WHY IT MATTERS: Digital Transformation
214.7K views | +2 today
Follow
WHY IT MATTERS: Digital Transformation
Get weekly or monthly digest of all posts in your inbox: https://fmcs.digital/wim-subscribe
Curated by Farid Mheir
Your new post is loading...

Popular Tags for this blog

Current selected tags: 'Security', 'Strategy'. Clear
Scooped by Farid Mheir
Scoop.it!

This #startup AID:Tech is creating legal identities for a billion people and makes the case why having a #digitalIdentity has become essential for us all via @WEForum

This #startup AID:Tech is creating legal identities for a billion people and makes the case why having a #digitalIdentity has become essential for us all via @WEForum | WHY IT MATTERS: Digital Transformation | Scoop.it

A billion people in the world have no legal identity. Without an ID they can’t open a bank account, get a loan, or even vote. Now a tech entrepreneur has come up with an answer.

Farid Mheir's insight:

WHY IT MATTERS: an amazing article from WEF about how important digital identity is. The diagram is also a great summary of the potential use cases for digital IDs. In short: its way more than a digital version of your passport.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Gartner Report on #Security Organization Dynamics shows how complex it has become to make companies secure - which begs the question "who's RESPONSIBLE when a security breach occurs?" @Gartner

Gartner Report on #Security Organization Dynamics shows how complex it has become to make companies secure - which begs the question "who's RESPONSIBLE when a security breach occurs?" @Gartner | WHY IT MATTERS: Digital Transformation | Scoop.it

The growing cyber skills shortage drives security organizations to look for ways to mitigate the pain and danger that short-staffed security teams can experience. In its report, Security Organization Dynamics, Gartner outlines this ongoing challenge and notes how, “Persistent security skills shortages have forced security leaders to explore new ways of obtaining and managing security capabilities.”

Gartner points out that hiring may not be the only option for filling the gap, cautioning that, “Few, if any, enterprises can afford to perform all security functions in-house. Consider selective outsourcing of functions, especially those that are operationalized or ad hoc.”

Farid Mheir's insight:

WHY IT MATTERS: security, especially digital security and privacy, have become a central theme of digital transformation plans. Here Gartner surveys 300+ organizations to show different organizational structures for large, medium and small businesses.

My conclusion: there are too many people in charge of security, the governance is too complex and it is not clear who is RESPONSIBLE when a breach occurs...

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Canada’s Digital ID Future - white paper by Canadian Bankers makes the case for creation of a national federated #digitalID system and regulation - I agree! #security #privacy 

Canada’s Digital ID Future - white paper by Canadian Bankers makes the case for creation of a national federated #digitalID system and regulation - I agree! #security #privacy  | WHY IT MATTERS: Digital Transformation | Scoop.it

In this brief, we highlight why Canada needs a digital identity system, how other countries have made progress in this area and the lessons we can learn from those experiences to build a system in Canada.

Farid Mheir's insight:

WHY IT MATTERS: digital identification is at the base of the digital pyramid of needs. This white papers details the requirements for a national digital identification system that includes proper government regulations. FINALLY!

For more on the digital pyramid of needs: http://fmcs.digital/blog/pyramid-of-digital-needs/ 

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Kleiner Perkins’ Mary Meeker Internet Trends at Code 2018 #mustRead #weekendRead #video #AI #eCommerce

Kleiner Perkins’ Mary Meeker Internet Trends at Code 2018 #mustRead #weekendRead #video #AI #eCommerce | WHY IT MATTERS: Digital Transformation | Scoop.it

"When you have rising monetization, rising growth and rising data collection, it drives a lot of regulatory scrutiny whether it’s related to data privacy, competition or safety in content."

Farid Mheir's insight:

WHY IT MATTERS: this is the annual presentation to level-set everyone on the Internet, mobile, ecommerce, cybersecurity, epayment, personalization, etc. She covers everything and shows that digital transformation is in full swing. Just WOW. Again.

Martin (Marty) Smith's curator insight, December 19, 2018 8:15 AM

Meeker is as close to Nostradamus as we are likely to get. 

Scooped by Farid Mheir
Scoop.it!

