsen is the Global Coordinator for the Charter of Trust with Siemens, where together with his team in the Central Technology department, he is driving the Siemens Cybersecurity Strategy, Initiatives, and Innovation.
Hackers and Consumer Trust with Scott Schober
February 21, 2019
Mr. Scott N. Schober is the President and CEO of Berkeley Varitronics Systems (BVS), a 45 year-old New Jersey-based privately held company and leading provider of advanced, world-class wireless test and security solutions.
[00:54] The Japanese cryptocurrency firm Tech Bureau Corp said about $60 million in digital currencies were stolen from its exchange, highlighting the industry’s vulnerability despite recent efforts by authorities to make it more secure. What exactly transpired?
[01:52] Why do Cryptocurrency exchanges keep on getting hacked?
[02:34] How can we, as consumers, protect our cryptocurrency investments?
[05:47] Blocksafe Technologies developed products that can protect your digital wallet.
[08:12] How can the Cryptocurrency industry restore consumer trust?
[11:05] A recent report came out regarding some guy who drove off with a brand new Tesla Model 3, which he stole from Mall of America, by using only his cellphone! I'm not sure which thing to be more concerned about - that he hacked into a car & stole it, or that it was done using a smartphone! What's going on here?
Navigating Digital Disruption With Paul Colmer
January 24, 2019
[02:46] There is massive disruption taking place in every industry, thanks to the rapid advancement in technology, such as Artificial Intelligence, IoT, Robotics, and so on. As someone who works in, and mentors people on, the forefront of cutting edge technology, what kinds of trends are you seeing regarding Digital Disruption?
[03:15] How do you define Digital Disruption?
[04:20] How do you define Digital Transformation?
[05:14] Prediction: Every industry will be disrupted, including governments!
[06:50] GDPR in EU is a form of disruption.
[07:44] There are forms of GDPR that have been adopted as law all around the world.
[10:52] A Digital Transformation project is not complete without a robust Cybersecurity strategy. What are you seeing out there, with regards to the ways companies employ Cybersecurity and Data Privacy Protection?
[11:02] What are the top 5 Cloud Security Threats?
[11:02] The #1 Cloud Security Threat is a Data Breach.
[13:20] How to get through a data breach.
[13:20] A data breach is inevitable. The key is how you will react when it happens.
[14:09] Another buzz word that people hear over, and over again, is BigData. What is that?
[14:38] A few thousand records is called “Little Data” (up to 100k rows).
[15:07] BigData is about making good business decisions around very large sets of data.
[16:20] Our personal habits are contributing to the huge volumes of data.
[19:42] What is Machine Learning?
[21:01] The Tesla Driverless Car
[22:33] Blockchain: Beyond the hype
[23:28] McKinsey: It will take many years for Blockchain to go into production. https://www.mckinsey.com/business-functions/digital-mckinsey/our-insights/blockchain-beyond-the-hype-what-is-the-strategic-business-value.
[23:28] The challenge with Blockchain is scalability
[24:05] Will Quantum Computers solve the challenges with Blockchain?
[27:08] Another component to Digital Transformation is migrating to The Cloud. In an article published by ZDNet in November 2018, they wrote about Guinness World Records and stated that Cloud Computing is the key to their digital transformation. What do businesses need to know as they contemplate migrating to The Cloud?
[30:30] Can you tell us about some of the technical courses you teach, and what kinds of businesses would benefit the most from these classes?
Digital Transformation and Cybersecurity with Tony Flath
November 29, 2018
[01:28] There is a term that you hear a lot when speaking about education called STEM. As a supporter of young people, what is STEM and why is it important?
[02:42] One of the challenges we hear about all the time is that there aren't enough qualified candidates for high tech jobs, such as in the field of Cybersecurity. What's your opinion on what should be done to address this challenge?
[05:21] Rob May, Human Firewall - All users need to be trained, as they are all considered perpetrators and vulnerabilities, with regards to Cybersecurity.
[09:00] Hacks and data breaches are happening at an alarming rate. According to Statista, as of mid-2018, there were 668 data breaches, exposing 22.41 million records of data! How can we leverage emerging technologies, such as AI, Machine Learning, and Cloud in order to bolster our data security?
[09:45] Traditional Cybersecurity is about perimeter and endpoint control. We need next-generation tools that have application visibility.
[11:40] SIM - Security Information Module - provides event monitoring.
[20:17] Cybersecurity - it's a war of machines!
[23:00] Blockchain & AI will help us better identify and control threats and security.
[23:29] It seems like everyone is into Digital Transformation these days. What do CIOs need to know in order to implement a successful digital transformation project?
