Internet of Things: Just Someone Else's Computer?
Friday, March 11
5:00PM - 6:00PM
110 E 2nd St
The Internet of Things not only enables new technological possibilities; it forces us to confront and upend assumptions we have about our devices, our property, and our persons.
Embedding networked computers in a wider range of objects--not just tablets and phones, but cars, wearables, medical devices, appliances, and homes--generates data about consumers, and gives control over how the devices work and the data they generate to people outside the consumer's home.
Our laws and behaviors are built around personal control of personal property. But now that those devices are "smart," they can have "loyalties" to people other than their owners, in their code and in the law.
Professor of Law
US House of Representatives
Sr Dir of Community & Public Affairs
Jen Ellis is the Vice President of Community and Public Affairs at Rapid7, a security data and analytics company. Rapid7 is trusted by more than 5,100 organizations, including 37% of the Fortune 10...Show the rest
Jen Ellis is the Vice President of Community and Public Affairs at Rapid7, a security data and analytics company. Rapid7 is trusted by more than 5,100 organizations, including 37% of the Fortune 1000, to help them reduce the risk of a breach, detect and investigate attacks, and build effective IT security programs.
Jen’s main focus is on building productive collaboration between those in the security community and those operating outside it. As part of this, she works with security researchers across the community to help them disclose critical vulnerability findings to protect affected organizations and consumers. Her background in reputation management and crisis communications enables her to support technology vendors as they work through the disclosure and mitigation process.
Jen also works extensively with various Government entities to help them address cybersecurity challenges through both legislative and non-legislative approaches. In 2015, she testified on legislative threats to security research before the United States Senate Judiciary Subcommittee on Crime and Terrorism. She has also provided security insight and introductory training to Congressional staff, as well as participating in Congressional panels on export controls of intrusion technologies under the Wassenaar Arrangement, encryption, and the Digital Millennium Copyright Act rulemaking process. She led a security research workshop for the Federal Trade Commission.
She has spoken at a number of security industry events including RSA, HOPE, Derbycon, SOURCE, UNITED, and various BSides.Hide the rest