How we exclude people from information security (design) which takes away the overwhelmingly biggest threat-AND-vulnerability; how we need to ditch the top-down compliance approach, and how to do security bottom-up. KISS.
1) The document discusses the future of risk management and outlines some issues with current approaches.
2) Regulations like Basel II aimed to improve risk management but ended up creating large compliance overhead without meaningfully addressing operational risks.
3) Guidance can go wrong when it is poorly understood, implemented as directives rather than suggestions, and lacks clarity around definitions, classifications and how to apply results. This led to formal compliance without better risk management.
On the necessary re-design of security controls. To provide guiding rails to keep only those that sway too far out, instead of slamming everyone into compliance with too-tight rails.
The document discusses operational risk management. It summarizes that traditionally, information security has been approached from the bottom-up rather than top-down. It then critiques common risk management methodologies for making unrealistic assumptions and using oversimplified models that do not accurately capture complex relationships. The presentation goes on to argue that attempting to perfect bureaucracy and control through risk management leads to an illusion of being in control and a totalitarian system, as unforeseen events will always occur.
NGI Regio Rdam / Afd IT-A: Stuxnet - Beveiliging en Audit van Proces ITJurgen van der Vlugt
油
Het verhaal over hoe Stuxnet een wake-up call is voor IT-auditors, of dat zou moeten zijn. En wat \'wij\' informatiebeveiligers / IT-auditors kunnen leren van de proces-IT-wereld, en andersom. Er is nog veel te doen...
- Crowdsourcing is an emerging trend with at least 29 new crowdsourcing ventures promoted in the UK since 2010, about half of which were started between 2010 and 2011, and only four have ended.
- Crowdsourcing can provide benefits like return on investment and help avoid the costs of failure for businesses. However, tasks should be specific, measurable, achievable, relevant and time-bound to be effective.
- There are different types of crowdsourcing tasks ranging from microtasks to citizen science to complex problem solving, and the complexity of the task impacts its suitability for crowdsourcing.
Agile Development Overview (with a bit about builds)David Benjamin
油
I gave this presentation to our dev team when i started at Hannan IT back in October. Its a quick run through the Agile basics, with a bit of extra discussion on continuous integration.
I experimented here with scripting in two tangential sections in the hopes that it would avoid many more spontaneous tangents. It worked!
CactusCon 2017 - OODA Loop in life & cyber threat intelligenceDave Eilken
油
Explanation of John Boyd's OODA Loop for better decision making in life and how we can first take action to gain better visibility with cyber intelligence that will help us make risk decisions.
http://www.cactuscon.com/not-your-grandmas-cti-ooda-loop
Originally given at MIGS2012, this presentation describes the high standard that should be applied to leaders in the video games industry. It also gives examples of how to improve and a description of what you can expect in an organization that focuses on quality leadership.
Email me for the full deck with notes, additional research results, and links to all of the studies backing up the statements made herein.
http://www.fullergameproduction.com
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-nd/3.0/.
This document provides an overview of analysis techniques for incident responders and hackers. It covers log analysis, network forensics, endpoint forensics, malware analysis, and cloud incident response. The presentation emphasizes critical thinking, understanding context and limitations, considering alternative explanations, and effective communication of analysis results. Sample log and network data is analyzed to demonstrate approaches like identifying anomalies, reconstructing event timelines and network connections, and determining the scope and impact of potential incidents.
Given at the BugCrowd conference in January 2019, this was the first time for doing this deck.:
For 25 years or more we have fought the battle of passwords and patches while all around us, the world has developed, data has exponentially increased, attack surfaces are everywhere and technology had quite simply forced the human race to consider the evolution cycle in single lifespans as opposed to millennia. During the last 25 years we have done little to protect the charges we are responsible for, we have failed to secure systems, allowed financial attacks, infrastructure attacks, and now attacks directly against humans. At what point will we be able to stem the bleeding and actually take charge of our realm? Have we left it too late, or are we still able to claw back out of the abyss and face our adversary in a more asymmetrical defensive manner? Can we actually provide safety and security to our charges or will we continue to fail? And, critically, how do we communicate this, and educate a population that is content to watch from the sidelines, while they are being digitally eviscerated.
