AiiA December roundup on: Industry
Thought provoking pieces on what affects you
Add bookmark2019 experienced some highs and lows across industries. With an emphasis on cybersecurity, this December roundup includes several resources intended to successfully guide your enterprise into 2020.
Auto
As the world becomes increasingly driven by embedded systems, achieving safe, secure, and reliable software has never been more important.
In this webinar series, Perforce will explore the common challenges that are shared across multiple industries, look at how automotive industry software development best practices can be effectively applied to your process as well, and share our perspectives on future standards and development practices.
At a glance, here is what is covered in the Perforce webinar:
- Tech Mega-trends
- What Happens When Things Go Wrong?
- Common Themes and Industry Standards
Switching from ICE power to eMotors and fuel tanks to batteries is not the work of a moment – the advent of electric vehicles requires a ground-up rethink of all of a car’s components.
This article covers:
- The main developments in optimised bearings and how can they boost electric motor performance
- Hybrid ceramic bearings
- Tapered roller bearings
- Needle roller bearings
As nascent technologies increasingly encroach on science fiction, the motor industry finds itself navigating uncharted territory.
Not only are the technologies often unproven, but consumers are also uneducated as to the intricacies and nuances of this rapidly unfolding chapter in the book of transportation. Sometimes with fatal consequences.
In this article:
- Regulators take a stand in the interests of safety
- When is an EV not an electric car?
- Educating the consumer empowers informed decision-making
Cybersecurity
Reflecting on the past 12 months of enterprise cyber security incidents, there was no single attack vector and no one-size-fits-all security solution. We compiled the most common attacks faced by organizations as well as the tips, tricks and strategies for thwarting a data beach, including:
- Strengthening security against credential stuffing attacks
- Brand and executive impersonation
- Third-party security posture & insider threats
- Ensuring your database is secured
- Avoiding password spraying attacks
- Incident response and remediation
The concept of the cloud opposes the previous practice of local-server and/or personal computer (PC) storage. Each of the various cloud types (public, private, multi, hybrid) offer enterprise cost benefits, as well as other efficiencies (e.g., steadier output, more storage (external), economies of scale, default security settings, etc.).
Yet, the cloud has also morphed into an entry point for threat actors. In fact, cloud computing, in an unsecure state, drastically widens the attack surface, offering hackers the upper hand in an end-to-end battle that has ensued for years. This article asks, are enterprises ready?
In the world of cyber security, asset management has taken a back seat to security optimization topics like threat hunting, deception and automation. But the foundational challenges of understanding what devices, users and cloud instances are in enterprise environments have jumped to the top of CISOs priority lists. The Cyber Security Digital Summit session looked at the challenges around making sure all assets comply with security policies.
The session also addresses:
- How to get a complete asset inventory using the tools companies are already using
- How to uncover security solution coverage gaps
- How to automate policy validation and enforcement
- How modern asset management is evolving in 2020
- Which particular types of organizations are the most progressive with asset management
- How organizations can avoid information overload while on-boarding new assets
- Trends associated with cloud and vulnerability management impacting the value of asset management
Watch this Cyber Security Digital Summit session on-demand now.
Security leaders are often challenged to keep their department focused on priorities and business objectives. As a result, they don't get many chances to ask other stakeholders in the organization about how they can work together more effectively.
Cyber Security Hub editor Jeff Orr and HR Exchange Network editor Mason Stevenson recently had the chance to have this exact this discussion: If you could ask your CISO / CHRO counterpart a question to make their relationship better, what would it be?
The outcome is this video of the editors sharing the wisdom of their reader networks.
Recent years have seen breakthroughs in the use of machine learning algorithms for enhancing business operations beyond the human capacity. Huge benefits have been achieved in fields like autonomous vehicles, healthcare, data analytics and others. These benefits are also being adopted by hacker groups and nation states.
2019 wasn’t a great year for cyber security. Although the number and scope of solutions available on the market increased, blue teams around the globe have been stymied by the increasing complexity and tactics of threat actors and the sheer volume of data to review. Here are four predictions for the coming storm, based on events in 2019 detailed in this article:
- Information warfare
- Manufacturing in China
- Bespoke ransomware campaigns
- Cyber insurance carriers will exit
The history of network security efforts has primarily been focused on protecting connections to and from the network. After several years, threats began to shift and new threats required traditionally separate security tools to work together, to inspect and secure data.
Today, as society continues to shifts towards a digital economy, security tools that can effectively defend against new threat paradigms are only as effective as the threat intelligence behind them thus, the race between IT professionals and cybercriminals continue.
