#45 – MAKING DECISIONS THAT WORK FOR YOU! – ED PERKINS

OLYMPUS DIGITAL CAMERAThere is a lot of literature written on decision making, ‘how to’, best practices, process, factors and so to follow to make ‘good’ decisions.  We have been exploring ‘risk based’  decision making in these blogs.  We have looked at factors, process, frameworks, psychology and bias.

But we have not discussed perhaps the most important aspect of any decision – implementation or that double edged word ‘execution.’  (Of course this assumes that the decision maker wants something to actually happen as a result of the decision, but that is a topic for another day).

Let’s use the nicer word – Implementation – which implies there is a course of ACTION, with a timeframe for results to be produced or to occur. Continue reading

#25 – CYBER RISK FRAMEWORKS – ED PERKINS

OLYMPUS DIGITAL CAMERAThe US Federal government folks in the Computer Security Division (CSD) at National Institute of Standards and Technology (NIST) have been hard at work on the Cybersecurity Framework deliverables for the President’s February Executive Order 13636, on Improving Critical Infrastructure Cybersecurity. (see prior Insights post).  NIST has created a web portal for the Framework at http://www.nist.gov/itl/cyberframework.cfm .  The NIST CSD portal is http://csrc.nist.gov/. Continue reading

WEBINAR – CYBER – #1 GLOBAL THREAT – DR. CAROLYN TURBYFILL & ED PERKINS

ITMPI Webinar Series:  https://www.itmpi.org

Free, Live, PDU Accredited Lectures
2013 Program Schedule:  https://www.itmpi.org/ITMarketplace/AdvancedITCourseware.aspx
Click Here to View our Webinar Recordings:
https://www.itmpi.org/ITMarketplace/WebinarRecordings.aspx

All LIVE Webinars are accredited with 1 PDU credit. Courses and PDU’s are provided by CAI (REP #2733)

The #1 Global Threat: Cyber

July 16, 2013
11:00 AM – 12:30 PM EST
PDU accredited
Presented by: Carolyn Turbyfill

The global threat environment is changing. This environment is demanding re-evaluations of the way we do business, expanding our analytical envelope, and altering the vocabulary of intelligence. Cyber threats are more diverse, interconnected, and viral than at any time in history. Attacks, which might involve cyber and financial weapons, can be deniable and un-attributable, In this webinar, Dr. Carolyn Turbyfill will present an overview of global cyber challenges, threats and then discuss enterprise risk management (ERM) solutions in terms of cyber standards development, new cyber management systems/taxonomies, and cyber risk management/assurance/control methodologies.

#17 – RISK DECISIONS AND HUMAN NATURE – ED PERKINS

OLYMPUS DIGITAL CAMERAOne area that does not receive much emphasis in risk management is the human factor.  In risk assessments, risk events, likelihoods and consequences, vulnerabilities are the usual focus.  People are viewed as ‘weak links’ in risk prevention, but what about risk mitigation?  Your risk planning depends on people to respond when an event occurs. How good is their risk decision-making under stress?  There is the weak link. Continue reading

FAA Next Gen Air Traffic Control System at Risk? – Ed Perkins

OLYMPUS DIGITAL CAMERARecent headlines have claimed that because the FAA Next Gen air control system uses unencrypted GPS signals, the system can be attacked, with false signals sent to planes in midair. These claims were made by a self-styled “cyber hacker” on CNBC on Monday June 3. CNBC had contacted the FAA but a spokesman told them the agency has an ongoing risk process in place and that any such identified risks were “security sensitive”. See the CNBC  report online at http://www.cnbc.com/id/100784103 CNBC interviewed an expert on navigation systems, Prof. Todd Humphreys of UT, who told CNBC: “It ought to be obvious to the FAA. This is an obvious problem. This is something that’s using antiquated technology from the 1980s.” Continue reading