(bright music) - [Interviewer] It's not necessarily an issue that the media is sensationalizing or shedding light on these breaches that are happening, but more so the issue is that we're focusing on the wrong thing. - We're focusing on the headline. We focus on the headline, we don't focus on the next three bullets below the headline about what are we gonna do with it.
Because we still haven't done anything about those other breaches, other than sending a person a, hey, here's some credit reporting that you get free for the next six months or whatever time period. - [Interviewer] Yeah. - But what it look like if we collectively actually wanted to solve this problem and ask what those things look like? You know, I think the 101 of this, the starting point is that everybody who goes into academia, or any type of training class wherever, it could be here on this platform, it could be in college, it could be community college, online course, anywhere.
Everyone should be trained, if you're taking computer science you should be trained in two things. You should be trained in ethics and security, because that establishes, that lifts the bottom up. The second part is we have to ask what are the policies to ensure that your data is safeguarded? What happens if it's out there? And what are we gonna do about that? How do we make sure that that data's not gonna be used against you? (bright music)
Skill Level Intermediate
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.