More than 5 billion people are now online. Each spends an average of six hours a day on the Internet. This widespread internet use offers vast opportunities but also increases cybersecurity threats. Safety and accountability are now becoming more critical than ever. We need practical ways to reduce online risks, prevent harm, and build trust.
These issues were discussed during the “Empowering Bytes” panel at the Open Forum organized by the World Economic Forum (WEF) in Davos as part of the 55th Annual Meeting.
The discussion was moderated by Helena Laurent (Director-General, Consumers International), who brought together a diverse group of experts:
- Bilel Jamoussi – Deputy Director, Telecommunication Standardization Bureau, ITU),
- Lauren Woodman – CEO, DataKind,
- Peter Lucas Kaaka Jones – CEO, Te Hiku Media,
- Amanda Graf – Student, Swiss Alpine Middle School.
They shared their views on challenges and potential solutions related to digital presence, data privacy and online safety.

Context
The panelists provided a valuable overview of the current cybersecurity environment. They highlighted these key factors impacting online safety:
Varying Levels of Data Sharing. Bilel Jamoussi pointed out that we share different amounts of data online. Our approach can range from complete disconnection from online reality to unrestricted sharing. Finding the right balance depends on users knowing what data they share and companies being transparent about how they use it.
Dual Role of Technology. Panelists agreed that technologies like AI and quantum computing present opportunities and challenges. They can enhance security, but they can also be misused. The growing use of the metaverse and biometric data further complicates the matters and raises concerns about data privacy.

Risks and Challenges
The discussion brought to light several significant challenges that organizations must address to strengthen their cybersecurity:
Double Nature of AI. AI has the potential for both good and bad in cybersecurity. It can help detect fraud and improve security operations, but it is also used by cyber criminals to create deepfakes and streamline driving social engineering campaigns at scale.
Quantum Computing Threats. The development of quantum computing could render current encryption methods obsolete. This poses a significant future threat to data security.
Data Privacy in Virtual Reality. The increasing use of the metaverse raises concerns about collecting and using biometric data without explicit consent mechanisms.
Data Collection Without Consent. Many companies still collect user data without proper permission. This approach undermines user privacy and control.
The Gap Between Policy and Implementation. There is a significant challenge in ensuring that international standards are widely adopted and effectively implemented.
The Human Factor. User awareness and behavior remain critical to cybersecurity. Many people do not understand online risks or how to protect themselves.

Recommendations
The panelists offered several key recommendations to address these challenges and improve cybersecurity:
Promote Digital Responsibility and Awareness. Organizations should invest in educational initiatives to raise user awareness about data privacy and security. As Lauren Woodman suggested, it is crucial to empower individuals to make informed decisions about their data.
Foster Collaboration. Addressing cybersecurity complexities requires cooperation between governments, companies, and individuals. Bilel Jamoussi emphasized the importance of ongoing dialogue and creating shared standards, especially through platforms like AI for Good.
Advocate for Transparent Data Practices. Companies must be transparent about their data handling practices, obtain explicit consent and give users control over their data. Woodman highlighted that individuals can “vote with their dollars” by choosing not to use services that fail to uphold these standards.
Leverage AI for Enhanced Security. Despite its risks, AI offers powerful tools for improving cybersecurity. As Jamoussi noted, AI can detect fraud and identify threats more effectively.
Prepare for the Quantum Era. Organizations need to start preparing for the impact of quantum computing on cybersecurity. Jamoussi highlighted the potential of quantum computers to both enhance security and break existing encryption. It highlights the need for the development of quantum-resistant solutions.
Support Digital Identity Solutions: Jamoussi mentioned the growing interest in digital identity solutions, such as the OpenWallet Forum, which can improve the security of digital public infrastructure services.
Stay Informed and Adapt. The cybersecurity landscape is constantly changing. CISOs and other leaders must stay updated on emerging threats and technologies. Continuous learning and adaptation are essential for maintaining robust security.

Further Reading
For a deeper dive into the topics discussed during the panel, you can explore the following resources:
Artificial Intelligence and Cybersecurity. WEF issued the “Artificial Intelligence and Cybersecurity: Balancing Risks and Rewards” white paper. It covers the context for AI adoption, emerging cybersecurity practices for AI, actions for senior leadership and practical steps toward effective management of cyber risk associated with AI.
Embracing the Quantum Economy. WEF recently published the “Embracing the Quantum Economy: A Pathway for Business Leaders” report. It focuses on quantum technologies, including quantum computing, quantum sensing, quantum communication, and security. It covers the economic impacts, opportunities, risks, and mitigation strategies.
NIST IR 8547. The National Institute of Standards and Technology (NIST) released an initial public draft report on “Transition to Post-Quantum Cryptography Standards.” It outlines how to move from today’s vulnerable encryption to new, quantum-resistant standards. It identifies which algorithms will be replaced and what will replace them.
ITU Standards. ITU published an extensive library of recommendations covering data networks, open system communications, global information infrastructure, next-generation networks, the Internet of Things, and smart cities. The interesting standards also include the topics of machine learning and artificial intelligence.
Staying informed and adapting to the latest trends and threat landscape are crucial. These resources offer a starting point for strengthening your cybersecurity posture.