Operation Medusa engaged nation-state activities with a law enforcement response. There are advantages and other considerations for further operations.
Category: Cyber
On Traversing Liminal Spaces in Emergency
Challenges found in traversing thresholds into new spaces are exponentially amplified when thresholds are crossed urgently in an emergency. Fortunately, we plan for emergencies. Unfortunately, nothing goes according to plan. This post considers what we look for and find when crossing under duress.
On Preventative Operational Impact Metrics 3
Creating concrete baseline measurements with Cost of Operational Impact Metrics (COIM) is the start of effective resource allocation discussions. Effectively communicating what COIM measures follows close behind. The following are COIM framing considerations and further requirements.
On Preventative Operational Impact Metrics 2
The reason to develop operational metrics is to underpin resource allocation discussions. Preventative measures do not yet have solid metrics. We need to change our measures for meaningful conversations around resource allocation. This post introduces the Cost of Operational Impact Metrics (COIM).
On Preventative Operational Impact Metrics 1
The disconnect between cyber and business is nearly religious - articles of faith for seekers of proof. Whether at a systemic or at an organisational scale, there is much to cyber business metrics. This is first of several posts on the topic.
On Ripple Impact and Operational Resilience
In supply-chain and operational resilience discussions we focus on areas within our span of control, whilst ripple impacts are felt from further. How we understand effects and engage those in our ecosystem shapes response to things not in our control.
On Creating a Unified Sector – pt.1
Public sector concepts of how organisations help mitigate systemic risk - in this example, cyber defence for their sector - are difficult to convey. Since organisational interpretations of the concept vary, complementary implementation challenges abound; usually ending with highly glossed fanfare masking minimal results. Here is the first set of considerations for organisations to become part of the solution.
Changing Cyber Landscape – Blurring Criminal/Hacktivist Lines
Not only are cyber criminals becoming bolder in their power projection, they are also diversifying into non-monetary causes. Whilst only a pebble risk for now, the potential for criminal-turned-hacktivist lends a rather disturbing picture for anyone considering the threat.
Changing Cyber Landscape – WannaCry/NotPetya/Costa Rica
In the shadow of Ukraine/Russia, a greater threat to our digital world unfolds in Costa Rica. Looking at prior shifts in the cyber threat landscape helps clearly define the current pebble and why the avalanche it creates will cause greater issues to the global ecosystem.
Cyber Impacts on Entrance/Exit
Organisations entering or exiting a market/ region have a number of constraints and obstacles to navigate. Often overlooked are ones related to cyber - both from legal and dependency perspectives. Here is what to consider.