Going through a PhD may be seen as a requirement for an academic career or a different kind of job, simply as the next step in education, as something to do because why not?, or even just as a hobby you have on the side. What it really is though, is a life-changing experience, something that can be terribly painful and amazingly rewarding at the same time. In that journey I learned a few lessons in the hard way, lessons that I wish someone had told me about at the time. In this talk Ill try to do just that and not talk about the content and process of a PhD, but rather about you, the person, during your PhD.
This document discusses establishing a DevOps mentality and culture by restoring trust between development and operations teams. It argues that a lack of trust leads to inefficiency, while trust increases speed and decreases costs. The speaker outlines 13 behaviors for building trust, such as talking straight, demonstrating respect, creating transparency, and keeping commitments. Fostering these behaviors can help move from self and relational trust to organizational trust. Reducing bureaucracy, politics and turnover can also increase organizational trust. Overall, the document promotes a collaborative approach focused on shared goals and understanding between teams.
The document provides advice for startup founders and CEOs. It emphasizes that there are no perfect or single right answers, and founders should avoid assumptions and constantly evaluate their ideas and choices. It also warns against blindly following conventional wisdom or perceived facts, and stresses the importance of identifying valuable advisors and avoiding unnecessary "experts".
This document discusses agile practices for big data projects. It notes that learning organizations are more likely to succeed with big data projects if they have an appetite for experimentation, learn from mistakes, and can pivot decisions based on new information. A data-driven culture is important, where most decisions are made based on data and feedback is incorporated quickly. Iterative approaches help refine problems and questions, not just solutions. Science itself is an agile process where understanding evolves incrementally through refinements. Community groups in Riyadh are mentioned for sharing knowledge about agile methods and big data.
Business ideas or business opportunitiesAndrew Hirst
油
This document discusses creativity and developing business ideas. It describes creativity as stemming from intelligence, environment, knowledge, thinking style, personality, and motivation. It also discusses different thinking styles like convergent and divergent thinking. The document then provides various techniques that can help generate ideas such as brainstorming, market research, developing personas, mapping customer journeys, and techniques like SCAMPER. It emphasizes that ideas can come from many sources and the importance of identifying the problem to be solved. Ultimately, the document stresses that ideas must be turned into opportunities by considering factors like market fit, feasibility, management team, and personal ambition.
An Introduction to Design Thinking - DevDay Conference ColomboRaomal Perera
油
The document provides an introduction to design thinking by Raomal Perera. It outlines Perera's background working with companies like Intel, INSEAD, and the World Economic Forum. The presentation then discusses what design thinking is, emphasizing that it is an experimental and iterative process to solve problems by combining creative and analytical thinking. It provides examples of how IDEO uses empathy, ideation, prototyping and testing to redesign products through collaboration. The document encourages participants to experience design thinking through a challenge.
1) TRiZ's main axioms that all problems can be formulated as contradictions and technological systems evolve according to objective laws.
2) TRiZ's laws of technical system evolution and how better solutions align with these laws.
3) The principle that problems must be solved according to the specific restrictions of the problematic situation.
Most real world software development practices are reactive, focus on near term features and small sub set of quality metrics like latency and throughput. More often than not, this is suboptimal and results in Low ROI on effort and change resistant software. In this talk, I present a multi-dimensional view of system development, which will serve as a reference to categorize challenges, benefits and nuances. What, why, how and more of System Development are explained using this model. In this talk, I will present learnings, and tradeoffs where the above principles were applied in Linkedin multi-products and elsewhere. It would be useful to engineers and managers involved | interested in development of non-trivial systems
The document provides an introduction to an Agile and Lean User Experience workshop. It discusses how traditional UX practices emphasize deliverables and individual hero designers, while Lean UX focuses on collaborative sense-making and ensuring the customer experience is owned by everyone. The workshop covers Lean UX principles and processes, integrating design into agile development, and the importance of customer research methods like interviewing and empathy mapping to understand user needs and validate hypotheses.
This is the introductory slide deck for the joint event by the legal hackers (Brussels chapter) and the Belgian data scientists on 1 August 2017. The aim was mainly to introduce the session where everybody could ask questions and those with the answers could give them.
