Where does digital transformation fit into your industry? Part Two
Dec 17. 2019Business-led digital transformations are transcending industries, and with it comes new security conversations around a more connected business world. On this episode of Recalibrate with Samsung, host Jason Claybrook continues to speak with Keith Fuentes and Mark Irwin with Samsung Knox along with Reid Estreicher with Samsung B2B Marketing where they continue their conversation on the potential risks around digital transformation and future security measures in networking. What are the biggest risks when it comes to networking? These experts discuss Wi-Fi as a key example. New security technology has the possibility of making public networks at least somewhat safer, but what else is on the horizon? 5G will unlock massive amounts of real-time access to data from connected devices and provide faster, more instant access to information. As this data becomes more accessible and prevalent, new security enhancements are following in its path to enable safer storage and access of important information.
Guests:
Jason Claybrook - Host
Keith Fuentes - Samsung Knox, Software Sales
Mark Irwin - Samsung Knox, Software Sales
Reid Estreicher - Senior Manager, B2B Mobile Marketing, Samsung Electronics America
Don't Miss These Discussion Topics:
00:50 | What is the biggest security risk to our devices? |
02:50 | How do we better deploy Wi-Fi for improved efficiency and security? |
07:30 | How can we make security easier for users? Who certifies this stuff anyway? |
10:30 | Are there any scenarios where we don’t need to worry about security? |
11:40 | Where does security come into IoT and smart home devices? |
12:45 | Example: Smart baby monitors can be hacked. How could this be prevented? |
15:20 | How can we use the capabilities of IoT without having them be security threats to us? |
17:35 | 5G is to modern society what roads were to the Roman Empire. |
18:50 | The power and speed of 5G will also allow security to scale. |
22:10 | Generational differences in terms of security practices. |
Disclaimer
Opinions expressed in the content posted here are the personal opinions of the original authors, and do not necessarily reflect those of Samsung Electronics Co., Ltd. or its subsidiaries ("Samsung"). Samsung products mentioned within this post are offered by Samsung. The content is provided for informational purposes only and is not meant to be an endorsement or representation by Samsung or any other party. This site may also provide links or references to non-Samsung sites and resources. Samsung makes no representations, warranties, or other commitments whatsoever about any non-Samsung sites or third-party resources that may be referenced, accessible from, or linked to this site.