SlideShare ist ein Scribd-Unternehmen logo
1 von 122
Exponential Technologies 101
Enterprise IT Security
CIO Innovation and Leadership
Presenter: Bill Murphy
Exponential Technologies 101
• Artificial Intelligence (AI)
• Machine Learning & Deep Learning
• Robotics
• Biotechnology & Bioinformatics & Digital Biology
• Virtual Reality & Augmented Reality
• Energy & Environmental Systems
• Medicine & Neuroscience
• Nanotechnology & Digital Fabrication (3D Printing)
• Blockchain
• Networks & Computing Systems (IT Security)
What is an Exponential Technology?
Offense and Defense
Shola – United Therapeutics
BRANDING
Shola – United Therapeutics
Exponential vs Linear
15
4DS OF EXPONENTIALS
DECEPTIVE
TO
DISRUPTIVE
D IG IT IZ E D E MAT E RIA L IZ E D E MO NE T IZ E D E MO CRAT IZ E
Disruptive
Stress
/Opportunity
Awareness
Self Awareness
Examples of Disruption
Solid and Stable
Disruptive
What is a Disruptive Tech?
• Blackberry and Nokia
• Tesla and Automotive
Books to Help + Resources
• SU DC Chapter-
singularityudc.com
• Singularity University – su.org
• Singularity HUB – singularityhub.com
• Daniel Burrus - www.burrus.com
• Exponential Organizations –
exponentialorgs.com
With all the opportunities that Exponentials
bring there are Risks. Big Risks
1. Governance
2. Ethics
3. Privacy
4. Complexity
TRANSITION TO DEFENSE
DEFENSE – Enterprise IT Security
Qualitative
Vs
Quantitative
Health
Dr Ordered - reluctantly
Food Panel – Allergy
Hematology
Metabolic Chemistry
Lipid profile
Hormones
Urinalysis
Vitamins etc
Symptoms
Mental Fog
Mood Variability
Joint Pain
Frontiers of Optimal Performance &
Human Potential
• Firewalking 7x
• Active Spartan race training
• Cold water immersion via
Wim Hof
• Blackbelt
• Survival School
• Kiting and windsurfing
• Coaching Travel Soccer
• IronMan x2
• 2 x ½ IronMans
• Meditation/Mindfulness
(MBSR, Thich Nhat Han)
• Personal and Team Flow
States Experiments (Steven
Kotler)
• Innovation at the edge –
Design Thinking (SU)
2015
The Plan
• Primary Target, Time Frame, Re-test
• Diet to deal with inflammation
• Exercise – Mobility, Strength
• Vitamins
• Meds
• Testing
• Execution
• Follow-up and Follow-Thru
Am I Done?
• You only saw a 2015 Food Allergy Panel.
Where is the 2016 Comparison?
• What about the stool sample?
• Year after Year. Massively Proactive.
• Rinse and Repeat
So What About Enterprise IT Security?
Back To
Qualitative and Quantitative
• Marry Qualitative and Quantitative
• Evidence Based
• Building Defensible Arguments/Plans
Security Defense Strategy
Whack-a-Mole?!
COMPREHENSIVE IT SECURITY HEALTH PANEL
Second Priority
COMPREHENSIVE IT SECURITY HEALTH PANEL
(1)External Facing Systems
(2)Firewall Internal Systems (systems used by
employees, mail services, activesync, vpn, etc.)
(3) Do your company PCs have an anti-virus program?
EXECUTION PLAN – IT ROADMAP -
PRIORITIZATION
Year Over Year Comparison
When you spend a $
What boats are
effected?
External Facing Systems (systems used by external public/customers)
– Do you have an up to date list of all systems presented to the public or customers including
services in use?
• How many are there? (answer the next set by # based on yes count)
– Are the front end user interfaces behind an application filter security device with active
blocking capability beyond layer ¾ firewall?
– Does the application filter block all high risk issue?
– Does the application filter block all medium risk issues?
– Do you have any exceptions for sites or subsites on the application filter?
– Does this system terminate ssl or encryption?
– Is the application or db tier in a different zone/subnet/across a security boundary?
– Is the communication between the front end and the next tier unencrypted so the security
systems can review cross tier traffic?
– Do you formally audit to ensure that these settings are active and working:
• Monthly
• Quarterly
• Yearly
• Firewall Internal Systems (systems used by employees,
mail services, activesync, vpn, etc.)
– Are all non-security devices behind a firewall?
– Is the firewall a full UTM with services active and in automated
blocking mode for high risk items?
– Is the firewall a full UTM with services active and in automated
blocking mode for medium risk items?
– Are all inbound rules configured explicit in at least two of the
following: source, destination and protocol.
– Do you formally audit to ensure that these settings are active
and working:
• Monthly
• Quarterly
• Yearly
Anti-Virus PC
– Do your company PCs have an anti-virus program?
– How often are definitions updated?
• Multiple times a day
• Daily
• Weekly or more
– Do you run centrally managed antivirus?
– Are alerts for viruses, service failures, and update problem sent to staff?
– Do you exclude any pc from AV?
– What percent of systems are covered (I.e. do you skip Macs, Linux etc)
– How often do you check for gaps in coverage
• Weekly
• Monthly
• Quarterly
