As the world’s technology continues to rapidly advance over time, it’s clear that the reliance upon cyberspace will increase as well. This has given rise to progressively complex cyber threats across the information processing realm – becoming increasingly more serious and frequent to every industry (40% increase in reported data breaches and incidents) – and […]
In the United States during 2013, nearly 20% of high school seniors did not graduate – stressing the ability of regions looking to thrive and prosper via an Economic Vitality agenda. As we have seen, societies with world class education systems produce highly skilled workforces and become attractive places for businesses looking to thrive – […]
As we have observed over the past few years, the amount of data being generated in the world is so daunting that it’s increasingly unmanageable for most organizations – – as evidenced by the fact that typical organizations only use 12 percent of their data — leaving a wealth of untapped information to be leveraged […]
Mobile is almost taken for granted nowadays. Most people, myself included, now feel pretty grumpy if you don’t have immediate access to the information that you seek, regardless of where you are. When mobile for business started, I carried around my own personal cell phone and a Blackberry provided by the Navy for work email […]
There were two interesting speakers at the Atlantic Council Cyber Risk Seminar, one commercial (Dmitri Alperovitch, Co-Founder and CEO of Crowdstrike) and one government Tom Corcoran, senior policy adviser to the US House of Representatives Permanent Select Committee on Intelligence. An interesting point they made is that organizations should assume that their firewalls are penetrated […]
In early September 2014 I had the pleasure of presenting to the US EUCOM Cyber Endeavour in Graffenwoehr, Germany. This is a very short version of what I said! Four key areas of technology underpin our Smarter Planet vision – Cloud, Big Data / Analytics, Social Business & Mobile. All are relevant to, and increasingly used by the military […]
I have talked to various defense organizations globally, and for a long time many thought that having a strong firewall and a good network administrator were the keys to a secure and successful cyber posture. From news reports alone it has become clear to all – that approach is only part of the solution, a […]
For those of us focused on providing public sector IT solutions, it’s no big secret that industry specific and mandated security standards and accreditations don’t translate well to the private sector or commercial environments. Certainly governments are faced with different risks and threats that often necessitate a different approach or more stringent security controls than […]
Security continues to be of paramount concern to government, large enterprise and anyone who uses an internet connected device. Yep, that would be everyone. However, nothing seems to be working to stem the tide of security breaches especially within large...
Just two weeks ahead of the NATO summit in Chicago and the G8 summit in Camp David, the Security and Defence Agenda and IBM released the executive summary of the 2012 Security Jam. This year’s Security Jam has again proven to be an inclusive dialogue with...
With less than two day days until the Security Jam , join the thousands of experts and dozens of VIPs who have already registered and are looking forward to discussing their ideas and proposing solutions to pressing global security issues....