Chinese police are using facial-recognition glasses to scan crowds for wanted criminals #security #privacy #AI 

Chinese police are using facial-recognition glasses to scan crowds for wanted criminals #security #privacy #AI  | WHY IT MATTERS: Digital Transformation | Scoop.it
  • Railway police have begun using facial-recognition eyewear to catch criminals.
  • In tests the glasses identified faces within 100 milliseconds.
  • Seven people have been arrested for a range of previous crimes, and another 26 were banned from travel.
  • China has been ramping up its use of facial-recognition technology as it moves toward a nationwide database that can recognize any citizen within three seconds.
Farid Mheir's insight:

WHY IT MATTERS: face recognition using AI has been around for a few years. It used to require large computers in the cloud. Not anymore. This changes everything.

1) privacy: it will become more and more difficult to protect your privacy in the future. I have written about this before, specifically when the Google glasses came out 3 years ago. It is a concept that is interpreted differently in countries and cultures - such as China vs USA.

2) China: is investing heavily to win the AI war with the US. So we should expect every product - from glasses to door bells to cell phones to cars - to have face recognition built into the device in the very near future. At the CES2018 show, I saw a number of companies that offer face recognition chips ready to be embedded at low price into any consumer device. So it *will* happen. More on China in a later post...

3) protection: people will naturally want to protect themselves. We should start to see face masks that are designed to fool face recognition hardware as has been shown to be possible recently.

More reading:

- google glasses face recognition: http://fmcs.digital/blog/kodak-cameras-banned-in-the-1880s-over-loss-of/ 

- CES security cameras: http://plus.lapresse.ca/screens/9ee3fba2-dd87-42c4-ae7c-b2478b752ec3%7C_0.html (in french)

- fooling face recognition: https://motherboard.vice.com/en_us/article/ne43pz/ai-fooling-glasses-could-be-good-enough-to-trick-facial-recognition-at-airports 

Scooped by Farid Mheir
Scoop.it!

The downside of #drones & #AI- Researchers Create Video to Call for Autonomous Weapons Ban at UN @FLIsrisk

The downside of #drones & #AI- Researchers Create Video to Call for Autonomous Weapons Ban at UN @FLIsrisk | WHY IT MATTERS: Digital Transformation | Scoop.it

In response to growing concerns about autonomous weapons, a coalition of AI researchers and advocacy organizations released a fictitious video on Monday that depicts a disturbing future in which lethal autonomous weapons have become cheap and ubiquitous. The video was launched in Geneva, where AI researcher Stuart Russell presented it at an event at the United Nations Convention on Conventional Weapons hosted by the Campaign to Stop Killer Robots. Russell, in an appearance at the end of the video, warns that the technology described in the film already exists and that the window to act is closing fast.

Farid Mheir's insight:

WHY IT MATTERS: there is often a downside to advanced technology, especially those that can allow its owner dominance. In this video scenario, humans weaponize drones with AI. But the real danger is for superintelligent AI to turn against us humans. 

For more, read the amazing book Superintelligence: http://sco.lt/5uYgyn 

Scooped by Farid Mheir
Scoop.it!

Cybersecurity make headlines: How Business Is Protecting Itself is Fortune magazine July cover

Cybersecurity make headlines: How Business Is Protecting Itself is Fortune magazine July cover | WHY IT MATTERS: Digital Transformation | Scoop.it
Businesses are under attack from cybercriminals. Here’s what companies are doing to safeguard their digital assets from hackers.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

Do I really need to say why. Just read it.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Only 12% of Americans Use a pwd mgmt software says @pewresearch report on Cybersecurity1

Only 12% of Americans Use a pwd mgmt software says @pewresearch report on Cybersecurity1 | WHY IT MATTERS: Digital Transformation | Scoop.it

This survey finds that a majority of Americans have directly experienced some form of data theft or fraud, that a sizeable share of the public thinks that their personal data have become less secure in recent years, and that many lack confidence in various institutions to keep their personal data safe from misuse. In addition, many Americans are failing to follow digital security best practices in their own personal lives, and a substantial majority expects that major cyberattacks will be a fact of life in the future.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

As I wrote recently in the "Pyramid of Digital Needs" (fmcs.digital/blog/pyramid-of-digital-needs/), security is one of the most basic needs. When we don't feel secure and private then it is difficult to enjoy the benefits of social networks and all the other tools that digital now provides. It is essential that corporations address security and privacy in a meaningful way in order for their clients, employees and partners to use their new digital tools and embrace the digital transformation that most enterprises have recently embarked on.

 

Also worth reading from Pew Research:

araedora's comment, February 22, 2017 9:56 PM
good
Scooped by Farid Mheir
Scoop.it!