The event's page is here: https://www.meetup.com/Brussels-Legal-Hackers/events/241266134/
The event's message board is here: https://www.meetup.com/Brussels-Legal-Hackers/messages/boards/thread/51045002
A second session is planned for 5 September 2017 at Digityser in Brussels.
The document discusses various models and factors involved in decision making. It describes rational decision making, bounded rationality, and the garbage can model. It also discusses common decision biases and tools like decision trees. Key factors that influence individual behavior in decision making include values, attitudes, personality, ability, motivation, and perception. The document emphasizes that decision making is a complex social process that considers both logical analysis and various subjective variables.
The document outlines an agenda for a workshop on Pandas, data wrangling, and data science using Pandas. The agenda includes: an introduction and setup; discussing the data science pipeline and Pandas APIs/namespaces; basic Pandas maneuvers; data wrangling techniques like transformations, aggregations, and joins; hands-on exercises using datasets like Titanic and RecSys-2015; and a Q&A session. The goals are to understand data wrangling with Pandas through interactive examples and hands-on practice with real datasets.
\'Cloud\' brings many advantages. Among others, that much of your social media data will disappear ever more quickly -- as all the storage in the world cannot keep up with the growth of Big Data, hence ever more will be lost. For companies, that may be a problem...
On how the current top-down (command-and-)control approach, and the \'middle-out\' modelling aproach, will and can not work in the end. A new paradigm, bottom-up KISS risk management will be needed.
More Related Content
Similar to IDC Amsterdam 2013 09 12 Smart Security Solutions require Ditto Designs (20)
CactusCon 2017 - OODA Loop in life & cyber threat intelligenceDave Eilken
油
Explanation of John Boyd's OODA Loop for better decision making in life and how we can first take action to gain better visibility with cyber intelligence that will help us make risk decisions.
http://www.cactuscon.com/not-your-grandmas-cti-ooda-loop
Originally given at MIGS2012, this presentation describes the high standard that should be applied to leaders in the video games industry. It also gives examples of how to improve and a description of what you can expect in an organization that focuses on quality leadership.
Email me for the full deck with notes, additional research results, and links to all of the studies backing up the statements made herein.
http://www.fullergameproduction.com
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-nd/3.0/.
This document provides an overview of analysis techniques for incident responders and hackers. It covers log analysis, network forensics, endpoint forensics, malware analysis, and cloud incident response. The presentation emphasizes critical thinking, understanding context and limitations, considering alternative explanations, and effective communication of analysis results. Sample log and network data is analyzed to demonstrate approaches like identifying anomalies, reconstructing event timelines and network connections, and determining the scope and impact of potential incidents.
Given at the BugCrowd conference in January 2019, this was the first time for doing this deck.:
For 25 years or more we have fought the battle of passwords and patches while all around us, the world has developed, data has exponentially increased, attack surfaces are everywhere and technology had quite simply forced the human race to consider the evolution cycle in single lifespans as opposed to millennia. During the last 25 years we have done little to protect the charges we are responsible for, we have failed to secure systems, allowed financial attacks, infrastructure attacks, and now attacks directly against humans. At what point will we be able to stem the bleeding and actually take charge of our realm? Have we left it too late, or are we still able to claw back out of the abyss and face our adversary in a more asymmetrical defensive manner? Can we actually provide safety and security to our charges or will we continue to fail? And, critically, how do we communicate this, and educate a population that is content to watch from the sidelines, while they are being digitally eviscerated.
Going through a PhD may be seen as a requirement for an academic career or a different kind of job, simply as the next step in education, as something to do because why not?, or even just as a hobby you have on the side. What it really is though, is a life-changing experience, something that can be terribly painful and amazingly rewarding at the same time. In that journey I learned a few lessons in the hard way, lessons that I wish someone had told me about at the time. In this talk Ill try to do just that and not talk about the content and process of a PhD, but rather about you, the person, during your PhD.
This document discusses establishing a DevOps mentality and culture by restoring trust between development and operations teams. It argues that a lack of trust leads to inefficiency, while trust increases speed and decreases costs. The speaker outlines 13 behaviors for building trust, such as talking straight, demonstrating respect, creating transparency, and keeping commitments. Fostering these behaviors can help move from self and relational trust to organizational trust. Reducing bureaucracy, politics and turnover can also increase organizational trust. Overall, the document promotes a collaborative approach focused on shared goals and understanding between teams.
