Cybersecurity Fundamentals – Change the Economics

Cybersecurity Fundamentals – Change the Economics

Cybersecurity Fundamentals – Change the Economics

Cyber-attacks are asymmetrical and reap large monetary and national security rewards, far greater than the resources they require.

Consider this statement from the 2014 Verizon Data Breach Investigations Report: “2013 may be remembered as the ‘year of the retailer breach,’ but a comprehensive assessment suggests it was a year of transition from geopolitical attacks to large-scale attacks on payment card systems.”

Stealing cars, robbing banks, or stealing an individual’s identity, offer less financial return than a database or stream of millions of credit card numbers. The frequency and volume of attacks indicates that current cybersecurity methods to protect sensitive information may not be sufficient, and perhaps the rate of attack will not slow until the risk or cost to the attackers becomes too high compared to the value of a breach.

Raising the cost or reducing the value of an attack is not easy, particularly when many attacks originate from countries without extradition agreements. Limited law enforcement capabilities make many of methods to combat this controversial. The notion of a counterattack requires more precision than we usually have in identifying the attacker within the necessary timeframe. A counterattack risks a great deal of collateral damage and potential diplomatic fallout. This is a long-term problem that requires long-term, indirect actions for any economic change. In that context, here are some ideas that might have an impact:

  • Participating in economic activity with the U.S. is a boon to most countries. As a result, cybercrime also impacts their economies. Before agreeing to trade agreements and economic treaties, the U.S. might require other countries to commit to cooperative law enforcement investigations and legislated programs for reducing cybercrime activities within their borders
  • Assign each credit card issued a set of decoy numbers that are recorded at the same time the real number is used to make a purchase. Over time, databases and point of sale applications will become loaded with several multiples of decoy numbers, lessening the chance that a real number is used in a fraudulent transaction involving stolen numbers. This makes it easier for the retailer to identify fraudulent transactions, and reduces the value of the compromised data

The complexity of geopolitics, technology, economic interests, and law enforcement operations for combating cyber-attacks will continue to make reaching, litigating, and incarcerating cyber-criminals very challenging. Efforts to increase the risk or cost to attackers will take a long time to implement and have an effect, but this is clearly a long time problem. 

Contributors

* Arc Aspicio | Arc Aspicio is an information technology and management consulting company that focuses on homeland security and intelligence. Our services include strategy and planning, business architecture, strategic communications, mission/technology alignment, information technology, and program management. Arc Aspicio is building a community that promotes collaboration, continuous learning, innovation, and intelligence to improve homeland security. For more information, please visit www.arcaspicio.com.

Contact Information
Lynn Ann Casey / Chief Executive Officer
info@arcaspicio.com
703.465.2060

Organization Redesign: Is the Cure Worse than the Ailment?

Organization Redesign: Is the Cure Worse than the Ailment?

According to a popular management joke, new executives should blame their predecessors when facing their first crisis.  When facing their second crisis, they should reorganize everything. Jokes are funny when they’re seen as plausible. Reorganizations show action, produce change, and create opportunities for new leadership. However, are reorganizations worth the disruption?

Arc Aspicio to Host Design Thinking Forum: Creating the Future of Government on June 21

Arc Aspicio to Host Design Thinking Forum: Creating the Future of Government on June 21

Washington, DC, June 7, 2017 — Arc Aspicio plans to host an inaugural Design Thinking Forum featuring a discussion on how Federal leaders can innovate solutions to create the future of Government. Design Thinking is a human-centered innovation process that emphasizes observation, collaboration, fast learning, visualization of ideas, rapid concept prototyping, and concurrent business analysis, which ultimately generates innovation and increased mission outcomes.

Firefighters Show You Can Develop a Strategy While Fighting Fires

Firefighters Show You Can Develop a Strategy While Fighting Fires

“Employees at all levels are too busy ‘doing their jobs’ and ‘fighting fires’ to devote time or pay heed to strategic initiatives.” It’s a common complaint. Academic literature has confirmed that ‘firefighting’ takes up much of the manager’s job and offers extensive advice on how to stop fighting fires – and even how to suppress the urge to do so.

The SILab: An Invitation to Embrace Innovation

The SILab: An Invitation to Embrace Innovation

Government agencies and businesses must embrace innovation and strategic thinking to keep up with today’s changing society, rising demands, and complex problems. Encouraging organizations to fully adopt innovative thinking, however, is difficult. Organizations are often focused on their daily activities and have limited time to discover new approaches. In addition, employees often choose to stay with proven, mainstream solutions because they fear wasting resources or failure. 

Putting the Mission First in a Leader’s Agency Reform Plan

Putting the Mission First in a Leader’s Agency Reform Plan

Agency leaders have more than a little to do these days. The Office of Management and Budget (OMB) released guidance for implementing Executive Orders and Presidential Memoranda on Federal management and human capital. The Comprehensive Plan for Reforming the Federal Government and Reducing the Federal Civilian Workforce (M-17-22) directs agencies to create comprehensive plans to enhance mission focus, streamline operations, and improve workforce effectiveness and efficiency.

SharePoint: Unique Solutions for Homeland Security Partners

SharePoint: Unique Solutions for Homeland Security Partners

As information sharing has become more common across local, state, and federal agencies, homeland security partners need tools to manage this critical data. SharePoint has emerged as an information sharing tool that can assist emergency managers, law enforcement agencies, and others across the homeland security enterprise with the sharing of sensitive data with internal and external partners, quickly and securely.

Managing Change Using a Maturity Model

Managing Change Using a Maturity Model

The pace of change is accelerating. Government agencies, and their employees, must find new ways to support their stakeholders and manage internal operations in the face of changing mission expectations and potential budget cuts. Guiding the workforce through the change is messy and challenging and is essential to successful implementation of innovative ideas, technologies, and processes. 

Lost in Translation No Longer: Data Translators Bridge the Gap to the Mission

Lost in Translation No Longer: Data Translators Bridge the Gap to the Mission

Two main types of problems can make it difficult to make data-driven decisions: technical and cultural. Technical difficulties could include data that is messy, incomplete, or split between different departments or components. Cultural factors might include a resistance to change, an environment that favors trusting your instincts, or a belief that things are fine the way they are. 

How to Use Data to Drive Employee Engagement

How to Use Data to Drive Employee Engagement

When it comes to retaining your workforce, one feature correlates to 87% increases in retention and 57% increases in employee effectiveness. It is not compensation. It is employee engagement. Engagement measures an employee’s emotional commitment to an organization and willingness to use discretionary effort to achieve organizational goals. In other words, engaged employees strive to exceed the status quo. 

A Leader’s Most Influential Tool: Gratitude

A Leader’s Most Influential Tool: Gratitude

Gratitude is one of a great leader’s most powerful tools. It creates positive energy among an organization and the sense of appreciation permeates through the work the collective group is performing. Influential leaders listen to the needs of their colleagues and express gratitude. This helps them bring out the potential in the people they lead and inspire them to achieve what is most important to them and to the project.

The Design Era of Project Management

The Design Era of Project Management

Project Management best practices and methods continue to evolve to address the biggest challenges Government agencies face in today’s market. The increased use of Agile and the move from traditional waterfall methodologies is fairly common in Information Technologies. Projects use Agile methods such as Scrum or Kanban, and organizations invest a lot of time and effort to make this cultural shift on projects.