AI and Blockchain for Healthcare Provider Credentialing
October 04, 2018
[01:19] Your company, Professional Credentials Exchange, has come up with an innovative idea on leveraging Blockchain for Healthcare. Can you tell us about it?
[01:19] Healthcare provider credentialing is a 4-6 month process.
[06:10] How will you incentivize practitioners and insurance companies to join the collective on the Blockchain?
[06:37] Every day that a hospital practitioner doesn't bill, the hospital forfeits $7,500. That's $150k / month, and $900k / 6 months!
[09:38] Credentialing is a perpetual process.
[13:33] What are the major components of the exchange infrastructure? Why use Blockchain?
[17:53] According to an article posted by Forbes, we have an epidemic of health data breaches across the country, and 40% of those breaches come from people who already have access to health records in some form or another -- what we call insiders. How do you address the governance of the data inside the Blockchain?
[23:46] How does something like this scale effectively in such a large market?
[26:31] What, in your opinion, are the keys to building a successful application leveraging blockchain technology?
[27:49] Why can't you store large amounts of data on a blockchain?
[27:49] Blockchain is not a database. It's a distributed transactional ledger.
Questions from the Audience:
[29:10] Ken Herron - CMO Intelligent IoT Messaging Company, Unified Inbox, Orlando, FL - Hi Anthony! If you were to ask three smart people what Blockchain is, you'd likely get three (if not more) different answers. As patients are one of healthcare's key stakeholders, how do you suggest Blockchain, how it is being used, and why, be explained (preferably proactively) to patients?
[31:37] Bennet Bayer - Former Global CMO @ Huawei and long-time Microsoft distributor and channel champion, Seattle, WA- How do you separate Blockchain from the cryptocurrency discussion?
AI and Blockchain in Online Retail and Fashion with Nova Lorraine
September 27, 2018
[01:32] Tell me a little bit about Raine Magazine and the work that you do?
[04:25] What are some of the challenges facing the Fashion Industry, which is being solved by high tech?
[08:23] How can technology assist people with shopping for clothes online?
[08:23] Augmented Reality can help people try on clothes virtually.
[09:14] Digital Mirrors will allow consumers to try on clothing in real time, via the use of Augmented Reality.
[09:14] Digital Mirrors and AR brings the fashion show experience to the online world.
[09:41] AR enables virtual concierge service for online retail.
[10:34] Design your own shoes with augmented reality!
[11:25] A frequent topic on this show, AI is front and center in every single industry. What AI applications are you seeing in Fashion?
[12:08] BigData is processed into small bytes if enriched information, which enables online retailers to create a personalized profile for each individual user.
[13:49] How will AI answer the age-old question, "Does this dress make me look fat?"
[16:24] Why, sometimes, good technology isn't adopted by the masses.
[16:57] What kinds of vulnerabilities are you seeing in Fashion, with regards to Cybersecurity?
[19:06] What kinds of Blockchain applications are you seeing in Fashion?
[21:22] What's next for Fashion?
Digital Transformation, AI, and Cybersecurity With Kai Grunwitz
September 24, 2018
[01:30] AI is seen quite often as an important component for a cyber-security strategy. What is your opinion on AI in Cyber?
[03:31] We're finding more and more, nowadays, that there is a battle between good & evil with AI.
[03:30] With AI, it's machines fighting machines!
[06:05] Cybercriminals are not only as sophisticated as we are, they are professionals.
[06:27] Cybercriminals are building new technologies that other cybercriminals can use as well.
[06:27] Cybercriminals are not just attacking your company, they're also selling the technology to other companies! Cybercrime as a service!
[06:48] Whatever technology we have, cybercriminals have as well.
[08:15] I noticed, in my research, that at your company, NTT Security, you're using a framework to secure digital transformation. What kind of framework you are using? Can you tell me about it?
[11:10] You need to protect your data, because hackers are trying to steal your data.
[14:00] Cybersecurity solutions can't be one size fits all.
[15:10] Digital transformation is a hot topic. Why do we still see a lot of transformation projects focusing on functions without involving Cyber Security early on? Is it still the case?
[15:41] Digital transformation is not optional, nowadays. It's a do or die question.
[16:00] According to IMD in Switzerland (https://www.imd.org/), 4 out of 10 companies, currently leading in their sector, will disappear in the next 5 years!
[17:50] Security by design approach - Cybersecurity must be a part of the development of new products, as trust is needed to win buy-in of consumers.
[20:27] Companies are ready to pay ransom, but they're reluctant to increase Security budgets. What is the challenge for digital transformation in this context?