Proactive Defense: Understanding the 4 Main Threat Actor Types

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Key Takeaways

  • Understanding the four main threat actor types is essential to proactive defense.
  • Cyber criminals are motivated by money, so they’ll attack if they can profit.
  • Hacktivists want to undermine your reputation or destabilize your operations. Vandalism is their preferred means of attack.
  • State-sponsored attackers are after information, and they’re in it for the long haul. They’re difficult to identify, so you’ll need to be on top of your security.
  • Insider threats could be malicious, but they could also be well-meaning people who have been led astray. Training and user behavior analytics are the way forward.
Farid Mheir's insight:

Good to know.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

The Internet Health Report: @mozilla 

The Internet Health Report: @mozilla  | WHY IT MATTERS: Digital Transformation | Scoop.it

Mozilla’s new open source initiative to document and explain what’s happening to the health of the Internet. Combining research from multiple sources, we collect data on five key topics and offer a brief overview of each.

Farid Mheir's insight:

Mozilla has always been promoting Internet security and privacy and this new report paves the way for a very interesting ongoing look at key elements of the public Internet.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Software Helps Police Departments Transform to #digital & Keep Cops On The Street via @forbes

Software Helps Police Departments Transform to #digital & Keep Cops On The Street via @forbes | WHY IT MATTERS: Digital Transformation | Scoop.it

Scott Crouch and his college buddies built Mark43 to help police do their job more efficiently and effectively.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

Every industry is being transformed by digital, even those that were not so long ago considered off limit. Great example, the police force, which have systems that date from another era, can now benefit from cheap communication, cloud services, big data and analytics services to deliver mobile police insight and tools using everyday mobile phones and tablets.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Forrester Wave: Digital Risk Monitoring 

Forrester Wave: Digital Risk Monitoring  | WHY IT MATTERS: Digital Transformation | Scoop.it

When it comes to the myriad risks companies face across digital channels — social, mobile, and web — security and risk (S&R) pros track a much smaller portion of their environment than they realize. Without comprehensively and persistently monitoring risk in digital channels, companies remain susceptible to a wide variety of brand, cyber, and physical risk events. Despite the high stakes, many organizations struggle to improve digital risk visibility and mitigate related risks.

Farid Mheir's insight:

Use this link to access the Forrester report for free on solutions to help protect your organization from the digital threats your corporation faces on its brand, cyber presence or physical locations.

 

WHY THIS IS IMPORTANT

First, the paper describes the various risks you may face in a digital world. If you don'T know the difference between OSINT, TECHINT, SIGINT, HUMINT, CHINT then you must read it.

Good to know.

Second, it lists the various ways in which you can protect yourself.

Interesting.

Finally, it lists tools you can use to secure your company.

Useful.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Phishing Field Guide: How to Keep Your Users Off the Hook

Phishing Field Guide: How to Keep Your Users Off the Hook | WHY IT MATTERS: Digital Transformation | Scoop.it
Learn phishers’ most dangerous tricks and see how you can teach your users to avoid them.
What's inside?
  • An overview of who in your organization is most likely to get phished.
  • Easy-to-follow tips for employees at every level of your company.
  • Sample phishing emails that break down just what to look for in a phishing attack.
Bonus!

A printable checklist of tips and best practices to share with your users to help them recognize and avoid phishing emails.

Farid Mheir's insight:

A very good introduction to the dangers of phishing email attacks, with good examples and humour that make it a good guide to share with employees as part of an information session of staying vigilant about those attacks.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Applied Hacking: #youTube hacking channel

Applied Hacking: #youTube hacking channel | WHY IT MATTERS: Digital Transformation | Scoop.it
How the creator of the Samy worm became the friendly face of technological insecurity.
Farid Mheir's insight:

Describes how a hacker youTube channel with 90K subscribers and 5M views describes how to hack everything from credit card readers to garage door openers.

 

WHY THIS IS IMPORTANT

Hacking has become a past time for many and there is an industry forming around this new trend to help users with their hacking projects and solutions. Any digital expert would be well informed to follow such hacking gurus to understand what is possible, how it is done and - possibly - how to prevent it in their strategies and roadmaps.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

The Value of a Hacked Company via @Krebs

The Value of a Hacked Company via @Krebs | WHY IT MATTERS: Digital Transformation | Scoop.it
Today’s more clueful cybercrooks understand that if they can identify compromised systems inside organizations that may be sought-after targets of organized cybercrime groups, those groups might be willing to pay handsomely for such ready-made access.
Farid Mheir's insight:

Krebs explains how cybercrime organizations profit from the sale of companies they hack and gain access to usernames and systems. It also provides guidance on how to improve security in large organizations.

