Transcriber: Alaa shebl
Reviewer: Walaa Mohammed Ladies and gentlemen, Ralph Isham, India. You have already been hacked? Yes,
Every single one of you. Before you woke up this morning.
You already hacked. See, we live in a hybrid reality. No longer can you say that the opposite
of virtual. Means physical. Our physical world is almost entirely
driven by our virtuality, our information, our data. In fact, our individual
identity is defined by data. My name is Ralph India and I grew
up right here in Miami. Now I’m internationally known
as the ethical hacker, for over thirty years I have been
a technologist, cyber security expert , business executive, an entrepreneur
and yes, a hacker When I specifically in the last 15 years, I decided to focus on individual privacy
and what's called data protection. When I tell people what I've
done and what I do, I almost always get some
interesting questions. Typically they are, Can you hack
my boyfriend or girlfriend? Can you hack an Instagram account?
Can you hack my taxes? And, well, technically,
that may be possible. The answer is no, because that would
be unethical and illegal. But almost always I get asked, what is a hacker and how do I keep
myself from getting hacked? We are all constantly being bombarded with news of hacking,
but hacking is not a crime. It's actually a skill. But with the news, the type of coverage you get uses words
like cyber warfare and viruses and ransomware, and the list of
scary terms goes on and on. So much so that I would say that most
of us have what I call hacking fatigue. Now, I am sure that you have seen a movie or two with guys who look like this. I hope that's not me. But this.
This is not a hacker. Now we are constantly or usually anyway,
presented this way. We are wearing masks and hoodies, which are not necessary if you're in front
of a computer, by the way. And again, this is the way we're perceived.
Right? But one definition, one dictionary
definition defines the term hacker as a person who uses a computer to gain
unauthorized access to data. And under that definition, you have already been hacked because the
moment you started using technology, there is undoubtedly use of your data. That data that makes you you that defines
who you are, that is your identity. It’s that data’s already in use
in ways that you did not authorize, even if you happen to approve
the terms and conditions on that app and website which no one really reads. You have no idea how that
data is actually being used, nor do you really understand what
you agreed to But why? Why? Why should you care? Well, our lives are so intertwined
with technology that we can’t even operate in the physical world without it. And that's why we should all care,
because it affects you. It affects you in ways that
you may not even realize. That data, that data,
that data defines behavior and behavior defines our individual
and our collective identities. Identity defines reputation. Meaning that our use of technology may have a positive
or negative impact on you personally Now, in business
or any kind of personal matters. Our reputation drives our relationships. Privacy is an illusion. You cannot expect privacy when you’re
in public and you are, in fact, in public. You are public. all technology that we use today, everything that you guys
are using on your phones, is in fact a publicly available service, very much like a park or a library. So let’s get back to Hacker
for a moment here. This term hacker. There are different
types of hackers right? The important thing here, I want you
to think about that term hacker, is how do you become the hacker
and not the hacked? Right. There's a lot of different
types of hackers. We have still probably seen an illusion.
Here's some some of the hackers. We use terms in our industry like black
hats and white hats and green hats and gray hats. But those terms
have more to do with intent, with the motivation behind a person, the legal versus illegal activities
taken by a group or individual. But really, the characteristics that
make a person the hacker type. These are the sort of things we most of us
have. Number one, the ability to learn. A thirst for knowledge. And if
you note up here on one side, another meaning is an expert at problem
programming in solving problems. Also, a person who engages in an activity
without skill or talent. That's kind of a contradiction, right?
