Tuesday, October 30, 2012
An Update on My "Secrets Stolen/Fortunes Lost" Co-Author Christopher Burgess
In case you missed it, my Secrets Stolen, Fortunes Lost co-author, Christopher Burgess was featured in a recent Forbes Magazine article on What Do Former CIA Spies Do When They Quit the Spy Game?
Upon retirement after thirty years with the Central Intelligence Agency, in various position including Station Chief, Burgess, was awarded the Career Distinguished Intelligence Medal, the highest level of career recognition. After retirement, he took on important roles in the private sector, first as Senior Advisor to Cisco Chief Security Office (CSO) John Stewart, and then as CSO himself at Atigeo. In the Forbes piece, Christopher shares some insights on his transition:
One [skill] that served me well was my ability to collaborate. That’s a huge skill for a field officer. Everybody on a team has something to contribute and you have to truly recognize and believe that. Another skill is a technique common to planning intelligence operations: building in ‘fall back positions’ and alternate routes while mapping out how to attain a goal. In Agency operations, things go wrong and you have to have backup plans. Also in the corporate world, whether you are selling a widget or consulting, competitors will surprise you. Dealing with that surprise, keeping your cool when all about you are losing theirs, definitely came from Agency training. Another key skill I developed in the Agency was creating loyal workforces, which yield outstanding results. A big part of that is knowing exactly what you are asking someone to do. If you don’t know from personal experience, you cannot be shy about asking them to give you feedback on their probability of success in a risky operation. Art Keller, What Do Former CIA Spies Do When They Quit the Spy Game? Forbes, 10-12-12
As I have mentioned in previous posts, this year, in CSO Magazine, I have been focusing on interviews with C-level executives, who also happened to be thought-leaders. (Surely, you have noticed that "C-level executives" and "thought leaders" are not straightforward synonyms?)
In the first of these interviews (fourth one coming soon), Christopher and I discussed a range of vital issues, but of course we started with a look back at our collaboration on Secrets Stolen/Fortunes Lost:
My 30,000-foot perspective has not changed since we co-authored Secrets Stolen, Fortune Lost — every company (emphasis intended) regardless of locale has the potential to fall into the sights of an entity or individual who has designs on their assets. The company can choose to educate or not educate their workforce to this reality. Sadly, I continue to see far too many companies operating as if they are immune from falling into the cross-hairs of someone's targeting scheme because they aren't engaged in national security work — they equate economic espionage and IP theft to only those in the national security vertical. While I don t disagree the nation state vector is one about which we, collectively, must pay attention; the individual, the competitor and the criminal vectors also warrant every company's attention. How to meet the challenges of 21st century security and privacy, CSO Magazine, 4-18-12
NOTE: You can find links to all my CSO Magazine articles in the CyBlog sidebar.
Christopher Burgess is also one of those experts from business and government (in this instance, it's a twofer!) who have delivered CyLab Seminars in the context of my Business Risks Forum. He has given two Seminars, one in 2010 and one this year.
Access to the webcast and online archive of the CyLab Seminar series is an exclusive benefit available only to CyLab Partners. But from time to time, we release select seminars, and excerpts from seminars, via You Tube and iTunes to both promote our program and contribute to the public dialogue on the vital issues of cyber security and privacy.
Here are embedded videos of both of Burgess' CyLab Seminars. Enjoy.
CyLab Business Risks Forum: Christopher Burgess - Collaborative Distributed Inferencing (2012)
CyLab Business Risks Forum: Christoper Burgess - Common Sense Approach to Social Media (2010)
Monday, October 29, 2012
CyLab Researchers Discuss Code 2600, Award-Winning Cyber Crime Documentary with Filmaker Jeremy Zerechak
CyLab Researchers Discuss Code 2600, Award-Winning Cyber Crime Documentary
with Filmaker Jeremy Zerechak
Carnegie Mellon University CyLab recently hosted two screenings of CODE 2600, an award-winning full-length documentary on the societal implications of cyber security and cyber risk.
These evening screenings were preceded by a special CyLab Seminar Series event: a panel discussion in which
three CyLab researchers, Lorrie Cranor, Nicolas Christin and Norman Sadeh, joined filmmaker Jeremy Zerechak
for a discussion of the film and the important issues it highlights.
three CyLab researchers, Lorrie Cranor, Nicolas Christin and Norman Sadeh, joined filmmaker Jeremy Zerechak
for a discussion of the film and the important issues it highlights.
Dr. Cranor, who moderated the panel, was among numerous cyber security and privacy experts interviewed in the documentary, others included: world-class cryptographer and security commentator Bruce Schneier,
BlackHat and DEFCON founder Jeff Moss, leading security iconoclast Marcus Ranum and Jennifer Granick,
Here is the full video of the panel discussion, beginning with a clip from the film:
For more compelling videos on cybersecurity and privacy, visit the CyLab You Tube Channel and
CyLab iTunes Store. The content is free!
Labels:
Code 2600,
Cyber Security,
Cyberwar,
CyBlog,
CyLab,
Lorrie Cranor,
Nicholas Christin,
Norman Sadeh
Thursday, October 18, 2012
Sample Some Fruits of CyLab Mobility Research Safeslinger for Secure Smartphone Communications. It's FREE!
Sample Some Fruits of CyLab Mobility Research, e.g., Safeslinger for Mobile App for Secure Smartphone Communications. It's FREE!
By Richard Power
CyLab has seven major research thrusts (as seven cross-cutting research thrusts); Mobility is one of those seven major research thrusts. And CyLab research isn't locked away in some ivory tower of abstraction; no, it is impacting security in the here and now.
Safeslinger, developed by Mike Farb, Adrian Perrig, Jonathan McCune and other CyLab team members is an excellent example.
This video, available via the CyLab You Tube Channel illustrates the how and why.
More on Safeslinger from CyLab Online
CyLab Chronicles: Mike Farb Offers Insights Into SafeSlinger, CyLab's Powerful New Smartphone App
CyLab's New Smartphone App, SafeSlinger, Empowers Users' to Strengthen Their Own Security and Privacy
SafeSlinger App for Mobile Devices
SafeSlinger: An Easy-to-use and Secure Approach for Human Trust Establishment
CyLab Chronicles: Q&A with Mike Farb (2011)
CyLab Researchers Release KeySlinger, Security App for iPhone and Android
Labels:
Cyber Security,
Mobile App,
Mobility,
Safeslinger,
Smartphone
Subscribe to:
Posts (Atom)