Skip to main content

ASU 2022 Digital Trust Summit identifies top 5 future challenges, opportunities for cybersecurity

Aerial view of people walking across crosswalk with location icons next to them.
November 04, 2022

For many, our internet-connected devices know more about us than our closest friends. Every day these devices are privy to a constant stream of information about us. For the 2022 Digital Trust Summit, teams at Arizona State University's Enterprise Technology surfaced a key theme for the nearly 200 cybersecurity leaders, faculty, researchers and students: How much do you trust the websites and products you’re using?

“We’re committed to learning from this diversity of thought leaders and folks doing amazing work across the globe, and then taking those wonderful lessons and then figuring out how to adapt them locally,” said summit host and ASU’s Chief Information Security and Digital Trust Officer Donna Kidwell. 

Here’s a look at the five key themes that emerged from the various keynotes, discussions and panels: 

1. New technologies require new human skills. Waymo, a global leader in self-driving vehicles and the world’s first autonomous ride-hailing service, leverages various emerging tools to power their fleets. To prevent malicious interference over the networks the vehicles are connected to, wireless security and machine learning are paramount. 

“You have to assume that things can go wrong,” shared Waymo’s head of cybersecurity Stacy Janes. “You can’t just design for this success case — you have to design for the worst case.” 

Future jobs will call for machine learning data specialists — those who can identify and work with synthetic data that enables the car to continuously learn as it drives, ensuring safe rides for all. Beyond acquiring the technical prowess, organizations and individuals should hone their data privacy knowledge and strategies. 

2. Consent processes must be human-centered. According to Statisa, a staggering 97% of adults do not read the terms and conditions of online services. 

The first panel of the summit was titled “Consent & Sensibility: What did I just sign?” Panelists agreed that the dense language of current terms of service and consent processes is antiquated and prioritizes the business — not the customer. 

“Any relationship is built on communication, and we need improved communication on this,” said Jamie Winterton, panelist and director of strategy for ASU’s Global Security Initiative. “Being specific about usage, being clear about how to opt out, and making it easy for people to opt in and out (is key).”

3. Everyone must participate in cybersecurity training. Addressing security equity — defined as providing the tools, resources and knowledge to ensure all individuals can protect their data — means providing opportunities for people in every role to learn. 

Deborah Watson, resident chief information security officer at Proofpoint, emphasized that our current blind spots can often be attributed to inadequate workplace processes rather than people. 

“Using language like ‘negligent,’ ‘careless’ and ‘weakest link’ creates a defensive culture within our employees that already don’t like security,” Watson cautioned. Instead, organizations should consider more targeted and personalized training for everyone that has access to critical systems and networks.

4. Open-sourcing our resources will enhance the security of our communities. The panel titled “Open Science, Open Source: Innovation for All” was moderated by ASU Knowledge Enterprise Chief Information Officer Sean Dudley, and the discussion quickly identified a socioeconomic gap: Not every institution can afford or has the technical prowess to acquire or maintain licenses for technologies.  

“In science, the tradition is to hold closely any data of value as long as you can grind all value out of it,” shared Dudley. “Then maybe if you find the time, share it with somebody else if they discover something.”

5. Closing the security equity gap is a choreographed team sport. At the summit roundtable, Ryan Murray, deputy state chief information security officer for the state of Arizona, encapsulated the challenge by posing a question. “How do you provide these modern services to communities that aren’t really in an equitable location for digital inclusion — and then trying to stay safe online?”

Universities and governments increasingly rely on industry players to deliver more than just technology. Devising programming that resonates with various levels of digital equity and fluency is vital. 

In her closing remarks at the summit, Kidwell shared her personal "aha" moment from the day about building a more diverse, inclusive cybersecurity workforce that better serves all communities. “A lot of the paths that I see today are folks coming to an interest in this space because they’re concerned and they’re advocating,” she said. “It’s the mission that drives all of us.” 

Written by Samantha Becker, strategic communications advisor to the CIO, ASU Enterprise Technology

More Science and technology


Man using a piece of equipment and smiling.

ASU introduces trailblazing 'stackable microcredentials' pilot

Arizona State University's Ira A. Fulton Schools of Engineering is at the forefront of transforming engineering and technology…

February 29, 2024
A man kneeling down at the edge of a pond next to several ducks.

More than 60 distinct viruses found in feces of common park duck

Billions or even trillions of tiny microbes, like bacteria, fungi and viruses, live inside every single animal, making each one…

February 29, 2024
A gila monster is perched next to a cactus with its mouth open.

ASU researchers first to fully sequence Gila monster genome, thanks to crowd-funding campaign

The Sonoran Desert is full of wild creatures, from sharp-tailed scorpions that glow under black light to desert toads that…

February 28, 2024