With the proliferation of data, cybersecurity jobs have increasingly been considered one of the most demanding professions among organizations. The global cybersecurity market was valued at $118.78 billion in 2018, and is expected to reach $267.73 billion by 2024, registering a CAGR of 14.5%, from 2019 to 2024.
In one of our articles, we had listed the top free resources to learn cybersecurity. In this article, we compile the top 10 TED talks on cybersecurity one must not miss:-
1| Hackers: The Internet’s Immune System
Subscribe to our Newsletter
Join our editors every weekday evening as they steer you through the most significant news of the day, introduce you to fresh perspectives, and provide unexpected moments of joy
About: In this talk, cybersecurity expert Keren Elazari describes the importance of hackers. She makes a distinction between good and bad hackers, and explains how the former are working to fight government corruption. Keren also said that by exposing vulnerabilities, they push the internet to become safer, wielding their power to create a better virtual world.
2| Everyday Cybercrime — And What You Can Do About It
About: In this talk, James Lyne discusses the kind of malware that can corrupt someone’s data to tap into their bank account details, and other ways in which users can pick up a malicious virus online. He said that these viruses are coming through simple things one does each day without thinking twice. James also reminds viewers that it is not only the NSA that is watching them, but ever-more-sophisticated cybercriminals, who exploit both weak codes as well as their gullibility.
3| Where Is Cybercrime Coming From?
About: The speaker of this talk – Caleb Barlow – is a cybersecurity expert. Here, he discusses some of the insufficiencies of current strategies when it comes to protecting data. He describes the methods one can employ to respond to cybercrimes. This can be with the same collective effort as one applies to a health care crisis, sharing timely information on who is infected and how the disease spreads.
4| Your Human Firewall – The Answer To The Cybersecurity Problem
About: Rob May, chairman of IoD Surrey, an award-winning entrepreneur and Managing Director of RAMSAC limited has conducted this talk. Here, he shares the need to develop a human firewall in an age where there is a large online presence of people. Rob makes complex subjects straightforward by using real-life examples, humour and pragmatism in this talk.
5| Your Smartphone Is A Civil Rights Issue
About: The speaker of this talk is Christopher Soghoian, a privacy expert who discusses the vulnerability of smartphones. Christopher details a glaring difference between the encryption used on Apple and Android devices, and urges everyone to pay attention to a growing digital security divide. “If the only people who can protect themselves from the gaze of the government are the rich and the powerful, that’s a problem,” he said.
6| The 1s And 0s Behind Cyber Warfare
About: Chris Domas, who is a cybersecurity researcher, has conducted this talk. Here, he demonstrates how researchers use pattern recognition and reverse engineering, along with a bunch of coders who understand the subject, to understand a chunk of binary code whose purpose and contents they do not know.
7| Governments Don’t Understand Cyber Warfare. We Need Hackers
About: The speaker of this talk is Rodrigo Bijou, who is a security analyst. In this talk, Rodrigo shows that modern conflict is being waged online between non-state groups, activists and private corporations. He also states that the digital landscape is proving to be fertile ground for the recruitment and radicalization of terrorists. Bijou further urges governments to end mass surveillance programs and shut “backdoors” — as he makes a bold call for individuals to step up.
8| How Tech Companies Deceive You Into Giving Up Your Data And Privacy
About: In this talk, Finn Lützow-Holm Myrstad discusses the alarming ways in which tech companies deceive their users. Myrstad shares insights about the personal information one have to agree to let companies collect information about themselves. Moreover, he explains how companies use the collected data at a scale one could never imagine.