– How often do you audit scanning exclusions for files and processes?
• Quarterly
• Twice a year
• Yearly
– Is there an approval process prior to allowing exclusions?
• Email Encryption and DLP
– Do you have a system that automatically audits mail messages for
context driven content (PII, PCI, Confidential, etc)
– Do you formally audit to ensure that the system is are active and
working:
• Monthly
• Quarterly
• Yearly
– Can anyone opt out of the system?
– Does the system encrypt, reject, or redact ALL emails that fail the
automatic audit?
– Does the system allow external parties to initiate and reply in an
encrypted fashion?
– Do you formally audit to ensure that the policies used and look for
gaps?
• Monthly
• Quarterly
• Yearly
My Vision for You is to Reign in
Complexity
But this is only a Blood Panel……
What do you do about it?
Overall Gaps
• Based on the review a lot of good mature security
technologies exist however the following is
required:
– Additional implementation work is required to realize
the full impact of the solution
– Review system X to ensure intended use is in line with
current state of the system. Currently this is not the
case
– A proactive process of managing security systems A, B
and C need to be developed in order to ensure
security
Action Plan Step 1
• Concentrate on validating and hardening what
is in place
– Perform an user account audit
– Perform an edge security audit
– Enable Varonis to provide proactive security
– Enable Secret Server to harden the environment
Action Plan Step 2
• Two technologies that can be added to bolster
security, especially if HIPAA compliance is
desired
– Endpoint security for USB device security
– ZixGateway for Email Encrytion and DLP
Sample Deliverables
• Varonis Data Governance
(steps needed to complete
the install)
• Thycotic Gap Comparison
• Edge Assessment +
• AD /Account Audit
• Road Map – with Priority
Audit/
Compliance
Regulators/
Regulations
FFIEC, PCI, DoD,
HIPPA, etc
Standards
Staff
Gartner
Vendors
Consultants
Business Framework
ExO CIO Business IT
Framework
Framework
• What happens when you lose your CFO or
Accounting Manager?
Versus
• What happens when you lose your CIO, CISO,
VP IT, Manager IT, etc
Common Language of Business
• Debits and Credits
• Income Statement and Balance Sheet
• P&L
Align Proper Business Expectations
Does your VP of Sales guarantee revenue?
Where in your business do you have
guarantees?
Premiums to Mitigate Risk
The Role of Transparency
• Defensible
• Logical
Powerful Leadership
Governance (Governing) and Risk
Forget Big Data – Think Little Data…..
With Context
Thunder & House & Squirrel
DAR Scan – Data at Rest Scan
Being Governed
VS
The Governor
How Data is lost?
 Employee post to share drive
 Employee shares with vendor
 Employee theft
 Employee accident
 Malware/Virus
 Social Media
 Hacking attack (Spear Fishing)
 Social Engineering
 USB
Incidents by File Type
Policy File Type Hits Number of Files
Customer List Adobe PDF 1846 90
Customer List Email Message File (MIME, EML) 1071 43
Customer List HTML 311 16
Customer List Microsoft Excel 73842 360
Customer List Microsoft PowerPoint 125 6
Customer List Microsoft Word 1258 34
Customer List Plain Text 7539 55
D_CCN (pattern) Adobe PDF 479 3
D_CCN (pattern) Microsoft Excel 146 144
D_CCN (pattern) Plain Text 1442 5
D_SSN (pattern) Adobe PDF 2264 7
D_SSN (pattern) Microsoft Excel 180 93
D_SSN (pattern) Microsoft PowerPoint 2 1
D_SSN (pattern) Microsoft Word 1 2
D_SSN (pattern) Other Word Processors 1 1
D_SSN (pattern) Plain Text 63 3
Example of Incidents
Example of Incidents
Incidents Made in the last 90 Days
File Creation Time File_Share Policy Hits
Number of
Files
7/28/2012 1:12:00
AM
BadFileServercustomersBIGEFCUAudit CustomerList 14 1
8/3/2012 2:43:00 PMBadFileServercustomersNurseFirst Cor Customer List 87 1
8/29/2012 11:35:00
PM
BadFileServercustomersUniversityFCU Customer List 92 3
9/11/2012 11:44:00
PM
BadFileServermarketingPartnersBlue Customer List 35 1
9/6/2012 11:49:00
PM
BadFileServermarketingPartnersGTB D_SSN
(pattern)
1 1
9/6/2012 11:50:00
PM
BadFileServerBLD_BLD_ReportsXYZC D_CCN
(pattern)
239 1
9/6/2012 11:50:00
PM
BadFileServerBLD_BLD_ReportsXYZC D_SSN
(pattern)
381 1
10/4/2012 5:55:00
PM
BadFileServerBLD_BLD_ReportsXYZC D_SSN
(pattern)
500 1
10/4/2012 11:41:00
PM
BadFileServerBLD_BLD_ReportsXYZC D_SSN
(pattern)
500 1
9/6/2012 11:50:00
PM
BadFileServerMKT_MKT_ReportsXYZS Customer List 16 1
10/2/2012 11:48:00
PM
BadFileServerMKT_MKT_ReportsXYZS Customer List 17 1
8/9/2012 11:45:00
PM
BadFileServerMKTMKT Customers123 F Customer List 38 1
9/6/2012 11:51:00
PM
BadFileServerMKTMKT Customers123 F Customer List 74 1
Example of Incidents
Full Incident Report
File_Share Policy
Inciden
ts
Files File Path
BadFileServer operations 
Docs 
D_SSN
(patter
n)
AprilMainZix.xlsx BadFileServer operations 
Docs Documents.bak ZixMain
2010
BadFileServer marketing CI
OES
D_SSN
(patter
n)
Sales_OldStuff.zip/Gol