[24:07] In the future, hacks and ransomware will become much more targeted, targeting critical infrastructure, such as airports, power plants, etc.
[25:06] Companies today are not well prepared for data loss.
[26:26] We talk a lot about AI and how it is changing society, business and work. In cyber security AI is one of the hottest topics, while at the same time, we also talk about skill shortages. Do you think in 10 years from now we will have hordes of security experts without jobs? What will be the role of AI in Cybersecurity?
[27:25] AI will not take away jobs. AI will change the types of jobs available.
[29:09] We need our education system to prepare our children for the workplace of the future.
[31:10] With the discussion around smart cities, a lot of IoT, Data, and Energy discussions have started. What do we need to do, to prepare ourselves, to truly leverage the advantages of living in a digital society?
[32:10] The focus of a Smart City should be to improve the lives of its residents.
[34:32] Is a Managed Services Provider a solution for all the CyberSecurity challenges?
[36:55] Johannas Drooghaag - CEO Spearhead Management, Germany: What is your advice and best practice experience to engage employees in proactive cyber resilience?
[38:33] Johannas Drooghaag - CEO Spearhead Management, Germany: Do you believe that a cyber security insurance is important for SME's?
[40:25] Johannas Drooghaag - CEO Spearhead Management, Germany: Appsec or infosec?
Tags: AI, Cybersecurity, Digital Transformation, Smart Cities
Cloud Computing and Data Security With Kevin Jackson
September 20, 2018
[01:23] Tell us a little bit about yourself and the work that you do.
[02:04] Cloud Computing enables new business models that attract global revenue streams.
[02:55] Thanks to The Cloud, you no longer need capital to build infrastructure for a business, because businesses are information based.
[03:28] What are some of the challenges businesses face with regards to data security, when migrating to the Cloud?
[03:28] The biggest challenges when migrating to The Cloud is managing the deluge of data.
[03:45] The typical information worker will create 1MB of data/sec.
[04:35] How is the classification of data managed at such a large scale?
[05:03] Nowadays, the creation of data has exploded!
[05:15] Due to the large volume of data, organizations can no longer afford to store all the data they use in everyday business.
[07:30] According to a report published by AT&T, 25% of companies planned to spend their Cybersecurity budgets on Cybersecurity insurance, which means they're "covered" financially in the event of a breach. As a consumer, that does not give me a comfort feeling that my data is protected. What do you think is the solution to this?
[08:00] Financial risk is only one of the issues associated with data breaches. Reputational risk and business ecosystem risk can be much more damaging.
[10:11]We hear about data breaches happening all the time. Once a business moves their data to the Cloud, if a breach occurs, who is responsible? The company, the Cloud vendor, or both? Are there any special considerations for GDPR?
[10:11] Data Protection is always the responsibility of the entity that collects the data (the data controller).
[11:42] Wonder upon wonder! The Russian Federation has a law that all personal data of Russian citizens are to remain within the physical boundaries of Russia.
[12:28] The executive of Putin shut down LinkedIn across all of Russia!
[13:00] There is no national general data protection law in the United States.
[13:30] The difference in data collection between US and EU, is that in the US it's opt in, VS opt out for EU.
[15:29] What's next for data security?
[15:45] In EU, Data Protection is a basic Human Right.
[15:56] in EU you have the right to be forgotten.
[18:25] Change is constant and accelerating.
AI, Chatbots, and Customer Experience With Ken Herron
September 17, 2018
[01:27] Before we jump into some exciting news about your company's accomplishments with AI, can you just give our audience a quick overview on what Intelligent IoT Messaging is?
[03:40] AI learns over time.
[04:10] What kinds of businesses would be a good fit for Intelligent IoT Messaging?
[05:36] An app is a fixed interface. What you see is what you get.
[05:36] With an app, you have to change consumer behavior when making an update.
[07:47] An app i great for multiple choice questions.
[09:40] Your company, UIB, recently announced a major accomplishment called Ask William. Can you tell me about it?
[10:15] Giving art a voice.
[11:30] Take a photo and get a response.
[12:00] UIB's Ask William is a virtual tour guide.
[13:38] The AI industry is headed towards personalization and personality - the customization of experience.
[15:50] AI makes every business global!
[18:39] How did Ask William get its name?
[20:07] I imagine that Ask William is becoming somewhat of a celebrity in Singapore, sort of like Siri. Are there any "hidden" features like jokes or witty lines that people can trigger?
[22:00] What's next for Ask William?
[23:10] What next for UIB?
