Story image

Gaze into tech's crystal ball: Futurist Shara Evans talks security

05 Jun 2017

When it comes to the future of technology, you don’t need to look much further than Shara Evans, who is one of the world’s top female futurists and keynote speakers.

“I spend a lot of my time looking at the latest and greatest that is happening in research labs around the world and also cutting-edge developments that are just coming to market now or in early prototypes.”

Whether that’s robots, nanotechnology or medical technology, or society’s reactions to those technologies, Evans has her finger on the pulse.

Evans also helps specific verticals and industries work out how to apply the latest technology, look ahead to imagine the world in 10-20 years and how they can innovate to capture that change.

Speaking exclusively to SecurityBrief, she explains exactly why technology is about to get a whole not more exciting - and a whole lot more dangerous.

“The one threat that I find in so many cases is that security is an afterthought, privacy is missing and ethics aren’t even thought of. This happens especially in the startup world, where people are just looking to solve problems or do something cool. They’re not security experts,” she says.

“By attaching things to the internet in particular, you end up with potential areas that could lead to vulnerabilities. All you need is one weak link. It’s not just hacking that is the issue, it’s how much information people put about themselves that they have either knowingly or inadvertently put out by using technology through a vendor’s website.”

From an enterprise side, Evans says that the very first thing they need to understand is where technology is going and which of those they might implement in their own organisations, especially if staff are bringing those technologies in through their own initiatives.

“The future is not fixed. There are a range of potential scenarios that can happen based on uptake of technology, technological hurdles being solved, geopolitical factors and climate factors. I look at different scenarios for how things might unfold and look at the way society might change and see where some of the puzzles might be.”

“If somebody has a wearable device and is connecting to their work mobile phone, and there’s malware contained within it, suddenly it’s into a company’s private network because somebody has a device that isn’t secured properly.”

She says that her presentation at the ASIAL Conference will focus on the cutting-edge technologies, where they’re going and what can be hacked and some of the exploits that have happened. We then look at new technologies and how they might open up vulnerabilities for enterprises as well.

“If you think about technologies like drones. They’re getting smaller all the time. The military has surveillance drones the size of an insect. You could have a device like that in your boardroom and you’d never know it.”

She says she will also look at how technology is helping to enhance humans, through the likes of ingestible and implantable technologies that are connected to the internet. What are the implications for businesses when that happens?

“Things that are in the research labs right now are likely to be protecting their business in the mid-term to long-term.”

She comments that internet-connected devices, from drones, to wearables to the humble refrigerator, fire alarm, surveillance camera and temperature monitor, biometric databases - are all connected.

Augmented reality is another growing area, which will evolve from smart glasses to smart contacts, Evans says. On the business side, she says these are prime tools for collaboration, visualisation, GPS signals, visual feedback in industrial projects and much more. What that means though, is that security is imperative.

“In the case of the industrial worker — if somebody hacked that and told workers to turn gauges in the wrong direction, you have a disaster or a terrorist attack because somebody has hacked into an augmented reality string.”

She says the reality is that if there is a backdoor, somebody is going to exploit it. Organisations need to know what what could happen if things go wrong, and what organisations need to do to make sure that they don’t go wrong.

“Once an attack is there, you absolutely cannot control it. There’s a rather naive view that only people with authorisation can get into a backdoor, but that’s just not the case.”

Shara Evans will present at the ASIAL Conference, part of the Security Exhibition & Conference in Sydney that runs from July 26-28.

She will be covering topics as diverse as data security, wearables, health and embedded technology, the Internet of Things, and how they will unfold in the future.

“It’s always interesting to see where the world is going in the future, and that’s what I will be talking about,” she concludes.

What: The Security Exhibition & Conference 2017 When: July 26-28 Where: International Convention Centre, Sydney

To find out more and secure tickets, visit

Hybrid cloud security big concern for business leaders
A new study highlights that IT and security professionals have significant concerns around security for hybrid cloud and multi-cloud environments.
GitHub launches fund to sponsor open source developers
In addition to GitHub Sponsors, GitHub is launching the GitHub Sponsors, GitHub will match all contributions up to $5,000 during a developer’s first year in GitHub Sponsors.
Check Point announces integration with Microsoft Azure
The integration of Check Point’s advanced policy enforcement capabilities with Microsoft AIP’s file classification and protection features enables enterprises to keep their business data and IP secure, irrespective of how it is shared. 
ESET researchers break down latest arsenal of the infamous Sednit group
At the end of August 2018, the Sednit group launched a spear-phishing email campaign, in which it distributed shortened URLs that delivered first-stage Zebrocy components.
Container survey shows adoption accelerating while security concerns remain top of mind
The report features insights from over 500 IT professionals.
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Who's watching you? 
With privacy an increasing concern amongst the public, users should be more aware than ever of what personal data companies hold.
Fake apps on Google Play scamming users out of cryptocurrency
Fake cryptocurrency apps on Google Play have been discovered to be phishing and scamming users out of cryptocurrency, according to a new report from ESET.