f Outing_June27.doc
BadFileServer marketing CIO
ES
BadFileServer marketing CI
OES
Custom
er List
Sales_OldStuff.zip/VM
ware Attendance List
CIOES.xls
BadFileServer marketing CIO
ES
BadFileServer marketing CI
OES
Custom
er List
Sales_OldStuff.zip/Sep
t Sales email blast.doc
BadFileServer marketing CIO
ES
BadFileServer marketing CI
OES
Custom
er List
Sales_OldStuff.zip/Roc
kville List from Vania
March 02.xls
BadFileServer marketing CIO
ES
Example of Incidents
Incidents by File Share
File_Share Policy Incidents Files
BadFileServeraccounting Customer List 144 1
BadFileServeraccountingArchive D_CCN (pattern) 139 139
BadFileServeraccountingArchive D_SSN (pattern) 170 85
BadFileServeraccountingArchive2005 D_SSN (pattern) 5 1
BadFileServeraccountingConst_Assoc  Customer List 288 18
BadFileServeraccountingSherrie Customer List 1000 1
BadFileServeraccountingSherrie D_SSN (pattern) 1 1
BadFileServercustomers_InActive_Clie Customer List 276 13
BadFileServercustomers_InActive_Clie D_CCN (pattern) 1 1
BadFileServercustomers123FCUcontra Customer List 70 4
BadFileServercustomersABC_Network_ Customer List 12 1
BadFileServercustomersABCAssessmen Customer List 60 2
BadFileServercustomersAlpha Systems Customer List 15 1
BadFileServercustomersXYZSSL_VPN Customer List 12 1
BadFileServercustomersStateDep  Statu Customer List 237 1
HIPPA/HIPAA, NIST/DOD since we are a
downstream contractor, NCUA, PCI, SOC
compliance
Technical Framework
OFFENSE
• Study top Disruptors in your field
Exponential Technologies
• IT Security and Networks
• Robotics
• Artificial Intelligence
• Virtual Reality/ Augmented
Reality
• Deep Learning & Machine
Learning
• Neuroscience
• Biomedicine & Digital
Biology
• Energy and
Environmental Systems
• Blockchain
• 3D Manufacturing
Printing
• IT Security and
Networks
• Nanotechnology
• IoT and Big Data
• Algorithms & APIs
Exponentials in the Health Field
Pay Attention to Blockchain
“The Smartest People in the World
Don’t Work for You”
Measure Your Organizational
Readiness to Innovate
• Visualize this
• Are you leaning into disruption or playing
afraid
10
5
1
Software is Eating the World
Quote “Everything that Humans are Inefficient
at will be eaten by Software.”
APIs & Algorithms
NIH – Gut Health
- Microbiome
Micro- Experiments
• NIH data sets – Gut Health example
• Fail fast and forward
• Push projects to the edge. Starve the edge.
• Start small with innovation pockets/ Labs
• Apply Design Thinking & Lean Startup
Mentality
• Align with people who have entrepreneurial
tendencies within the company
• Principle of Innovation at the edge of the
company
Staffing to Build Expertise
Community and Crowds
Bigger Thinking - Exponential
World Wide Expansion
MTP – Massive Transformational
Purpose
• Identify and avoid corporate anti-bodies
• Pay attention to when you disbelieve to avoid
being disrupted during the curve when the
technology seems odd or weird
What to Avoid
Summary – Offense Take-aways
• Learn to play offense - Join an innovation group like
mine or someone else's
• Be surrounded by ideas and people who think similar
• You are the average of the 5 people you hang around
• Build systems at the edge
• Avoid corp anti-bodies
• Pay attention to Lean and Design Thinking as it applies
to innovation (Joy, Inc, Exponential Org)
• Forget Big Data – Think Little Data
• Understand who your disruptors are? Technologies in
Health? Disruptive business practices, Communities,
blockchain, algorithms, & APIs
Offense Take-aways
• You don’t need permission to add revenue….
• Are you retiring in the next 5 years?
• It is a mindset first (for you) then a culture thing
• Neuroscience The Brain of a Leader thinking
Exponentially
• IoT & Dashboards
• Remember - role of offense and defense
• Financial Statements of the business – Point in
Time versus Progress over Time.
Defense Take-aways
• Play defense hard. Don’t play ping pong. Settle
into strategy and risk. Which will drive all tactical
execution.
• Embrace IT Security complexity with strategy.
Eliminate overlapping technology confusion. Data
Governance, privacy, risk – understand context.
• Flush out unnecessary costs
• Create Defensible Arguments/Plans
• Forget Big Data – Think Little Data
• Take a multi-year approach
Bill’s BIO & How to Contact Me?
World Class IT Security, Strategic and Tactical Thought Leadership for Enterprise
IT Business Leaders, Intra-preneurs, Entrepreneurs, Innovation, Design
Thinking, Creativity, Frontiers of Human Performance,
Breakthroughs in Neuroscience, & Exponential Technologies
CIO Security Scoreboard
CIO Innovation Insider
Group Meetings
Insider Updates Weekly
Report
Singularity University
Washington DC Chapter
Ambassador
Examines Disruptive and
Exponential Technologies
By looking at how they can be used to Improve the lives
of a billion of People”
Bill Murphy
410-320-6433
billm@redzonetech.net
Linkedin
twitter: @exoitleader
www.redzonetech.net
www.cioscoreboard.com

