Maritime Cybersecurity
The open seas have long attracted those who yearned for adventure. The risk of pitting oneself against a vast and unforgiving sea has tested sailors’ mettle for millennia. It’s not surprising that the maritime industry is one that thrives on facing – and overcoming – risks. But, as technology increasingly dominates it, growing risks exist that the industry dare not ignore. Its growing effort to increase efficiencies through digitization and automation has made it an inviting target for 21st century pirates whose weapons are not cutlasses, but computers. Vulnerabilities in maritime systems and security practices threaten to inflict huge losses...
Cyber-Kinetic Threat
A growing number of today’s entertainment options show protagonists battling cyber-attacks that target the systems at the heart of our critical infrastructure whose failure would cripple modern society. It’s easy to watch such shows and pass off their plots as something that could never happen. The chilling reality is that those plots are often based on real cyber-kinetic threats that either have already happened, are already possible, or are dangerously close to becoming reality. Cyberattacks occur daily around the world. Only when one achieves sufficient scope to grab the attention of the news media – such as the WannaCry ransomware...
Smart Cities
How important privacy is for building smart cities and embracing the IoT In the 60s cartoon The Jetsons, the family lived in a futuristic city with flying cars, a robotic housekeeper, and even a watch that let you do video calling. The Jetsons city of the future is with us in the here and now as we have the technology to build smart cities, and in doing so, we can create amazing places to live and work. This idea of making our cities smart is engaging clever minds all over the world and we are witnessing the emergence of smart places...
Cyber-Kinetic Attacks History
The fact that cyber-kinetic attacks rarely appear on mainstream news doesn’t mean they don’t happen. They happen more frequently than you would think. Many, for various reasons, aren’t even reported to agencies charged with combatting them. This hinders security experts in understanding the full scope and recognizing the trends in this growing problem. We’ll highlight examples of cyber-kinetic incidents and attacks in this chapter. Some were malfunctions that, nonetheless, demonstrated cyber-physical system vulnerabilities. Some were collateral damage from hacking or computer viruses. The vulnerabilities these exposed inspired a growing number of targeted cyber-kinetic attacks in recent years. The Beginning of Cyber-Kinetic...
Diversity Uncomfortable
The topic of diversity is not one that most people find in their comfort zone. As I wrote in a previous article on diversity, increasing diversity often engenders frustration in those tasked with accomplishing it, and inspires eye rolls among diversity-fatigued employees who have heard countless reports on management’s diversity goals, but remain unconvinced of diversity’s value. Can anything be done to make diversity less of an uncomfortable topic? The answer is no. Nothing about diversity will ever make it into the general business population’s comfort zone. I say that not out of cynicism, but out of practicality. At its root, diversity...
FinCrime Cyber
The worlds of financial crime and cybercrime are colliding, converging into one. The biggest threat to businesses globally is the new cyber-enabled financial crime. Yet businesses and even financial institutions tasked with protecting our money continue to fight this combined threat with multiple separate defense systems and multiple separate defense teams. The situation is like a military leader trying to fight different enemies on different fronts. While those enemies remain in different fronts, it makes sense to send separate defense forces against them, each focused on fighting only the enemy assigned to it. But what if those enemies merge and...
Enterprise Resilience
Modern theories of the firm remain focused on transaction costs, operational efficiency, employee motivation, leadership, strategy and other related factors. While any of these may support our success at various times, none of them alone will facilitate it in the long run. Even strategy, while vitally important, is set at a point in time and is vulnerable to change. The one factor that enables our company’s long-term viability is Enterprise Resilience which enables a company to adapt to a change. Technological Upheaval We are in an ever-shifting maelstrom of change. Climate change causes more frequent and intense natural disasters. Changing climate...
Diversity Failings
Don’t expect this to be either of the typical articles about diversity. I’m here not to fawn over its benefits nor to rant about who does or doesn’t get hired. I’m here, instead, to ask why we react to it in the baffling way we do, why it often accomplishes the exact opposite of its stated goals and what dramatic approaches we might take to make achieving its goals more realistic. Announce a round of diversity training, or of progress toward reaching diversity hiring goals, and one thing is guaranteed. Eye rolls and sarcastic comments among workers will abound behind...
Curiosity
Several comments in response to my recent competency-focused post led me to also consider the importance of curiosity in the workplace. Interestingly enough, recent experiences have given me a chance to see firsthand the benefits of nurturing curiosity and how to do so as part of the DNA of the work environment. Curiosity is a vital element in all aspects of innovation, yet is tightly confined by many companies to only certain stages of developing solutions. It’s a characteristic that all companies claim to value, but that many companies, in their actual culture, firmly suppress. Curiosity increases employees’ value to the company and...
Security Standards Regulations Guidelines
Below is my attempt to list of all published 5G, IoT and "Smart Everything"-related security guidelines, frameworks and standards. If you are aware of additional entries that should be here, please let me know at [email protected]
Cyber-Kinetic Security, IoT Security, OT Security
We live in a world in which the way we observe and control it is radically changing. Increasingly, we interact with physical objects through the filter of what computational systems embedded in them tell us, and we adjust them based on what those systems relate. We do this on our phones, in our cars, in our homes, in our factories and, increasingly, in our cities. Physical objects are so interconnected that we simply take those connections for granted, as if being able to unlock your car by pushing a button on your key fob, unlocking it with your phone or...