The document provides advice for startup founders and CEOs. It emphasizes that there are no perfect or single right answers, and founders should avoid assumptions and constantly evaluate their ideas and choices. It also warns against blindly following conventional wisdom or perceived facts, and stresses the importance of identifying valuable advisors and avoiding unnecessary "experts".
This document discusses agile practices for big data projects. It notes that learning organizations are more likely to succeed with big data projects if they have an appetite for experimentation, learn from mistakes, and can pivot decisions based on new information. A data-driven culture is important, where most decisions are made based on data and feedback is incorporated quickly. Iterative approaches help refine problems and questions, not just solutions. Science itself is an agile process where understanding evolves incrementally through refinements. Community groups in Riyadh are mentioned for sharing knowledge about agile methods and big data.
Business ideas or business opportunitiesAndrew Hirst
油
This document discusses creativity and developing business ideas. It describes creativity as stemming from intelligence, environment, knowledge, thinking style, personality, and motivation. It also discusses different thinking styles like convergent and divergent thinking. The document then provides various techniques that can help generate ideas such as brainstorming, market research, developing personas, mapping customer journeys, and techniques like SCAMPER. It emphasizes that ideas can come from many sources and the importance of identifying the problem to be solved. Ultimately, the document stresses that ideas must be turned into opportunities by considering factors like market fit, feasibility, management team, and personal ambition.
An Introduction to Design Thinking - DevDay Conference ColomboRaomal Perera
油
The document provides an introduction to design thinking by Raomal Perera. It outlines Perera's background working with companies like Intel, INSEAD, and the World Economic Forum. The presentation then discusses what design thinking is, emphasizing that it is an experimental and iterative process to solve problems by combining creative and analytical thinking. It provides examples of how IDEO uses empathy, ideation, prototyping and testing to redesign products through collaboration. The document encourages participants to experience design thinking through a challenge.
1) TRiZ's main axioms that all problems can be formulated as contradictions and technological systems evolve according to objective laws.
2) TRiZ's laws of technical system evolution and how better solutions align with these laws.
3) The principle that problems must be solved according to the specific restrictions of the problematic situation.
Most real world software development practices are reactive, focus on near term features and small sub set of quality metrics like latency and throughput. More often than not, this is suboptimal and results in Low ROI on effort and change resistant software. In this talk, I present a multi-dimensional view of system development, which will serve as a reference to categorize challenges, benefits and nuances. What, why, how and more of System Development are explained using this model. In this talk, I will present learnings, and tradeoffs where the above principles were applied in Linkedin multi-products and elsewhere. It would be useful to engineers and managers involved | interested in development of non-trivial systems
The document provides an introduction to an Agile and Lean User Experience workshop. It discusses how traditional UX practices emphasize deliverables and individual hero designers, while Lean UX focuses on collaborative sense-making and ensuring the customer experience is owned by everyone. The workshop covers Lean UX principles and processes, integrating design into agile development, and the importance of customer research methods like interviewing and empathy mapping to understand user needs and validate hypotheses.
This is the introductory slide deck for the joint event by the legal hackers (Brussels chapter) and the Belgian data scientists on 1 August 2017. The aim was mainly to introduce the session where everybody could ask questions and those with the answers could give them.
The event's page is here: https://www.meetup.com/Brussels-Legal-Hackers/events/241266134/
The event's message board is here: https://www.meetup.com/Brussels-Legal-Hackers/messages/boards/thread/51045002
A second session is planned for 5 September 2017 at Digityser in Brussels.
The document discusses various models and factors involved in decision making. It describes rational decision making, bounded rationality, and the garbage can model. It also discusses common decision biases and tools like decision trees. Key factors that influence individual behavior in decision making include values, attitudes, personality, ability, motivation, and perception. The document emphasizes that decision making is a complex social process that considers both logical analysis and various subjective variables.
The document outlines an agenda for a workshop on Pandas, data wrangling, and data science using Pandas. The agenda includes: an introduction and setup; discussing the data science pipeline and Pandas APIs/namespaces; basic Pandas maneuvers; data wrangling techniques like transformations, aggregations, and joins; hands-on exercises using datasets like Titanic and RecSys-2015; and a Q&A session. The goals are to understand data wrangling with Pandas through interactive examples and hands-on practice with real datasets.