Weitere ähnliche Inhalte

Was ist angesagt?

Prioritizing an audit program using the 20 critical controls
Prioritizing an audit program using the 20 critical controlsPrioritizing an audit program using the 20 critical controls
Prioritizing an audit program using the 20 critical controls
EnclaveSecurity
 

Was ist angesagt? (20)

Recent changes to the 20 critical controls
Recent changes to the 20 critical controlsRecent changes to the 20 critical controls
Recent changes to the 20 critical controls
 
Utilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare TechnologyUtilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare Technology
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 
Prioritizing an audit program using the 20 critical controls
Prioritizing an audit program using the 20 critical controlsPrioritizing an audit program using the 20 critical controls
Prioritizing an audit program using the 20 critical controls
 
More practical insights on the 20 critical controls
More practical insights on the 20 critical controlsMore practical insights on the 20 critical controls
More practical insights on the 20 critical controls
 
2008: Web Application Security Tutorial
2008: Web Application Security Tutorial2008: Web Application Security Tutorial
2008: Web Application Security Tutorial
 
The uncool-security-hygiene
The uncool-security-hygieneThe uncool-security-hygiene
The uncool-security-hygiene
 
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - Rothke
 
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
 
A Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachA Case Study of the Capital One Data Breach
A Case Study of the Capital One Data Breach
 
Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges
 
The Age of Data-Driven Network Operations
The Age of Data-Driven Network OperationsThe Age of Data-Driven Network Operations
The Age of Data-Driven Network Operations
 
IEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkIEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel Talk
 
Power System Cybersecurity: Threats, Challenges, and Barriers
Power System Cybersecurity: Threats, Challenges, and Barriers Power System Cybersecurity: Threats, Challenges, and Barriers
Power System Cybersecurity: Threats, Challenges, and Barriers
 
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive DataX-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
 
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...
 
Advanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementAdvanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security Management
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
Security Analytics for Data Discovery - Closing the SIEM Gap
Security Analytics for Data Discovery - Closing the SIEM GapSecurity Analytics for Data Discovery - Closing the SIEM Gap
Security Analytics for Data Discovery - Closing the SIEM Gap
 

Andere mochten auch

RED DE ESCUELAS DE FORMACION MUSICAL
RED DE ESCUELAS DE FORMACION MUSICALRED DE ESCUELAS DE FORMACION MUSICAL
RED DE ESCUELAS DE FORMACION MUSICAL
bayronparce69
 
Promo rig uk_flyer_uka5v3
Promo rig uk_flyer_uka5v3Promo rig uk_flyer_uka5v3
Promo rig uk_flyer_uka5v3
Marketinggg
 
Rigoletto
RigolettoRigoletto
Rigoletto
mrolda4
 
Ekumeniskt nätverksmöte 12 april - föredrag
Ekumeniskt nätverksmöte 12 april - föredragEkumeniskt nätverksmöte 12 april - föredrag
Ekumeniskt nätverksmöte 12 april - föredrag
Global Utmaning
 
Buenos Dias America Latina
Buenos Dias America LatinaBuenos Dias America Latina
Buenos Dias America Latina
estebanhandaljr
 

Andere mochten auch (20)

El déficit comercial amortiguado
El déficit comercial amortiguadoEl déficit comercial amortiguado
El déficit comercial amortiguado
 
Catalogo de productos la delicada
Catalogo de productos la delicadaCatalogo de productos la delicada
Catalogo de productos la delicada
 
Kandivali times
Kandivali timesKandivali times
Kandivali times
 
Super Navigator
Super NavigatorSuper Navigator
Super Navigator
 
11 Zugänge zu Social Media in der Schule
11 Zugänge zu Social Media in der Schule11 Zugänge zu Social Media in der Schule
11 Zugänge zu Social Media in der Schule
 
Club1714 - Barcelona - Catalonia (Español)
Club1714 - Barcelona - Catalonia (Español)Club1714 - Barcelona - Catalonia (Español)
Club1714 - Barcelona - Catalonia (Español)
 
RED DE ESCUELAS DE FORMACION MUSICAL
RED DE ESCUELAS DE FORMACION MUSICALRED DE ESCUELAS DE FORMACION MUSICAL
RED DE ESCUELAS DE FORMACION MUSICAL
 
Promo rig uk_flyer_uka5v3
Promo rig uk_flyer_uka5v3Promo rig uk_flyer_uka5v3
Promo rig uk_flyer_uka5v3
 
Elettrodi per saldatura ad arco - Castolin - Fornid
Elettrodi per saldatura ad arco - Castolin - FornidElettrodi per saldatura ad arco - Castolin - Fornid
Elettrodi per saldatura ad arco - Castolin - Fornid
 
kumpulan partai catur terbaik
kumpulan partai catur terbaikkumpulan partai catur terbaik
kumpulan partai catur terbaik
 
ÇOMÜ 2012 Tanıtım Broşürü- www.canakkaleicinde.com
ÇOMÜ 2012 Tanıtım Broşürü- www.canakkaleicinde.comÇOMÜ 2012 Tanıtım Broşürü- www.canakkaleicinde.com
ÇOMÜ 2012 Tanıtım Broşürü- www.canakkaleicinde.com
 