Information Security, AI, and Blockchain With Will LaSalle
September 13, 2018
[01:25] AT&T recently published a Cybersecurity report stating that "The C-suite still has a significant lack of understanding of cybersecurity basics—the hygiene and the threats, the bad actors. And it's after the fact, after they've been breached, that the board actually does something about it—and that's true in even some of the largest companies." Furthermore, they go on to state that 25% of companies plan to spend their cybersecurity budgets on Insurance! Where is this disconnect coming from?
[04:15] Equifax Breach
[07:15] Elon Musk says he's going off of Facebook because we can't trust them.
[14:35] Tell us a little bit about JLS Technology USA & what kinds of solutions do you provide to the marketplace?
[14:35] Digital Transformation, Cybersecurity, Governance, Compliance.
[18:40] Telecos & Contact Centers are extremely vulnerable to cyber attacks, due to the wealth of personal information in their databases. How can they protect themseves from the daily barrage of cyberattacks, such as phishing, ransomware, and other social engineering based attacks?
[22:30] How is Blockchain being leveraged for data security?
[22:30] IAM Platform & Background check verification in Blockchain.
[22:30] Combat Healthcare Fraud by Verifying the person in the Blockchain.
[25:49] What kind of AI tools are being introduced for Cybersecurity?
[25:49] AI is needed because there aren't enough people to fill Cybersecurity jobs!
[31:29] What's going to be the next disruptor in data security?
[32:30] When calling into a contact center, you can't tell anymore if you're speaking to a human or a chatbot!
Cybersecurity, AI, and Industry 4.0 With Johannes Drooghaag
September 03, 2018
[01:23] As an accomplished Cybersecurity industry expert, what keeps you up at night?
[01:23] What keeps Johannes Drooghaag up at night is people using technology (i.e. connected kids' toys) without being aware of the associated risks.
[01:23] Industrial automation was built last century without security considerations.
[05:36] Trump's Soccer ball
[07:22] How will GDPR play a role in how smart device data is collected?
[11:30] Wherever we go we leave electronic fingerprints.
[14:13] What are some practical ways that people can protect themselves from cybercriminals?
[22:59] What types of innovation are you seeing in Industry 40?
[22:59] Industry 40 is about creating flexible industries.
[22:59] How Industry 40 enables efficient manufacturing of cars.
[25:30] What are some of the innovate ways AI is being applied to HealthCare?
[25:30] AI is helping physicians better diagnose and treat patients.
[31:48] What are some practical applications for Blockchain?
[31:48] Blockchain is minimizing waste for automotive recalls by enabling us to select only the vehicles that have the actual defect.
[38:37] Quantum Computers and their impact on Cybersecurity.
[42:50] Siemens Charter of Trust - we're obligated to provide updates and patches during a product's lifetime. This will become the gold standard.
[44:55] We, as consumers, must educate ourselves on our security options.
[45:50] What's next for Industry 4.0? More Transparency. Cleanup of older industries that pollute the environment.
[45:50] Can we retrofit older devices or replace them?
[45:50] AI will be bigger than BigData because it gives us capabilities to make complex decisions in realtime.
[45:50] Blockchain adds a fingerprint of everything we do online.
[47:45] Fight child slavery with Blockchain.
Digital Health, Health Tech, and AI With Irma Rastegayeva
August 23, 2018
[10:00] 5G Technology enables billions of sensors.
[10:00] IoMT - Internet of Medical Things - Connected Health
[10:00] What are Future Trends in HealthCare?
[14:10] Where is TeleHealth being Adopted?
[16:55] What are the challenges when it comes to Digital Health?
[21:58] Will AI take away jobs in healthcare?
[24:37] What are your thoughts on nanotechnology?
[31:22] What will be the next disruptor in Healthcare?
[33:42] How has technology changed dentistry?
[35:42] Where do Entrepreneurs go wrong?
IoT, Cybersecurity, and Blockchain With Mirko Ross
August 20, 2018
[02:10] I've seen statistics, where researchers estimate that there will be 50 billion connected devices by 2020. We've all heard about recent hacks, such as connected printers mining bitcoins, or gas pumps dispensing unlimited gasoline. As connected devices become more prevalent and numerous in our homes and businesses, how can we ensure that they stay up to date, in terms of security?
[17:52] Blockchain has been touted as the digital Fort Knox, impervious to hacks, and virtually unalterable. But is that really true?
[20:50] Over The Air patching of IoT devices may be an attack in
[23:27] Many companies are just now understanding the impact that “doing IoT” will have on their businesses (it’s called “business transformation” for a reason!). For companies who feel like they’re a "little behind" in getting started, what is your advice to help them to get the most out of their IoT investments?