\'Cloud\' brings many advantages. Among others, that much of your social media data will disappear ever more quickly -- as all the storage in the world cannot keep up with the growth of Big Data, hence ever more will be lost. For companies, that may be a problem...
On how the current top-down (command-and-)control approach, and the \'middle-out\' modelling aproach, will and can not work in the end. A new paradigm, bottom-up KISS risk management will be needed.
The document discusses the Stuxnet worm and issues with process control systems (SCADA/ICS). It notes that Stuxnet targeted Siemens WinCC/PCS7 systems used in industrial control and exploited previously unknown vulnerabilities. The talk will cover process control systems, their components and architecture, problems with current security approaches, potential consequences of failures or attacks, and the need for improved controls and a control loop approach to security management.
Project Status Report Template that our ex-McKinsey & Deloitte consultants like to use with their clients.
For more content, visit www.domontconsulting.com
In the fast-paced world of business, staying on top of key projects and initiatives is crucial for success. An initiative status report is a vital tool that provides transparency, accountability, and valuable insights to stakeholders. By outlining deadlines, costs, quality standards, and potential risks, these reports ensure that projects remain on track and aligned with organizational goals. In this article, we will delve into the essential components of an initiative status report, offering a comprehensive guide to creating effective and informative updates.
Unlock the potential within your corporate team with our carefully curated collection of motivational quotes designed specifically for managers and leaders. This PowerPoint presentation is a treasure trove of inspiration, offering timeless wisdom and powerful insights from renowned thought leaders, entrepreneurs, and visionaries. Each quote is crafted to ignite the drive, resilience, and visionary thinking essential for steering teams towards success. Perfect for team meetings, leadership training, and personal growth, this presentation is your go-to resource for fostering a culture of motivation and excellence.
Key Highlights:
Over 30 impactful quotes to inspire and elevate leadership qualities.
Thought-provoking visuals that complement each quote.
Practical tips for applying motivational insights in the corporate environment.
Ideal for presentations, workshops, and team-building sessions.
Empower your journey to exceptional leadership and create a lasting impact on your team with our motivational quotes presentation. Download now and start inspiring greatness today!
SWOT Analysis: Boutique Consulting Firms in 2025 Alexander Simon
油
In an era defined by Consulting 5.0, boutique consulting firmspositioned in the Blue Oceanface both unprecedented opportunities and critical challenges.
Their strengths lie in specialization, agility, and client-centricity, making them key players in delivering high-value, tailored insights. However, limited scale, regulatory constraints, and rising AI-driven competition present significant barriers to growth.
This SWOT analysis explores the internal and external forces shaping the future of boutique consultancies. Unlike Black Ocean firms, which grapple with the innovators dilemma, boutiques have the advantage of flexibility and speedbut to fully harness Consulting 5.0, they must form strategic alliances with tech firms, PE-backed networks, and expert collectives.
Key Insights:
Strengths: Agility, deep expertise, and productized offerings
鏝 Weaknesses: Brand visibility, reliance on key personnel
Opportunities: AI, Web3, and strategic partnerships
Threats: Automation, price competition, regulatory challenges
Strategic Imperatives for Boutique Firms:
Leverage AI & emerging tech to augment consulting services
Build strategic alliances to access resources & scale solutions
Strengthen regulatory & compliance expertise to compete in high-value markets
Shift from transactional to long-term partnerships for client retention
As Consulting 5.0 reshapes the industry, boutique consultancies must act now to differentiate themselves and secure their future in a rapidly evolving landscape.
What do you think? Can boutique firms unlock Consulting 5.0 before Black Ocean giants do?
Maksym Bilychenko: Empowering IT Products with AI: Opportunities and Pitfalls...Lviv Startup Club
油
Maksym Bilychenko: Empowering IT Products with AI: Opportunities and Pitfalls (UA)
Kyiv AI & BigData Day 2025
Website https://aiconf.com.ua/kyiv
Youtube https://www.youtube.com/startuplviv
FB https://www.facebook.com/aiconf
Creativity, AI, and Human-Centered InnovationRaj Lal
油
A 90-minute Design Workshop with David Moore, Lecturer at Stanford Design
Join us for an engaging session filled with actionable insights, dynamic conversations, and complimentary pizza and drinks to fuel your creativity.