LA CRÓNICA 574
LA CRÓNICA 574LA CRÓNICA 574
LA CRÓNICA 574
 
Us cancer vaccine market outlook 2020
Us cancer vaccine market outlook 2020Us cancer vaccine market outlook 2020
Us cancer vaccine market outlook 2020
 
Rigoletto
RigolettoRigoletto
Rigoletto
 
Presentacion Vivernet 2006
Presentacion Vivernet 2006Presentacion Vivernet 2006
Presentacion Vivernet 2006
 
Ekumeniskt nätverksmöte 12 april - föredrag
Ekumeniskt nätverksmöte 12 april - föredragEkumeniskt nätverksmöte 12 april - föredrag
Ekumeniskt nätverksmöte 12 april - föredrag
 
WorldCommunicationForum 2013 - Le opportunità del Social Commerce
WorldCommunicationForum 2013 - Le opportunità del Social CommerceWorldCommunicationForum 2013 - Le opportunità del Social Commerce
WorldCommunicationForum 2013 - Le opportunità del Social Commerce
 
Buenos Dias America Latina
Buenos Dias America LatinaBuenos Dias America Latina
Buenos Dias America Latina
 
Guia veran 2013_15_de_xullo
Guia veran 2013_15_de_xulloGuia veran 2013_15_de_xullo
Guia veran 2013_15_de_xullo
 
Presentacion hoteles ohtels
Presentacion hoteles ohtelsPresentacion hoteles ohtels
Presentacion hoteles ohtels
 

Ähnlich wie Enterprise IT Security| CIO Innovation and Leadership

Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxColorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
AkramAlqadasi1
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Doeren Mayhew
 

Ähnlich wie Enterprise IT Security| CIO Innovation and Leadership (20)

Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security Solution
 
2015 Cyber Security
2015 Cyber Security2015 Cyber Security
2015 Cyber Security
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Securing your Cloud Deployment
Securing your Cloud DeploymentSecuring your Cloud Deployment
Securing your Cloud Deployment
 
ComResource Agency Solutions
ComResource Agency SolutionsComResource Agency Solutions
ComResource Agency Solutions
 
ComResource Business Solutions
ComResource Business SolutionsComResource Business Solutions
ComResource Business Solutions
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
 
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxColorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
 
Many products-no-security (1)
Many products-no-security (1)Many products-no-security (1)
Many products-no-security (1)
 
Cyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comCyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.com
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
 

Mehr von RedZone Technologies

How to Communicate the Actual Readiness of your IT Security Program for PCI 3...
How to Communicate the Actual Readiness of your IT Security Program for PCI 3...How to Communicate the Actual Readiness of your IT Security Program for PCI 3...
How to Communicate the Actual Readiness of your IT Security Program for PCI 3...
RedZone Technologies
 

Mehr von RedZone Technologies (13)

RedZone10X: innovation strategy leadership and Transformation
RedZone10X: innovation strategy leadership and TransformationRedZone10X: innovation strategy leadership and Transformation
RedZone10X: innovation strategy leadership and Transformation
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat Management
 
Leadership, Bravery and Courage in Times of Instability and Fear: for CIOs an...
Leadership, Bravery and Courage in Times of Instability and Fear: for CIOs an...Leadership, Bravery and Courage in Times of Instability and Fear: for CIOs an...
Leadership, Bravery and Courage in Times of Instability and Fear: for CIOs an...
 
Modern Threat Architecture Landscape: How to Build an Actionable SIEM
Modern Threat Architecture Landscape: How to Build an Actionable SIEMModern Threat Architecture Landscape: How to Build an Actionable SIEM
Modern Threat Architecture Landscape: How to Build an Actionable SIEM
 
Presentation for the 2016 National and Chapter Leadership Conference by Bill ...
Presentation for the 2016 National and Chapter Leadership Conference by Bill ...Presentation for the 2016 National and Chapter Leadership Conference by Bill ...
Presentation for the 2016 National and Chapter Leadership Conference by Bill ...
 
CIO Scoreboard Overview
CIO Scoreboard OverviewCIO Scoreboard Overview
CIO Scoreboard Overview
 
How to Communicate the Actual Readiness of your IT Security Program for PCI 3...
How to Communicate the Actual Readiness of your IT Security Program for PCI 3...How to Communicate the Actual Readiness of your IT Security Program for PCI 3...
How to Communicate the Actual Readiness of your IT Security Program for PCI 3...
 
RedZoneCIO Security Scoreboard Profile Presentation
RedZoneCIO Security Scoreboard Profile PresentationRedZoneCIO Security Scoreboard Profile Presentation
RedZoneCIO Security Scoreboard Profile Presentation
 
RedZone Testimonials
RedZone TestimonialsRedZone Testimonials
RedZone Testimonials
 
5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack
 
Mobile Device Management Policy Workshop Part 2 | CIO Executive Series
Mobile Device Management Policy Workshop Part 2 | CIO Executive SeriesMobile Device Management Policy Workshop Part 2 | CIO Executive Series
Mobile Device Management Policy Workshop Part 2 | CIO Executive Series
 
5 of 13 Ways To Prevent Advanced Persistent Threads (APTs)
5 of 13 Ways To Prevent Advanced Persistent Threads (APTs)5 of 13 Ways To Prevent Advanced Persistent Threads (APTs)
5 of 13 Ways To Prevent Advanced Persistent Threads (APTs)
 
