
Welcome to the Ingenious Minds Blog of Sam Visner, Vice President and General Manager, Cybersecurity.
- The associated challenges of securing enterprise data, keeping data private and protecting intellectual property may seem daunting. But fasten your seatbelts: In 2013 we’re also going to start integrating these concerns with the security of systems used for manufacturing, supply chains and critical infrastructures.
- Sam was a guest on WUSA9′s Government Contracting Weekly in the Washington, DC metro-area. Sam talked with host Hilary Fordwich about current cybersecurity threats, important progress on public-private partnerships, and the challenges facing today’s CIO. The show can be viewed here.
- It’s been said that the commercial and public sector cybersecurity are too different to address in common. We’ve heard that national security-level cyber threats are beyond the concern of the private sector. While that might have been true in the past – and I don’t it ever was true – we’ve come to a different realization.
- We get asked from time to time what we think of the "value of cybersecurity." How much, we're asked, is cybersecurity "worth?" What are the units of cybersecurity we measure? What should they cost? How valuable are they?
- In the recent past, we worried about financial cybercrime. That kind of cybercrime remains a problem, surely, but we’ve learned that the risks associated with the theft and misuse of intellectual property, such as the design of a new aircraft fuselage or a new pharmaceutical, or of a company’s global go-to-market strategy, or even the trade negotiating position of the US or one of its allies, can be worth far more, in the wrong hands. That said, we’re still some way from characterising accurately the scope of either financial cybercrime or the theft of intellectual property. However, either can be a measureable proportion of a country’s GDP. In fact, the theft of intellectual property has the potential, some believe, to alter the global economic balance.
- Push on a balloon and make an indentation. You'll notice that somewhere else, the balloon bulges. The balloon's volume is finite; at some point, with enough pressure, it will burst. Today's cybersecurity challenge is a bit like that bulging balloon. Everything we do has an effect on just about everything else.
- Cybersecurity is a great fit for the concept of "ingenious minds" because the cybersecurity challenge reflects great ingenuity on the part of those attempting to steal information and damage infrastructures, and it also requires great ingenuity on the part of those of us who are charged with defending against attacks. In addition, cybersecurity requires that we be ingenious in how broadly we view this challenge.