Join us as a Volunteer.
Unlocking Creativity & Leadership: From Ideas to Impact
In todays fast-paced world of design, innovation, and leadership, the ability to think creatively and strategically is essential for driving meaningful change. This workshop is designed for designers, product leaders, and entrepreneurs looking to break through creative barriers, adopt a user-centered mindset, and turn bold ideas into tangible success.
Join us for an engaging session where well explore the intersection of creativity, leadership, and human-centered innovation. Through thought-provoking discussions, real-world case studies, and actionable strategies, youll gain the tools to navigate complex challenges, foster collaboration, and lead with purpose in an ever-evolving industry.
Key Takeaways:
From Design Thinking to Design Doing Where are you in the creative process? The best work is multi-dimensional, engaging us on a deeper level. Unlock your natural creative abilities and move from ideation to execution.
Reigniting Innovation: From Firefighting to Fire Starting Weve become so skilled at solving problems that weve forgotten how to spark new ideas. Learn how to cultivate a culture of communication, collaboration, and creative productivity to drive meaningful innovation.
The Human Element of Innovation True creativity isnt just about ideasits about people. Understand how to nurture the deeper, often-overlooked aspects of your teams potential to build an environment where innovation thrives.
AI as Your Creative Partner, Not a Shortcut AI can be an incredible toolbut only if you use it wisely. Learn when and how to integrate AI into your workflow, craft effective prompts, and avoid generic, uninspired results.
Mastering Team Dynamics: Communication, Listening & Collaboration Teams are unpredictable, and clear communication isnt always as clear as we think. Discover strategies for building strong, high-performing teams that listen, collaborate, and innovate effectively. This session will equip you with the insights and techniques needed to lead with creativity, navigate challenges, and drive innovation with confidence.
Your brand might be pushing clients away without you knowing.Group Buy Seo Tools
油
Avoid these personal branding mistakes:
Being inconsistent (confusing messaging = lost trust).
Only posting sales content (value first, sales later).
Not engaging with your audience (ghosting your followers isnt good for business).
Branding is more than a logo; its your reputation.
Follow for more branding tips.
Taylor Swift The Man Music Video Productioneclark941
油
For my school project, I analyzed Taylor Swift's "The Man" music video. I explored how it critiques gender inequality by depicting Taylor Swift as a man to highlight the double standards and societal expectations placed on men and women. The video uses satire and symbolism to comment on issues of power and privilege
Holden Melia - An Accomplished ExecutiveHolden Melia
油
Holden Melia is an accomplished executive with over 15 years of experience in leadership, business growth, and strategic innovation. He holds a Bachelors degree in Accounting and Finance from the University of Nebraska-Lincoln and has excelled in driving results, team development, and operational efficiency.
Ross Chayka: AI in Business: Quo Vadis? (UA)
Kyiv AI & BigData Day 2025
Website https://aiconf.com.ua/kyiv
Youtube https://www.youtube.com/startuplviv
FB https://www.facebook.com/aiconf
Norman Cooling - Founder And President Of N.LNorman Cooling
油
Norman Cooling founded N.L. Cooling Strategic Consulting LLC where he serves as President. A man of faith and usher for Wesley Memorial Methodist Church, he lives with his wife, Beth, in High Point, North Carolina. Norm is an active volunteer, serving as a Group Leader for Enduring Gratitude since 2019 and volunteering with the Semper Fi Fund.
Vitaly Bondar: Are GANs dead or alive? (UA)
Kyiv AI & BigData Day 2025
Website https://aiconf.com.ua/kyiv
Youtube https://www.youtube.com/startuplviv
FB https://www.facebook.com/aiconf
21 Best Crypto Wallet in UAE The complete 2025.pdfDubiz
油
The cryptocurrency sector worldwide has undergone significant transformation with increasing adoption and acceptance. It is one of the emerging sectors converting cash treasuries into digital currencies. In UAE too, people are heavily being drawn towards investing in cryptocurrencies like Bitcoin. In fact, it is among the top investment opportunities in Dubai in 2025. You can find some of the best crypto wallet in UAE, offering safe and efficient platforms for storing, managing, and even trading digital assets.