Move your Data Center to the Cloud
Move your Data Center to the CloudMove your Data Center to the Cloud
Move your Data Center to the Cloud
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Enterprise IT Security| CIO Innovation and Leadership

  • 1. Exponential Technologies 101 Enterprise IT Security CIO Innovation and Leadership Presenter: Bill Murphy
  • 3. • Artificial Intelligence (AI) • Machine Learning & Deep Learning • Robotics • Biotechnology & Bioinformatics & Digital Biology • Virtual Reality & Augmented Reality • Energy & Environmental Systems • Medicine & Neuroscience • Nanotechnology & Digital Fabrication (3D Printing) • Blockchain • Networks & Computing Systems (IT Security) What is an Exponential Technology?
  • 4.
  • 5.
  • 6.
  • 8. Shola – United Therapeutics
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. 15 4DS OF EXPONENTIALS DECEPTIVE TO DISRUPTIVE D IG IT IZ E D E MAT E RIA L IZ E D E MO NE T IZ E D E MO CRAT IZ E Disruptive Stress /Opportunity
  • 18.
  • 22. What is a Disruptive Tech?
  • 23.
  • 24.
  • 25.
  • 26. • Blackberry and Nokia • Tesla and Automotive
  • 27.
  • 28. Books to Help + Resources • SU DC Chapter- singularityudc.com • Singularity University – su.org • Singularity HUB – singularityhub.com • Daniel Burrus - www.burrus.com • Exponential Organizations – exponentialorgs.com
  • 29. With all the opportunities that Exponentials bring there are Risks. Big Risks 1. Governance 2. Ethics 3. Privacy 4. Complexity TRANSITION TO DEFENSE
  • 30. DEFENSE – Enterprise IT Security Qualitative Vs Quantitative
  • 31. Health Dr Ordered - reluctantly Food Panel – Allergy Hematology Metabolic Chemistry Lipid profile Hormones Urinalysis Vitamins etc Symptoms Mental Fog Mood Variability Joint Pain
  • 32. Frontiers of Optimal Performance & Human Potential • Firewalking 7x • Active Spartan race training • Cold water immersion via Wim Hof • Blackbelt • Survival School • Kiting and windsurfing • Coaching Travel Soccer • IronMan x2 • 2 x ½ IronMans • Meditation/Mindfulness (MBSR, Thich Nhat Han) • Personal and Team Flow States Experiments (Steven Kotler) • Innovation at the edge – Design Thinking (SU)
  • 33.
  • 34.
  • 35.
  • 36. 2015
  • 37.
  • 38.
  • 39. The Plan • Primary Target, Time Frame, Re-test • Diet to deal with inflammation • Exercise – Mobility, Strength • Vitamins • Meds • Testing • Execution • Follow-up and Follow-Thru
  • 40. Am I Done? • You only saw a 2015 Food Allergy Panel. Where is the 2016 Comparison? • What about the stool sample? • Year after Year. Massively Proactive. • Rinse and Repeat
  • 41. So What About Enterprise IT Security?
  • 42. Back To Qualitative and Quantitative • Marry Qualitative and Quantitative • Evidence Based • Building Defensible Arguments/Plans
  • 43.
  • 44.
  • 45.
  • 47.
  • 49.
  • 50.
  • 52. COMPREHENSIVE IT SECURITY HEALTH PANEL (1)External Facing Systems (2)Firewall Internal Systems (systems used by employees, mail services, activesync, vpn, etc.) (3) Do your company PCs have an anti-virus program?
  • 53. EXECUTION PLAN – IT ROADMAP - PRIORITIZATION
  • 54.
  • 55. Year Over Year Comparison When you spend a $ What boats are effected?
  • 56. External Facing Systems (systems used by external public/customers) – Do you have an up to date list of all systems presented to the public or customers including services in use? • How many are there? (answer the next set by # based on yes count) – Are the front end user interfaces behind an application filter security device with active blocking capability beyond layer ¾ firewall? – Does the application filter block all high risk issue? – Does the application filter block all medium risk issues? – Do you have any exceptions for sites or subsites on the application filter? – Does this system terminate ssl or encryption? – Is the application or db tier in a different zone/subnet/across a security boundary? – Is the communication between the front end and the next tier unencrypted so the security systems can review cross tier traffic? – Do you formally audit to ensure that these settings are active and working: • Monthly • Quarterly • Yearly
  • 57. • Firewall Internal Systems (systems used by employees, mail services, activesync, vpn, etc.) – Are all non-security devices behind a firewall? – Is the firewall a full UTM with services active and in automated blocking mode for high risk items? – Is the firewall a full UTM with services active and in automated blocking mode for medium risk items? – Are all inbound rules configured explicit in at least two of the following: source, destination and protocol. – Do you formally audit to ensure that these settings are active and working: • Monthly • Quarterly • Yearly
  • 58. Anti-Virus PC – Do your company PCs have an anti-virus program? – How often are definitions updated? • Multiple times a day • Daily • Weekly or more – Do you run centrally managed antivirus? – Are alerts for viruses, service failures, and update problem sent to staff? – Do you exclude any pc from AV? – What percent of systems are covered (I.e. do you skip Macs, Linux etc) – How often do you check for gaps in coverage • Weekly • Monthly • Quarterly – How often do you audit scanning exclusions for files and processes? • Quarterly • Twice a year • Yearly – Is there an approval process prior to allowing exclusions?
