Hacker turned cybersecurity expert and academic, Keren looks at everything from corporate espionage to national security and geopolitics, as they are played out on, and being radically changed by digital and social media. The acclaimed TED speaker looks at why hackers might hold the key to the future of the internet, common security myths, and the intersection of business, commerce and society.
Keren Elazari is a hacker turned digital security expert and a research fellow with the Yuval Ne’eman Workshop for Science, Technology and Security at Tel Aviv University, where she explores the intersection of cyber conflict and politics.
As well as working for leading digital and technology blog GigaOM as cybersecurity Industry Analyst, Keren has served as a Teaching Fellow on security at Silicon Valley’s Singularity University. She’s also held roles at international security systems company Verint, and at AT&T and PwC, as well as working with governments and international organisations. She crosses academia, the business and security worlds researching the ever-evolving threats facing all aspects of web.
Keren considers the role hackers increasingly play in shaping the digital landscape. With information the new currency of a digital society, control and manipulation of that information gives huge power to a small number of companies and agencies. Often what is being done with that information, and its security, is something only hackers can investigate.
In her acclaimed, international hit TED speech, Hackers: the Internet's immune system, Keren sugests that, whilst hackers may have a bad reputation, many perform a vital role in finding (and fixing) security flaws, exposing malicious web users, and raising awareness of social, commercial and political issues outside cyberspace.
With examples from the Arab Spring uprisings to flaws in Facebook’s security, many hackers act in benign ways, taking on social, political, and increasingly military disputes. So how can hackers be encouraged to do good? How can they be embraced by established organisations whilst retaining their freedom to operate? And what happens when hackers work on both sides?
© Copyright 2018 JLA. All rights reserved.