Twitter Feed
Thank You GetVoIP!!
Thank you for the honor of being named a “Top 100 Cloud Professionals to Follow on G+”! Congratulations also to my 99 colleagues. Read more at: ↑ Grab this Headline…
Facilitators Announced For NGA Agile Cloud Brainstorming Event
The Information Technology Acquisition Advisory Council (ITAAC) and the Telecommunications Industry Association (TIA) are announcing a slate of innovative leaders to serve as facilitators for the upcoming “Agile Sourcing Environment…
MBO Partners Spotlights GovCloud Founder Kevin L. Jackson
Associate Spotlight Interview with Kevin L. JacksonMBO Associate Since 10/2013 1) Tell us a little bit about what you do.I am the CEO and founder of GovCloud Network, LLC. In…
ITAAC/ICH and TIA To Host Commercial Cloud Sourcing Brainstorming Session for NGA
The Information Technology Acquisition Advisory Council (ITAAC) and Telecommunications Industry Association (TIA) are honored to team with NGA in hosting the first “Agile Sourcing Environment for Commercial Cloud” brainstorming session,…
Author and Tech Strategist Melvin Greer Profiled by WashingtonExec
Congratulations to my NCOIC colleague and dear friend Melvin Greer on his impressive WashingtonExec interview. A senior fellow and chief strategist at Lockheed Martin, Mel has more than 29 years’…
IT Risk Management Summit – March 26, 2013 – Reston, VA
In response to growing demand for formal software risk and quality management tools, the nations’ most respected standards bodies and IT communities of practice have joined forces to advance the…
PerspecSys Survey Reveals Cloud-based Security Concerns for 2014
Today PerspecSys announced the results of a survey conducted at the 2014 RSA Conference concerning the attitudes and policies of organizations towards cloud-based security. After polling 130 security professionals on…
NCOIC Debuts Roadmap for Designing, Managing Cyber-secure Hybrid Computing Environment
Open process by the Network Centric Operations Industry Consortium uses cloud infrastructure to cut computing costs in half and enable collaboration by different systems and users WASHINGTON—March 5, 2014—The Network…
Why State & Local Governments Should be Prepared for Cloud
You are invited to attend the Cloud Webinar Series: Why State & Local Governments Should be Prepared for Cloud. This educational webinar is brought to you by RISC Networks, and…
IBM Hybrid Cloud Debate: Experts debate: Are Hybrid Clouds the End All Be All?
A hybrid cloud may become the solution as the debate between public vs private cloud becomes so 2013. The industry’s experts will debate on when the hybrid clouds are and…
Photo credit: Shutterstock |
With all the excellent training available on television today, we are all now well prepared to deal with the coming Zombie Apocalypse. Our failure as a society lies, however, in our misunderstanding of the nature of the cybersecurity challenge. This failure threatens us all and our survival will depend on society’s ability to deal with the evolution and maturation of the changing enterprise cybersecurity challenge.
If you’re completely oblivious to the living dead threat, a zombie apocalypse refers to a widespread (usually global) rise of zombies hostile to human life. The zombies will engage in a general assault on civilization where victims may become zombies themselves. This causes the outbreak to become an exponentially growing crisis. The spreading phenomenon swamps normal military and law
enforcement organizations, leading to the panicked collapse of civilized society until only isolated pockets of survivors remain, scavenging for food and supplies in a world reduced to a pre-industrial hostile wilderness.
A recent report from the Herjavec Group describes the coming Hackerpocalypse as a similar global assault on modern society. The reports description puts the nature of global cybercrime in perspective by highlighting that:
- Annual costs attributable to cybercrime are expected to rise from $400B in 2015 to more than $6T by 2021;
- From 2012 to 2017, enterprise cumulative spend on cybercrime defense will exceed $1T. Some say that even if this estimate includes data collection, storage, security, analysis, threat intelligence operations and dissemination it still barely scratches the surface;
- Black-Hat hackers, motivated by money, espionage, notoriety, and malicious intent, become even more nimble, experienced and daring than their White Hats adversaries who are constrained by boundaries and rules;
- Continuing lack of effective cybercrime law enforcement
- A severe cybersecurity workforce shortage of 1 million cybersecurity in 2016, will reach 1.5 million by 2019;
- Hybrid warfare, a new type of global conflict where conventional and cyber warfare are combined and in which the aggressor avoids attribution or retribution, is now front page news.
Please don’t be lulled by an apparent separation between the virtual cyber world and our “real-life” physical one. An economic cyberattack could mortally disable the economy of a city, state or country, according to a recent RSA Conference blog post . Ted Koppel also revealed in a New York Times investigative piece that a major cyberattack on the United States’ electrical power grid is likely and that it would be devastating. A national cyberattack against power grids in Ukraine, not only crippled that county’s power systems but mining and railway companies as well.
To prepare for this almost inevitable battle, enterprise cyber defense teams must focus on an actionable list of “to do’s” which include the basics like:
- Developing a practical plan to manage devices, end-user applications and related network infrastructure;
- Designing, implementing and managing an integrated communications and networking environment;
- Updating and regularly testing your business continuity processes to enable recovery of critical business applications no matter the circumstances;
- Building and managing an efficient infrastructure with the ability to respond to change and drive innovation; and
- Simplifying management and streamlining maintenance of your multi-vendor IT supply chain.
Standalone controls will not work against the sophisticated Hackerpocalypse menace. Once implanted, these advanced threats can remain hidden for months, or even years, collecting critical information and inflicting serious damage. Enterprises must adopt a multi-layered approach that leverages next-generation defenses with embedded intelligence and analytics.
( This post was brought to you by IBM Global Technology Services. For more content like this, visit Point B and Beyond.)
.
( Thank you. If you enjoyed this article, get free updates by email or RSS – © Copyright Kevin L. Jackson 2015)
Cloud Computing
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- Route1 Announces Q2 2019 Financial Results
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- ChannelAdvisor to Present at the D.A. Davidson 18th Annual Technology Conference
Cybersecurity
- Route1 Announces Q2 2019 Financial Results
- FIRST US BANCSHARES, INC. DECLARES CASH DIVIDEND
- Business Continuity Management Planning Solution Market is Expected to Grow ~ US$ 1.6 Bn by the end of 2029 - PMR
- Atos delivers Quantum-Learning-as-a-Service to Xofia to enable artificial intelligence solutions
- New Ares IoT Botnet discovered on Android OS based Set-Top Boxes