  • 59. • Email Encryption and DLP – Do you have a system that automatically audits mail messages for context driven content (PII, PCI, Confidential, etc) – Do you formally audit to ensure that the system is are active and working: • Monthly • Quarterly • Yearly – Can anyone opt out of the system? – Does the system encrypt, reject, or redact ALL emails that fail the automatic audit? – Does the system allow external parties to initiate and reply in an encrypted fashion? – Do you formally audit to ensure that the policies used and look for gaps? • Monthly • Quarterly • Yearly
  • 60. My Vision for You is to Reign in Complexity But this is only a Blood Panel…… What do you do about it?
  • 61. Overall Gaps • Based on the review a lot of good mature security technologies exist however the following is required: – Additional implementation work is required to realize the full impact of the solution – Review system X to ensure intended use is in line with current state of the system. Currently this is not the case – A proactive process of managing security systems A, B and C need to be developed in order to ensure security
  • 62. Action Plan Step 1 • Concentrate on validating and hardening what is in place – Perform an user account audit – Perform an edge security audit – Enable Varonis to provide proactive security – Enable Secret Server to harden the environment
  • 63. Action Plan Step 2 • Two technologies that can be added to bolster security, especially if HIPAA compliance is desired – Endpoint security for USB device security – ZixGateway for Email Encrytion and DLP
  • 64. Sample Deliverables • Varonis Data Governance (steps needed to complete the install) • Thycotic Gap Comparison • Edge Assessment + • AD /Account Audit • Road Map – with Priority
  • 65. Audit/ Compliance Regulators/ Regulations FFIEC, PCI, DoD, HIPPA, etc Standards Staff Gartner Vendors Consultants Business Framework ExO CIO Business IT Framework
  • 66. Framework • What happens when you lose your CFO or Accounting Manager? Versus • What happens when you lose your CIO, CISO, VP IT, Manager IT, etc
  • 67. Common Language of Business • Debits and Credits • Income Statement and Balance Sheet • P&L
  • 68. Align Proper Business Expectations Does your VP of Sales guarantee revenue? Where in your business do you have guarantees?
  • 70. The Role of Transparency
  • 74.
  • 75.
  • 76. Forget Big Data – Think Little Data….. With Context
  • 77.
  • 78. Thunder & House & Squirrel
  • 79. DAR Scan – Data at Rest Scan Being Governed VS The Governor
  • 80. How Data is lost?  Employee post to share drive  Employee shares with vendor  Employee theft  Employee accident  Malware/Virus  Social Media  Hacking attack (Spear Fishing)  Social Engineering  USB
  • 81. Incidents by File Type Policy File Type Hits Number of Files Customer List Adobe PDF 1846 90 Customer List Email Message File (MIME, EML) 1071 43 Customer List HTML 311 16 Customer List Microsoft Excel 73842 360 Customer List Microsoft PowerPoint 125 6 Customer List Microsoft Word 1258 34 Customer List Plain Text 7539 55 D_CCN (pattern) Adobe PDF 479 3 D_CCN (pattern) Microsoft Excel 146 144 D_CCN (pattern) Plain Text 1442 5 D_SSN (pattern) Adobe PDF 2264 7 D_SSN (pattern) Microsoft Excel 180 93 D_SSN (pattern) Microsoft PowerPoint 2 1 D_SSN (pattern) Microsoft Word 1 2 D_SSN (pattern) Other Word Processors 1 1 D_SSN (pattern) Plain Text 63 3 Example of Incidents
  • 82. Example of Incidents Incidents Made in the last 90 Days File Creation Time File_Share Policy Hits Number of Files 7/28/2012 1:12:00 AM BadFileServercustomersBIGEFCUAudit CustomerList 14 1 8/3/2012 2:43:00 PMBadFileServercustomersNurseFirst Cor Customer List 87 1 8/29/2012 11:35:00 PM BadFileServercustomersUniversityFCU Customer List 92 3 9/11/2012 11:44:00 PM BadFileServermarketingPartnersBlue Customer List 35 1 9/6/2012 11:49:00 PM BadFileServermarketingPartnersGTB D_SSN (pattern) 1 1 9/6/2012 11:50:00 PM BadFileServerBLD_BLD_ReportsXYZC D_CCN (pattern) 239 1 9/6/2012 11:50:00 PM BadFileServerBLD_BLD_ReportsXYZC D_SSN (pattern) 381 1 10/4/2012 5:55:00 PM BadFileServerBLD_BLD_ReportsXYZC D_SSN (pattern) 500 1 10/4/2012 11:41:00 PM BadFileServerBLD_BLD_ReportsXYZC D_SSN (pattern) 500 1 9/6/2012 11:50:00 PM BadFileServerMKT_MKT_ReportsXYZS Customer List 16 1 10/2/2012 11:48:00 PM BadFileServerMKT_MKT_ReportsXYZS Customer List 17 1 8/9/2012 11:45:00 PM BadFileServerMKTMKT Customers123 F Customer List 38 1 9/6/2012 11:51:00 PM BadFileServerMKTMKT Customers123 F Customer List 74 1