A theme of Human vs. Machine: The Competitive Advantage Is Balance shaped the topics presented to CISOs based on the following market observations:
- The scale and sophistication of attacks continues to increase
- Cyber-attackers have access to emerging technology, such as cloud services and machine learning
- Automation enables business to scale security faster and more efficiently than adding more analysts
While it is impossible to recreate the peer sharing taking place at CISO Exchange and the fundamental message of “you’re not alone on this cyber journey”, here are some of the highlights from the first day presentations and talks:
- Views from the cyber sandbox
- Encouraging enterprise mindset shifts about the cyber mission and talent
- Going passwordless to improve user experience
The explosion in the number and types of devices on corporate networks has created two massive security challenges: visibility and fragmentation. That, coupled with so many competing priorities, means that all new projects taken on by information security teams need to be prioritized around risk, capabilities, and ROI.
So much information exists to ensure that assets adhere to company policy, but the challenge is that all of this data lives in different silos.
This Axonius whitepaper illustrates how:
- To ensure all assets are in compliance within existing security policies
- It’s possible to decrease the mean time to inventory and provide calculations enabling you to draw your own conclusions
- Risk is dramatically decreased by truly having control over assets in your environment
In the face of multiple, conflicting priorities the natural human reaction is to delay selection and implementation until an obvious path is identified. Enterprise security teams do not have the luxury of putting off InfoSec decisions.
In cyber safety, sometimes short-term fixes are used without in-depth analysis into the root cause of the issue.
An organization feels certain symptoms—numerous vulnerabilities on systems or poor cyber practices of people within their organization—and often looks to bandage solutions such as tools and technologies to fix its issues, without conducting a truly in-depth analysis of what these symptoms might reveal regarding underlying causes.
This article talks about:
- Getting at the root cause
- Building a culture that supports cyber safety
- Taking a bird’s eye view
Organizations face numerous potential threats to their organization, their data and their employees. Many security teams start by building walls to block everything, while using the time to create a critical infrastructure strategy.
Even with all these defenses, hackers are still able to exploit organizations. And oftentimes, they go undetected in your network for an extended period of time.
Wouldn’t it be better to prevent these attacks by observing them within your own environment before a cyber-attacker breaches your defenses and runs an exploit kit? The best way to understand your enemy is to be your enemy.
This presentation discusses:
- How to identify IT hygiene issues in real time
- Prerequisites for starting Red Teaming and Blue Teaming
- Why Red Teams struggle to keep up and how automation can help
- Assessing the role of simulation and automation in parallel to the evolving of the Red Team
- Creating a strategy that not only simulates the initial exploit, but also addresses the lateral movements of attackers once they’re inside.
On the eve of California’s Consumer Privacy Act (CCPA) legislation taking effect, large software companies are announcing that protections under these laws are being extended to all of their U.S. customers.
Cyber Security Hub enlisted the help of security and data privacy legal expert Jamal Hartenstein to put the announcements into perspective for enterprise security leaders. We examine if this a case of promoting self-serving interests for software makers or if there is more than another compliance obligation at hand, including:
- Size matters in navigating privacy regulation
- The early CCPA policy announcements that mean floodgates are set to burst
- The criticism of California’s torchbearer role in outpacing federal legislation
- A balancing test for data privacy approaches: opt-out versus consent
- Predictions for the future of U.S. data privacy legislation
The Axonius team mined its customer data to identify the five most-common asset management challenges and proceeded to articulate the organization’s challenge and tactics available to tackle the scenario. There is a consistent framework to do cyber security asset management well and this resulted in a 6-step checklist for successful asset management.
Additional questions addressed in this webcast:
- What are the top 5 asset management challenges faced by enterprise security today?
- How to use a 6-step checklist for successful asset management
- What are the characteristics of companies that do asset management best?
- The best sources for data to perform asset management
- How to position asset management amongst the myriad of cyber security projects and priorities
Security professionals face several challenges today when it comes to enterprise cyber security asset management from aggregating disparate data sets or establishing real-time visibility in a fluid environment. Emerging technology, such as IoT deployments, only complicate this situation further.
Organizations must understand the depth and breadth of the devices on their network. Consistent capture of security incidents are needed while utilizing as few resources as possible.
What trends are shaping the future? What should be top of mind as you plan for 2020? How can an organization begin to approach tackling asset management?
Cyber Security Hub hosted a webinar with Axonius CEO and Co-Founder Dean Sysman and CMO Nathan Burke as they examine real-life use cases across various industries to answer these questions.
Attendees will learn:
- What trends are shaping the future of cyber security
- The top five challenges to consider when approaching asset management
- The 6 steps to successfully manage your company’s assets
- What should be top of mind as you plan for 2020
FinTech
The past is over. Its race is run. Vol. 5 averts its eyes from the ugly form of yesteryear, and looks to the aesthetic future. A future of digital first finance, mobile apps and flying cars (possibly). But why change a winning formula just because talk of the past is turning to talk of the future? No. Continuity is king. To provide balance and contrast, the future must be dealt with in precisely the same way as the past.