Quite contradicting meanings. But it's that activity. It's it's
the people who types who do. With or without knowing
what they're doing. The ones who do doing leads to expertise. It leads ultimately to the knowledge
and the skill sets for anyone to be effective
at achieving a goal. The Hack. So you don’t need permission
or authorization from anyone to know or to learn. And learning to learn is what hackers do. Oh, so well the truth is. That, you know, you think I’m telling you that you’re now
supposed to become a hacker or be a cybersecurity expert
just so you can protect yourself? No, because the truth is, is that
we don’t really care about cybersecurity. That’s what I have learned
in all these years. What we care about is safety. And security is a component of safety. But there are other components like
availability, trust and privacy. What we really care about is safety. When you go out to a club
out here or you go to an event, a venue for an event such as this,
you have to go through security. And even though the guys here,
we're not this way, usually it’s an intimidating person wearing a black shirt
that says security on it. That’s the last person we want to have to
deal with when we’re going to go party So but if that person
was wearing a light blue shirt and it said safety on it, you'll be more
likely to want to come up to them, communicate with them, ask
them questions. Right. Hackers are innovators in safety, both
the good and the bad actors. Because we love innovation,
talked about innovation, and innovation has changed
the way we live, and it’s created
massively lucrative industries and everything from energy to finance and provided all kinds
of considerable conveniences whose global impact are undeniable. In fact, in the 20th century
alone, innovations such as radio, television, radar, air conditioning kind
of important here in Miami, of course, computers and the Internet. We love innovation
because innovation creates opportunity. Opportunity fuels economy. And along
with these opportunities. Opportunity of any kind. Any kind. All
opportunities produce risks. Right? So risks can be exploited. In cybersecurity,
Exploiting risks creates innovation creating new opportunities. And this is the circle of innovation
insecurity producing security. Now, these risks
we hackers call vulnerabilities. And there technically there are
hundreds of vulnerabilities in the technologies that we use today. They either all have
or have had some sort of vulnerability. How many of us in this room show
your hands if you has had your computer or your cell phone crash? Okay. Oh,
that's almost everybody, right? Even. I recently had one of these issues.
I had an external drive that I use. And this this drive is very
important because it keeps a lot of important information, critical
data that I use for different things, personal information, pictures, of course,
and even I the ethical hacker, I don't I don't have access to the type of hardware necessary
to be able to do data recovery. I had to take it to a data
recovery company so that I can potentially get my information back. Vulnerability. Even I am vulnerable. I have to put my trust in someone else
to be able to get that information back. Vulnerability creates trust.
That sounds crazy, but it does. Vulnerability creates trust.
So who do you trust in technology? Who do you trust when it comes to privacy? Good answer. Trust yourself. Privacy goes hand
in hand with trust, right? And a lot of people I’ve had
this conversation with, people say I don’t care about privacy
because I have nothing to hide. And if you think you have nothing to hide, then that in itself is
your biggest vulnerability because you will be exposed
in ways that you couldn’t imagine today. And when you are,
oh, you’re going to care. I assure you,
our ability to create privacy or prevent that privacy
from being used as a vulnerability really comes through learning. Through understanding and
doing something with that knowledge. As I mentioned before, hackers are
really good at learning how to learn very quickly and very deeply
about a subject matter, about a company, about a technology, about a person or any sort of thing. They're really
good at knowing how to do this. But with all the resources that
we have online today, there is no reason. There is no reason why
you can’t do this all the same things. I could say that everybody
in this room is the smartest person in the room with one word. Google. Okay. There is no silver bullet for this issue
of privacy. There is no single solution. This really isn't about just installing
an antivirus or using a VPN. You have to actually learn how to reduce
your risks, digital or otherwise. And that’s the only way that
you can define your privacy. So. Privacy is something personal, only you can define it
and only you can then create it. So with that said
be the hacker and not that hacked. I’m going to leave you with a few lines
of hacker code that are the best I think It’s what I consider
to be the most powerful and best possible communicator, and that
is the universal language of music. I'm going to introduce you to my daughter,
Hennessy, and her song Privacy. Would you share your thoughts with me?
Unfiltered and raw, baby. Most definitely ugly.
Wouldn’t you, sweetie? Would you share your thoughts with me? Unfiltered and raw, baby. Most definitely ugly. Would you, sweetie? Should you be able to see
all the dirty aspects of me, even the ones I have yet to see? Should you be able to see
all the dirty aspects of me, even the ones I have yet to see? Privacy, where have you gone? Privacy, What do you mean ? privacy, were you thought of? Cause I don’t see any, any, any privacy. privacy. privacy. privacy. So you say that you've
got nothing to hide. So then I guess you wouldn’t mind
if I let myself inside. So you say that you’ve got nothing to hide So then I guess you
wouldn’t mind if I let myself inside. Privacy, where have you gone? Privacy, what do you mean? privacy, were you thought of? Cause I don't see any. Any, any.
Any privacy privacy privacy privacy Get some privacy.