  • 83. Example of Incidents Full Incident Report File_Share Policy Inciden ts Files File Path BadFileServer operations Docs D_SSN (patter n) AprilMainZix.xlsx BadFileServer operations Docs Documents.bak ZixMain 2010 BadFileServer marketing CI OES D_SSN (patter n) Sales_OldStuff.zip/Gol f Outing_June27.doc BadFileServer marketing CIO ES BadFileServer marketing CI OES Custom er List Sales_OldStuff.zip/VM ware Attendance List CIOES.xls BadFileServer marketing CIO ES BadFileServer marketing CI OES Custom er List Sales_OldStuff.zip/Sep t Sales email blast.doc BadFileServer marketing CIO ES BadFileServer marketing CI OES Custom er List Sales_OldStuff.zip/Roc kville List from Vania March 02.xls BadFileServer marketing CIO ES
  • 84. Example of Incidents Incidents by File Share File_Share Policy Incidents Files BadFileServeraccounting Customer List 144 1 BadFileServeraccountingArchive D_CCN (pattern) 139 139 BadFileServeraccountingArchive D_SSN (pattern) 170 85 BadFileServeraccountingArchive2005 D_SSN (pattern) 5 1 BadFileServeraccountingConst_Assoc Customer List 288 18 BadFileServeraccountingSherrie Customer List 1000 1 BadFileServeraccountingSherrie D_SSN (pattern) 1 1 BadFileServercustomers_InActive_Clie Customer List 276 13 BadFileServercustomers_InActive_Clie D_CCN (pattern) 1 1 BadFileServercustomers123FCUcontra Customer List 70 4 BadFileServercustomersABC_Network_ Customer List 12 1 BadFileServercustomersABCAssessmen Customer List 60 2 BadFileServercustomersAlpha Systems Customer List 15 1 BadFileServercustomersXYZSSL_VPN Customer List 12 1 BadFileServercustomersStateDep Statu Customer List 237 1
  • 85. HIPPA/HIPAA, NIST/DOD since we are a downstream contractor, NCUA, PCI, SOC compliance
  • 87.
  • 88. OFFENSE • Study top Disruptors in your field
  • 89. Exponential Technologies • IT Security and Networks • Robotics • Artificial Intelligence • Virtual Reality/ Augmented Reality • Deep Learning & Machine Learning • Neuroscience • Biomedicine & Digital Biology • Energy and Environmental Systems • Blockchain • 3D Manufacturing Printing • IT Security and Networks • Nanotechnology • IoT and Big Data • Algorithms & APIs
  • 90.
  • 91.
  • 92. Exponentials in the Health Field
  • 93.
  • 94. Pay Attention to Blockchain
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100. “The Smartest People in the World Don’t Work for You”
  • 101. Measure Your Organizational Readiness to Innovate • Visualize this • Are you leaning into disruption or playing afraid 10 5 1
  • 102. Software is Eating the World Quote “Everything that Humans are Inefficient at will be eaten by Software.”
  • 103. APIs & Algorithms NIH – Gut Health - Microbiome
  • 104. Micro- Experiments • NIH data sets – Gut Health example • Fail fast and forward • Push projects to the edge. Starve the edge.
  • 105. • Start small with innovation pockets/ Labs • Apply Design Thinking & Lean Startup Mentality • Align with people who have entrepreneurial tendencies within the company • Principle of Innovation at the edge of the company
  • 106. Staffing to Build Expertise
  • 108. Bigger Thinking - Exponential World Wide Expansion
  • 109. MTP – Massive Transformational Purpose
  • 110. • Identify and avoid corporate anti-bodies • Pay attention to when you disbelieve to avoid being disrupted during the curve when the technology seems odd or weird What to Avoid
  • 111.
  • 112.
  • 113. Summary – Offense Take-aways • Learn to play offense - Join an innovation group like mine or someone else's • Be surrounded by ideas and people who think similar • You are the average of the 5 people you hang around • Build systems at the edge • Avoid corp anti-bodies • Pay attention to Lean and Design Thinking as it applies to innovation (Joy, Inc, Exponential Org) • Forget Big Data – Think Little Data • Understand who your disruptors are? Technologies in Health? Disruptive business practices, Communities, blockchain, algorithms, & APIs
  • 114. Offense Take-aways • You don’t need permission to add revenue…. • Are you retiring in the next 5 years? • It is a mindset first (for you) then a culture thing • Neuroscience The Brain of a Leader thinking Exponentially • IoT & Dashboards • Remember - role of offense and defense • Financial Statements of the business – Point in Time versus Progress over Time.
  • 115. Defense Take-aways • Play defense hard. Don’t play ping pong. Settle into strategy and risk. Which will drive all tactical execution. • Embrace IT Security complexity with strategy. Eliminate overlapping technology confusion. Data Governance, privacy, risk – understand context. • Flush out unnecessary costs • Create Defensible Arguments/Plans • Forget Big Data – Think Little Data • Take a multi-year approach
  • 116. Bill’s BIO & How to Contact Me?
  • 117.
  • 118. World Class IT Security, Strategic and Tactical Thought Leadership for Enterprise IT Business Leaders, Intra-preneurs, Entrepreneurs, Innovation, Design Thinking, Creativity, Frontiers of Human Performance, Breakthroughs in Neuroscience, & Exponential Technologies
  • 120. CIO Innovation Insider Group Meetings Insider Updates Weekly Report
  • 121. Singularity University Washington DC Chapter Ambassador Examines Disruptive and Exponential Technologies By looking at how they can be used to Improve the lives of a billion of People”