However, with such digital transformation comes an increased risk of cyberattacks and scams. This is why, to ensure your investments are completely safe, you must choose a secure and highly reliable crypto wallet in the UAE.
This presentation was delivered to a mixed sector industrial audience to provide a balanced view of why AI is necessary in many working environments, and further, how it can advantage the individual and organisation. It also dispels the widely held (media) view that AI will destroy jobs and displace people on a socially damaging scale. The really serious threat scenarios actually remain the domain of human players, and not as depicted by some Hollywood dystopian machines take over nightmare!
Primarily seeing AI as a downsizing opportunity is to miss the key point: by empowering employees it is the biggest growth agent!
The nonsensical nature of AI v human supremacy arguments also distract from the symbiotic relationships we are forging. This is especially evident when confronted by complexity beyond our natural abilities. For example: procurement and supply chains may now see >>60 independent variables (features and parameters) with many requiring real time control. Humans can typically cope with 5 - 7, whilst our mathematical framework fails at 5. This primal limiter also compounds the risks involved in designing for:
optimisation v brittleness v resilience
In this context, the digitisation process is largely regarded as an event instead of a continuum and this greatly exacerbates the risks involved. This is illustrated against the backdrop of several past tech-revolutions and the changes they invoked. Two ongoing revolutions are also included with projections for likely futures/outcomes.
The closing remarks remind the audience of just one observation that we all need to keep in mind:
Things that think want to link
and
Things that link want to think
1. Street Smart Solutions
require Ditto Design
Achter de kudde
of
V坦坦rdat het misgaat
Jurgen van der Vlugt
Amsterdam, 12 september 2013
2. Introductie
Jurgen = Ir.drs. J. van der Vlugt RE CISA CRISC
ISSA, president NL chapter, member Ethics Committee
ISACA, NL board for Roundtables
Supranationale organisatie, IT-audit
Maverisk Consultancy, IS Audit and Advisory services
KPMG, ABN AMRO, host of others
ERM/ORM, (IS) Audit, (Info)Security
Yup: WIP, gaarne vragen
3. Agenda
Massa
-loos
is dom
Reacties
Vangrails
Simpel maar hard
Be Prepared
21. Vrijheid door vangrails
Aristotle might say that we need rules to protect us from disaster. But at the
same time, rules without wisdom are blind and at best guarantee mediocrity
forcing wise practitioners to become outlaws, rule-breakers pursuing a kind of
guerrilla war to achieve excellence.
Weick found that the longer the checklists for the wildland firefighters became,
the more improvisation was shut down. Rules are aids, allies, guides, and
checks.
But too much reliance on rules can squeeze out the judgement that is necessary
to do our work well. ...
Better to minimize the number of rules, give up trying to cover every particular
circumstance, and instead do more training to encourage skill and practical
reasoning and intuition. (Schwartz and Scharpe, Practical Wisdom)
23. De juiste druk; effectief design
Doorzie het dilemma
Zie de druk van allevier de kringen
Alles op de juiste maat
Stimuleer samenwerking
Pakkans ~ straf
Kies algemene, reactieve (?) sec.systems
Pas op concentratie-Points of Failure
Alles transparant
25. Pt > Dt + Rt
(Pt > 0)
E = Dt + Rt
(Pt = 0)
Zero-day exploits, or
any unknown vectors
27. Agenda
Massa
-loos
is dom
Reacties
Vangrails
Simpel maar hard
Be Prepared
28. Hoop dat het ritje beviel.Hoop dat het ritje beviel.
Dat was alles. Dank U.Dat was alles. Dank U.
31. Jurgen van der Vlugt
Jvdvlugt@maverisk.nl
LinkedIn http://nl.linkedin.com/in/jurgenvandervlugt/
Twitter @jvdvlugt
(G+, etc.etc.)
Contactdetails
Dogma: The problem starts at the secondary level, not with the originator or the developer of
the idea but with the people who are attracted by it, who cling to it until their last nail breaks,
and who invariably lack the overview, flexibility, imagination, and, most importantly, sense of
humor, to maintain it in the spirit in which it was hatched. Ideas are made by masters, dogma
by disciples, and the Buddha is always killed on the road. (Tom Robbins, Still Life with
Woodpecker, 1984)