Law and the Future of War

Cyber autonomy - Ryan Ko

May 13, 2021 UQ Law and the Future of War Season 1 Episode 16
Law and the Future of War
Cyber autonomy - Ryan Ko
Chapters
Law and the Future of War
Cyber autonomy - Ryan Ko
May 13, 2021 Season 1 Episode 16
UQ Law and the Future of War

In this episode, Dr Simon McKenzie talks with Professor Ryan Ko about the prospects and risks of cyber autonomy. Programs and systems are being developed that automate cyber defence, allowing them to self-discover, prove and correct software vulnerabilities at real-time. Some are even capable of doing more than defending, but can also attack other systems in the computer network, all without direct human oversight.

Professor Ryan Ko is Chair and Director of Cyber Security at the University of Queensland and is also Deputy Head of School (External Engagement) at the School of Information Technology and Electrical Engineering. His research in cyber security focuses on returning control of data to cloud computing users, reducing users' reliance on trusting third-parties and focusses on (1) provenance logging and reconstruction, traceability and (2) privacy-preserving data processing. Along with his academic research, he has advised companies and governments on managing cybersecurity risks. 

Further reading

Show Notes

In this episode, Dr Simon McKenzie talks with Professor Ryan Ko about the prospects and risks of cyber autonomy. Programs and systems are being developed that automate cyber defence, allowing them to self-discover, prove and correct software vulnerabilities at real-time. Some are even capable of doing more than defending, but can also attack other systems in the computer network, all without direct human oversight.

Professor Ryan Ko is Chair and Director of Cyber Security at the University of Queensland and is also Deputy Head of School (External Engagement) at the School of Information Technology and Electrical Engineering. His research in cyber security focuses on returning control of data to cloud computing users, reducing users' reliance on trusting third-parties and focusses on (1) provenance logging and reconstruction, traceability and (2) privacy-preserving data processing. Along with his academic research, he has advised companies and governments on managing cybersecurity risks. 

Further reading