Included in this volume:
- Let’s start at the beginning. Or the beginning of the acronym. Google
- A is for Amazon. Well, the first A is
- The F word. Facebook
- A, number two. Apple. And that’s sequential, not preferential
Pharma
Across the biopharmaceutical manufacturing industry, companies have reached different stages in their digital transformation journey. The industry is known for being conservative, so it is not surprising that there has yet to be a quick adoption of digital technologies in manufacturing.
As product and process complexity continues to increase, it is becoming clear that technology cannot be overlooked if companies want to bring products to market in a cost-effective and efficient way.
This article covers:
- The challenges holding back digital transformation
- Critical success factors for digital initiatives in manufacturing
Advanced technologies have accelerated the pace of change within the healthcare industry.
Artificial Intelligence (AI) and Machine Learning (ML) offer new abilities for practitioners across research, diagnosis and treatment. The scope of applications are wide-ranging, from the simple automation of critical but repetitive tasks to the creation of complete synthetic control arms for clinical trials.
With 75 per cent of healthcare enterprises planning to execute an AI strategy in 2020, we asked six members of the Pharma IQ community to share their insight on how technology is set to change the efficiency and effectiveness of healthcare practitioners.
Due to their direct impact on the health and even lives of patients, quality control and quality assurance are of paramount importance in the Life Sciences industry. All stakeholders; government agencies, manufacturers, distributors and healthcare professionals therefore take the issue of quality very seriously.
We asked these 5 questions to Alban van Landeghem, Sr. Life Sciences Business Consultant at Dassault Systèmes about Total Quality, a concept of high priority for Life Sciences solutions at Dassault Systèmes:
- What is Total Quality?
- What does Total Quality consist of?
- What is needed for Total Quality?
- What is the role of Data Integrity in Total Quality?
- How do you guarantee Data Integrity?
Defence
Download this Disruptive Technology for Defence Transformation 2019 Post-Show Report, which includes detailed analysis from Defence IQ’s Conference Chairmen, President and Roundtable Leaders.
Included in the report:
- Foreword from our Conference President, General Sir Richard Barrons (Ret)
- Conference Takeaways from our Chairmen, Vice Admiral Duncan Potts (Ret), Lieutenant General Sir Mark Poffley (Ret) and Air Marshal Sir Graham Stacey (Ret)
- Roundtable Leader write ups, covering Blockchain, Air, Land and Maritime Capability, Space Systems, Big Data, Offensive Cyber, Network Resilience and Agile Acquisition
- Attendee Metrics
This paper was written by Robert J. Bunker, Adjunct Research Professor, Strategic Studies Institute, US Army War College Copyright © 2019
Augmented reality (AR) and virtual reality (VR) represent cross-dimensional components of advanced—aka 5th dimensional—battlespace. They can be viewed as core disruptive technologies that will have increasing defence implications related to both conventional and unconventional forms of warfighting, as well as the training of military forces, from the 2020s onward.
This article discusses:
- AR, VR and the Cross-Dimensional Battlespace
- Understanding Augmented Reality
- Understanding VR
- The Actual/Potential Militarization of Augmented Reality and Virtual Reality
The manoeuvre force is embracing the concept of digital transformation and identifying, funding and delivering digitized armoured fleets which are optimized for the joint all-domain operational environment.
Against this backdrop, Defence iQ is pleased to publish this whitepaper on ‘Manoeuvre in the Digital World’, which is designed to address the impact of digitization processes and digital technologies on the contemporary armoured manoeuvre force. This topic will explored in more detail at our annual event in January, International Armoured Vehicles.
The recent NATO Engages summit was a 70th birthday to remember. This summary discusses the challenges confronting NATO, disruptive technologies like AI and hypersonics, hybrid threats emanating from the cyber and information domains, and of course Great Power competition and the evolving political, economic and security ramifications of Russian and Chinese activity in the North Atlantic
Oil & Gas
Discussing issues raised in the recent OPEX 2019: The drive towards operation excellence in oil and gas whitepaper, Martin Richards, Senior Director of OpenText, talks to Oil & Gas iQ about what digital transformation means for OPEX in the oil and gas industry, offers his advice for those attempting to implement an OPEX strategy to manage their data and analytics and shares his views on data accessibility.
Richards also talks about aging assets and how oil and gas companies can ensure OPEX, as well as sharing his advice on how to implement an effective OPEX strategy to reduce costs and enhance customer experience. Listen below to find out more.
This infographic looks at operational excellence in the oil and gas industry, digital transformation, data and analytics, workforce issues and managing aging assets