際際滷shows by User: sintixerr / http://www.slideshare.net/images/logo.gif 際際滷shows by User: sintixerr / Fri, 09 Oct 2015 04:10:32 GMT 際際滷Share feed for 際際滷shows by User: sintixerr Yours Anecdotally: Developing a Cybersecurity Problem Space /slideshow/yours-anecdotally-developing-a-cybersecurity-problem-space/53721943 sira-2015-whitsitt-anecdotallyyours-151009041032-lva1-app6891
Almost 70 years since the first computer bug was discovered, there has been decades of research done on Information Security theory and practice. Yet, despite vast amounts of money being spent, innumerable academic papers, mainstream media obsession, and entire industries being formed, we are left with the impression that the risk is growing, not receding. Why? Some argue a lack of data, but data clearly exists. We're likely generating it, in some areas, faster than humans will ever be able to process it. Perhaps, after all of this effort, we've managed to box ourselves into metaphors and first principles that might be inappropriately constraining how we think about "Information Security Risk". In fact, it's worth noting that we can't even agree if there is a space between "Cyber" and "Security" when it's written out. This talk will take an anecdotal look at "Information Security Risk", "Cyber<>Security", and use that perspective to suggest areas of research and data gathering that are either lacking or should be made more accessible to the markets, industries, and individuals driving risk management change. In an industry filled with data, perhaps an examination of empty space might be helpful.]]>

Almost 70 years since the first computer bug was discovered, there has been decades of research done on Information Security theory and practice. Yet, despite vast amounts of money being spent, innumerable academic papers, mainstream media obsession, and entire industries being formed, we are left with the impression that the risk is growing, not receding. Why? Some argue a lack of data, but data clearly exists. We're likely generating it, in some areas, faster than humans will ever be able to process it. Perhaps, after all of this effort, we've managed to box ourselves into metaphors and first principles that might be inappropriately constraining how we think about "Information Security Risk". In fact, it's worth noting that we can't even agree if there is a space between "Cyber" and "Security" when it's written out. This talk will take an anecdotal look at "Information Security Risk", "Cyber<>Security", and use that perspective to suggest areas of research and data gathering that are either lacking or should be made more accessible to the markets, industries, and individuals driving risk management change. In an industry filled with data, perhaps an examination of empty space might be helpful.]]>
Fri, 09 Oct 2015 04:10:32 GMT /slideshow/yours-anecdotally-developing-a-cybersecurity-problem-space/53721943 sintixerr@slideshare.net(sintixerr) Yours Anecdotally: Developing a Cybersecurity Problem Space sintixerr Almost 70 years since the first computer bug was discovered, there has been decades of research done on Information Security theory and practice. Yet, despite vast amounts of money being spent, innumerable academic papers, mainstream media obsession, and entire industries being formed, we are left with the impression that the risk is growing, not receding. Why? Some argue a lack of data, but data clearly exists. We're likely generating it, in some areas, faster than humans will ever be able to process it. Perhaps, after all of this effort, we've managed to box ourselves into metaphors and first principles that might be inappropriately constraining how we think about "Information Security Risk". In fact, it's worth noting that we can't even agree if there is a space between "Cyber" and "Security" when it's written out. This talk will take an anecdotal look at "Information Security Risk", "Cyber&lt;>Security", and use that perspective to suggest areas of research and data gathering that are either lacking or should be made more accessible to the markets, industries, and individuals driving risk management change. In an industry filled with data, perhaps an examination of empty space might be helpful. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sira-2015-whitsitt-anecdotallyyours-151009041032-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Almost 70 years since the first computer bug was discovered, there has been decades of research done on Information Security theory and practice. Yet, despite vast amounts of money being spent, innumerable academic papers, mainstream media obsession, and entire industries being formed, we are left with the impression that the risk is growing, not receding. Why? Some argue a lack of data, but data clearly exists. We&#39;re likely generating it, in some areas, faster than humans will ever be able to process it. Perhaps, after all of this effort, we&#39;ve managed to box ourselves into metaphors and first principles that might be inappropriately constraining how we think about &quot;Information Security Risk&quot;. In fact, it&#39;s worth noting that we can&#39;t even agree if there is a space between &quot;Cyber&quot; and &quot;Security&quot; when it&#39;s written out. This talk will take an anecdotal look at &quot;Information Security Risk&quot;, &quot;Cyber&amp;lt;&gt;Security&quot;, and use that perspective to suggest areas of research and data gathering that are either lacking or should be made more accessible to the markets, industries, and individuals driving risk management change. In an industry filled with data, perhaps an examination of empty space might be helpful.
Yours Anecdotally: Developing a Cybersecurity Problem Space from Jack Whitsitt
]]>
3746 9 https://cdn.slidesharecdn.com/ss_thumbnails/sira-2015-whitsitt-anecdotallyyours-151009041032-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Effective Cybersecurity Communication Skills /slideshow/whitsitt-cyber-commsemeralddown-45523914/45523914 whitsittcybercommsemeralddown-150306102730-conversion-gate01
Presentation describes the problems associated with communication with others - as an information receiver or provider - about cybersecurity and provides insights into how those problems may be overcome through structured communication, the use of positive and negative space, and the setting of perspective and context through lensing.]]>