 

WHY THIS IS IMPORTANT

I find that too often we focus on individual hacks or threats but rarely consider security at a strategic level - assigning real cost to security breaches and thus looking for funding to address the biggest risks. Moreover, as is stated here, awareness training of resources may actually be a very effective - and relatively low cost? - way to improve security and protect an organization.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

2016 Trusted Access Report: The current state of device security health

2016 Trusted Access Report: The current state of device security health | WHY IT MATTERS: Digital Transformation | Scoop.it

5 key recommendations

  1. Don’t reject BYOD — be prepared for it. Give your IT administrators actionable data on device ownership and health that can inform risk-based access control decisions.
  2. Encourage safe computing practices and good security hygiene, such as running regular security updates or using device encryption, passcodes and additional authentication to protect systems and data.
  3. Configure systems and deploy policies that enable automatic updates for as much software as possible to remove some of the friction that users feel when manually installing updates. We found that an overwhelming number of out-of-date browsers and systems don’t take basic steps like enabling automatic updates.
  4. Switch to browser platforms that update more frequently and automatically, like Google Chrome.
  5. Disable Java and prevent Flash from running automatically on corporate devices, and enforce this on user-owned devices through endpoint access policies and controls.
Farid Mheir's insight:

DUO security publishes a report on security findings from over 2M devices its software is installed on and provides recommendations from its findings

 

WHY THIS IS IMPORTANT

Security is better, it seems, when users use software that update themselves automatically. Unfortunately, because enterprises have to pay to keep software up to date, most computers are out of date from a security standpoint. Leaders should prioritize keeping systems up to date or favour solutions with automated and free updates. As the paper describes, there are many out there, you just have to look for them carefully.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Your smartphone is leaking your information

This talk was given at a local TEDx event, produced independently of the TED Conferences. Bram is a PhD student in computer science at the Expertise Centr
Farid Mheir's insight:

An 8 minute video that will make you rethink your hunt for free wifi in public spaces...

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Australia to trial cloud passports in world-first move

Australia to trial cloud passports in world-first move | WHY IT MATTERS: Digital Transformation | Scoop.it
Under a cloud passport, a traveller's identity and biometrics data would be stored in a cloud, so passengers would no longer need to carry their passports and risk having them lost or stolen. DFAT says 38,718 passports were registered as lost or stolen in 2014-15, consistent with the 38,689 reported missing the previous year.
Farid Mheir's insight:

Part of a brainstorming exercise by the Foreign Affairs Minister of Australia. 


WHY THIS IS IMPORTANT

Not having to carry papers and documents with you is always a good idea. We do it for our personal information and contacts, our emails, calendars, documents and pictures, and soon with our money (apple pay, google wallet, etc.). Moving to the cloud for your government identification makes perfect sense as well. 


Security will need to be bullet proof, but given the number of stolen or lost passports (due mostly to human error I am sure), I would bet that technology would do a much better job.


Concerning privacy and global surveillance, that's a different story...

Farid Mheir's comment, November 6, 2015 6:07 PM
Yes indeed, all good points - but I don't see them as showstoppers but rather as technical constraints, that may ultimately the solution impractical until cloud access maturity is there. But I thought it is a great example of digital transformation, no? ;-)
youngcelery's comment, November 6, 2015 11:16 PM
Helpful...!!
Ms. Stephens's curator insight, November 9, 2015 9:41 AM

This could revolutionize travel, but will your information be safe from hackers?

Scooped by Farid Mheir
Scoop.it!

Demand for cyber insurance is set to explode

Demand for cyber insurance is set to explode | WHY IT MATTERS: Digital Transformation | Scoop.it
Insurers and reinsurers face growing demand for cyber insurance, but how can they capitalise on this opportunity, whilst managing their risk exposure?
Farid Mheir's insight:

Amazing research and data from PWC on the cyber crime future forecast. 


WHY THIS IS IMPORTANT

As everything becomes digital, companies must prepare for the cyber crime threat to go beyond an annoyance and into a top10 risk.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

These are the 7 easy steps a teen used to hack the director of the #CIA

These are the 7 easy steps a teen used to hack the director of the #CIA | WHY IT MATTERS: Digital Transformation | Scoop.it
How a teen hacker used social engineering to get into the email account of the CIA director.
Farid Mheir's insight:

Explains how a teenager was able to fool VErizon and AOL employees into giving him access to CIA director email account.


