ASU’s Next-Gen Cybersecurity event elevates student voice for a conversation on digital trust

“At the root of cybersecurity is trust.” 

That powerful summary statement came from Hallie Schukai, an ASU senior majoring in computer science. Her insights — along with the ideas, trends and tips surfaced by fellow student panelists — were shared at UTO’s Next-Gen Cybersecurity event, a kick-off for ASU’s Think! Campaign during October’s Cybersecurity Awareness Month. 

The central theme that emerged, as indicated by Schukai’s point, was the importance of digital trust — the background of confidence that users have in their place and security in a virtual world — in the field of cybersecurity.

Rethinking the meaning of cybersecurity

ASU Chief Information Security and Digital Trust Officer Donna Kidwell led the conversation during the event, and set the stage for the perspective of keynote speaker Michael Palmer, Chief Information Security Officer at Hearst. His advice in the context of building trust laid the groundwork for conversations to come. “I'd say the most important thing for me is building relationships,” Palmer said. “The other thing I would [advise] is really trying to be a good storyteller.”

The five-student panel, moderated by UTO Executive Director Digital Trust Initiative Timothy Summers, expressed the importance of telling one’s story. 

To start, the students offered their insight into the general perception of cybersecurity; education and impact can’t be imparted without giving a true sense of what the field entails. “I thought cybersecurity was solely about hacking,” Schukai said, explaining that the reputation of cybersecurity has become extreme, depicted in an often “scary” way in the media.

“But a lot of people don’t think much about cybersecurity because they don’t think they’re worth targeting,” said Christopher Earles, who majors in computer science with a focus in cybersecurity. This reveals a problem with equity, or a level playing field for a diverse set of people, in cybersecurity impact. “I used to think equity was present in the indiscriminate way people attack,” Earles said. But his perspective changed when he saw particular demographics targeted in different ways.

Schukai added that many particular groups, such as the elderly and low-income people with little access to internet information, are particularly affected by phishing scams, which use fake links that appear to be legitimate communications from organizations like the IRS.

Building digital trust

So what are the ways in which these risks can be mitigated? Or as Schukai put it: “How can we log into Facebook or social media with trust in that link going to the verified website?”

“Transparency and trust are really valuable,” said Seong Jung, a junior majoring in applied computing with a focus in cybersecurity. Jung described a three-step approach that companies or institutions take only some or none of; they need to communicate security concerns, devise solutions and implement them.

From that organization side, transparency in data collection is also important. “When we sign terms and conditions and read them, what do they actually say?” asked Claire Kenison, a major in business data analytics. “All these free services are not really free,” Kenison said, explaining that the selling and use of data is one of the defining problems in cybersecurity.

Individuals can also take steps to protect their information from attackers. Password management tools were a highly recommended cybersecurity measure by the students. Another was the use of browsers with extensive security features; Schukai uses DuckDuckGo, Jung Firefox.

Kenison also pointed out that many services let you log in to other sites or apps with the same information, so keeping them separate can remove the risk of a chain reaction of breaches. Earles supported that concept by saying it’s not a good idea to use the same password for everything.

Educating everyone on the value of cybersecurity

All of these ideas can cohere into the support of digital trust. Equity, organizational transparency and individual best practices, as identified by these students, are central to it. 

Going forward, education can help us achieve these goals. “Consider who’s most vulnerable to these kinds of attacks,” Jung said, and gave a call to action to his cybersecurity-oriented audience to have conversations with vulnerable groups about protecting their information.

Schukai, as part of that summary, gave a positive outlook to the future of cybersecurity, which often can be talked about in scary, negative terms: “Faith in good people, good organizations and good motivations keep it all spinning!”

---------------------------------

Check out the session recordings:

Watch the student panel discussion:

And check out the fireside chat with cybersecurity leaders Donna Kidwell and Michael Palmer: