The Cyber Butterfly: Risk Management Challenges

Every person realizes, at least I hope they do, that society - and the world - is moving into a new state of being: a new realm, a cyber realm if you will, that is being continually reshaped by five technological forces: digitalization, mobility, the Internet, the cloud, and artificial intelligence. (I'll use the "web"… Continue reading The Cyber Butterfly: Risk Management Challenges

Cyber Attack Space Elements (Selective)

This blog post is just a "thinking out loud and writing it down" blog post about cyber attack space(s). Here are some of the elements of the cyber attack space: Enterprise IT-created / enabled business / system processes (or certain activities of those processes) are connected to the web; Mobile devices become "smart" and, as… Continue reading Cyber Attack Space Elements (Selective)

Risk Landscapes: Traditional & Cyber-Focused

During my insurance industry years (industry itself, management consulting, insurance industry analyst), there were illustrations of the risk landscape of risk events to consumers and/or enterprises at that point-in-time. Often, the risk landscape included attempts at frequency and severity of each risk. "Traditional" Risk Landscape For me, the 'traditional' risk landscapes encompasses risks, some of… Continue reading Risk Landscapes: Traditional & Cyber-Focused

Dangerous Divides: Cyber Risk Management

Each of us represents, at every moment in time, a totality of our life's experiences, including education, relationships, and work experiences. A never-ending growing part of our life's experiences include the impact that current and emerging technologies (and their associated applications) have on the manner in which we communicate; collaborate; consume entertainment and news; interact… Continue reading Dangerous Divides: Cyber Risk Management