This shows that the weak link in all of our technology remains the people. The solution thus is not more technology or information security restrictions (because everyone will bypass them anyways), but rather better education and technology that is transparent so that people don't bypass it or make insecure by their actions.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Security researchers identify 1,600 Internet of Things devices with a drone over Texas

Security researchers identify 1,600 Internet of Things devices with a drone over Texas | WHY IT MATTERS: Digital Transformation | Scoop.it
Praetorian tracking all IoT devices in Austin, Texas running on ZigBee protocol, similar to the Shodan scanner.
Farid Mheir's insight:

A project has been devised to map all internet of things devices in the Austin Texas area, and identify vulnerabilities. Cool demonstrations of what you can do with a drone and some technology skills.


See the full map here:

https://www.praetorian.com/iotmap/ 


WHY THIS IS IMPORTANT?

There will be 9B IoT devices soon and many more in the future. Great opportunities but it needs to be safe and private.

Tracy Harding's comment, September 1, 2015 9:19 AM
You need to work on formatting of your replies. This is one giant sentence. Remember the requirements. You need a 2-3 sentence summary, at least 1 sentence of IR implications and 1 sentence about your thoughts.
Farid Mheir's comment, September 1, 2015 9:23 AM
@Tracy Harding: not sure I understand your comment re: formatting. Can you be more specific and email me a screengrab? thank you!
Farid Mheir's comment, September 1, 2015 9:24 AM
@Jake D'Imperio gis thank you for the comment!
Scooped by Farid Mheir
Scoop.it!

#wow: data is the pollution of the information age. #mustListen talk via @GoogleTalks @schneierblog

Bruce Schneier, American cryptographer, computer security and privacy specialist, will be coming to Google to talk about his new book: "Data and Goliath: The...
Farid Mheir's insight:

Bruce Schneier is a legend in the security and privacy world and he explains in a 30 minute talk (20min if you listen at 1.5x speed ;-) the content of his new book. He makes me want to read it (good job I guess) but also closes with an interesting analogy: data is the pollution of the information age.


WHY THIS IS IMPORTANT

Bruce raises the issue of privacy but also ventures into solutions, which is rare because it is a difficult subject with no straight answer. He makes the case that there is duality in producing data and analyzing it: it is both useful and dangerous. Every company is faced with the questions that Bruce raises.

Scooped by Farid Mheir
Scoop.it!

CIOs Name Their Top 5 Strategic Priorities via @WSJ

CIOs Name Their Top 5 Strategic Priorities via @WSJ | WHY IT MATTERS: Digital Transformation | Scoop.it

 After breaking up into a number of task forces and discussing strategic priorities, CIOs at the Journal’s CIO Network event came together to create a prioritized set of recommendations to drive business and policy in the coming year. While proposals ran the gamut, consensus seemed to form around two major themes: cybersecurity, and delivering change through effective communication with the rest of the business. The full results will be published in The Wall Street Journal CIO Network special report later this month. Here’s a look at the top five:

Farid Mheir's insight:

security, security, security...

Dianne M. Kipp's curator insight, February 9, 2015 11:18 AM

All top 5 point to "changing the way business works", i.e. corporate culture and the behavior changes required to successfully transition from "old world" to "new world".

Scooped by Farid Mheir
Scoop.it!

Framework to make corporations more cyber-resilient a hyperconnected world- must on the CEO agenda via @McKinsey

Framework to make corporations more cyber-resilient a hyperconnected world- must on the CEO agenda via @McKinsey | WHY IT MATTERS: Digital Transformation | Scoop.it
For the world’s economy to get full value from technological innovation, it must have a robust, coordinated approach to cybersecurity. A new report from the World Economic Forum and McKinsey & Company looks at how that could happen.
Farid Mheir's insight:

The report provides a comprehensive 14 elements framework to guide the collaboration required to make corporations more cyber-resilient. In our world of 100M credit card stolen at Target and large-scale NSA spying activities, McKinsey suggests that this now become a priority on the CEO agenda.


I argue when looking at the framework that many of the Enterprise Architecture tools and practices can be leveraged successfully to implement the framework. Moreover, as digital transformations become common place, the security aspects must be integrated from the get-go.

No comment yet.
Curated by Farid Mheir
Get every post weekly in your inbox by registering here: http://fmcs.digital/newsletter-signup/