Presentation describes the problems associated with communication with others - as an information receiver or provider - about cybersecurity and provides insights into how those problems may be overcome through structured communication, the use of positive and negative space, and the setting of perspective and context through lensing.]]>
Fri, 06 Mar 2015 10:27:30 GMT /slideshow/whitsitt-cyber-commsemeralddown-45523914/45523914 sintixerr@slideshare.net(sintixerr) Effective Cybersecurity Communication Skills sintixerr Presentation describes the problems associated with communication with others - as an information receiver or provider - about cybersecurity and provides insights into how those problems may be overcome through structured communication, the use of positive and negative space, and the setting of perspective and context through lensing. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/whitsittcybercommsemeralddown-150306102730-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presentation describes the problems associated with communication with others - as an information receiver or provider - about cybersecurity and provides insights into how those problems may be overcome through structured communication, the use of positive and negative space, and the setting of perspective and context through lensing.
Effective Cybersecurity Communication Skills from Jack Whitsitt
]]>
2103 4 https://cdn.slidesharecdn.com/ss_thumbnails/whitsittcybercommsemeralddown-150306102730-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
NIST Cybersecurity Framework Background and Review | Jack Whitsitt /slideshow/nist-cybersecurity-framework-background-and-review-jack-whitsitt/32489846 nistpresentationesec-140319083912-phpapp02
]]>

]]>
Wed, 19 Mar 2014 08:39:12 GMT /slideshow/nist-cybersecurity-framework-background-and-review-jack-whitsitt/32489846 sintixerr@slideshare.net(sintixerr) NIST Cybersecurity Framework Background and Review | Jack Whitsitt sintixerr <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/nistpresentationesec-140319083912-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
NIST Cybersecurity Framework Background and Review | Jack Whitsitt from Jack Whitsitt
]]>
4420 10 https://cdn.slidesharecdn.com/ss_thumbnails/nistpresentationesec-140319083912-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Introduction to National Critical Infrastructure Cyber Security: Background and Perspectives /slideshow/source-whitsitt-final/19183526 source-whitsittfinal-130419152718-phpapp02
Given at SOURCE Boston 2013, this presentation is one of the only places you will find the conceptual and policy underpinnings of U.S. national cyber security and critical infrastructure protection efforts and information about the recent White House Cyber Executive Order]]>

Given at SOURCE Boston 2013, this presentation is one of the only places you will find the conceptual and policy underpinnings of U.S. national cyber security and critical infrastructure protection efforts and information about the recent White House Cyber Executive Order]]>
Fri, 19 Apr 2013 15:27:18 GMT /slideshow/source-whitsitt-final/19183526 sintixerr@slideshare.net(sintixerr) Introduction to National Critical Infrastructure Cyber Security: Background and Perspectives sintixerr Given at SOURCE Boston 2013, this presentation is one of the only places you will find the conceptual and policy underpinnings of U.S. national cyber security and critical infrastructure protection efforts and information about the recent White House Cyber Executive Order <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/source-whitsittfinal-130419152718-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Given at SOURCE Boston 2013, this presentation is one of the only places you will find the conceptual and policy underpinnings of U.S. national cyber security and critical infrastructure protection efforts and information about the recent White House Cyber Executive Order
Introduction to National Critical Infrastructure Cyber Security: Background and Perspectives from Jack Whitsitt
]]>
3385 8 https://cdn.slidesharecdn.com/ss_thumbnails/source-whitsittfinal-130419152718-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-sintixerr-48x48.jpg?cb=1563597240 Jack Whitsitt, a Principle Analyst for Energysec, possesses a breadth of security knowledge and strategic vision. His unusual combination of hard technical, public/private partnership development, facilitation, and national risk management experience allow him to provide particular insight into and leadership of organizational, sector, and national cyber security initiatives. A participant in the national critical infrastructure protection dialogue for a number of years, Jack has provided regular advice, insight, and thought leadership to all levels of government and industry and has been responsible for several successful sector-wide initiatives. Key words: Critical Infrastructure Prot... http://sintixerr.wordpress.com https://cdn.slidesharecdn.com/ss_thumbnails/sira-2015-whitsitt-anecdotallyyours-151009041032-lva1-app6891-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/yours-anecdotally-developing-a-cybersecurity-problem-space/53721943 Yours Anecdotally: Dev... https://cdn.slidesharecdn.com/ss_thumbnails/whitsittcybercommsemeralddown-150306102730-conversion-gate01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/whitsitt-cyber-commsemeralddown-45523914/45523914 Effective Cybersecurit... https://cdn.slidesharecdn.com/ss_thumbnails/nistpresentationesec-140319083912-phpapp02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/nist-cybersecurity-framework-background-and-review-jack-whitsitt/32489846 NIST Cybersecurity Fra...