Category: Information Security

Big Data Under Attack

Once again, everybody is talking about China. On Feb. 19, Mandiant, an American security company issued a startling report — the result of a six-year investigation — that makes the claim that the United Sates is in a cyber war with a 12-story building in Shanghai. The private security analyst concluded that the building is home of China’s stealth cyber war division, the People’s Liberation Army Unit 61398.

Change Implementation Disillusion; or the Audacity of Change?

Here are a few golden points.

1 – It is never people that are disengaged but visions that are disengaging.
2 – Many highly competent change leaders perform less while implementing change due to high emotional stress and how the human brain functions. They need an outsider coach to perform best. It is scientifically proven.
3 – Matrix organization is economic but with low team spirit, it increases cost as it decreases production.
4 – Two top bottlenecks in change implementation in order of impact are 1: the leaders and 2: the team. Invest in them before the technology and methodology.

Cyber Security

Cybersecurity needs transformational leadership from women

Current cybersecurity concerns require more than controversial changes to encryption, corporate-government collaboration in Silicon Valley, and add-ons to omnibus legislation. Security and technology advancement require changes across our organizations, our leadership, and in the culture of tech work itself.

The biggest threat in cybersecurity is the human element. Behind every piece of data is a human actor, either friend or foe, which means that human nature and relationship-building should be the essential components of your security strategy.

Security threats facing us today require holistic, mature, transformational leadership from women.

CIO WaterCooler