Building Post-#AI-#Quantum #WellArchitected #Cloud #Networks: Following on continuing d. . .

Source: https://www.linkedin.com/feed/update/urn%3Ali%3Ashare%3A6949778331428954112

Building Post-#AI-#Quantum #WellArchitected #Cloud #Networks: Following on continuing dialog in #AWS #Partners global sessions, recently across from #London (UK) & #Sydney (Australia): Why does #AWS focus on #Risk, as we have focused on it going back to the beginning of the WWW in early 1990s?… AWS is doing a great job in helping all recognize #Risk-#Return as two sides of the same coin as we have done with focus on integrating #Agility AND #Resilience for leading #Digital #Innovation AND #Cost-#Optimization with #Leading #Business #Performance.: https://lnkd.in/esk8PEp :

National Association of Insurance Commissioners (NAIC) #Expert #Paper and #Post-#Doctoral #Cybersecurity #Network #Security #Engineering #ArtificialIntelligence #MachineLearning #Quant #Cyber #Crypto #Quantum #Quant #Finance & #Risk #Computing & #Resilience #Engineering Thesis (2015): https://lnkd.in/gyQSx6n : https://lnkd.in/ea27wsh :

Beyond #Cliche to #CommonSense

‘What gets measured gets managed.’ – Peter Drucker
‘What gets mismeasured gets mismanaged.’ – Dr. Yogesh Malhotra

#Trust #Distrust #ZeroTrust #AssumeBreach

From #trust #computing perspective, every component of #software, #hardware, #firmware, or #networks that interacts with any other upstream or downstream second-party or third-party #provider, #vendor, or #contractor is #vulnerable and #exposed. Given known #infiltration and #compromises through #spear #phishing and #whaling at the most senior echelons of world #governments and global #firms, no one is safe including heads of governments and heads of corporate firms.

How #Risk #Contagion’s #Spread Across #Global #Trust #Networks: Published & Presented 6-Yrs Prior to #COVID:

Once compromised, any such #trusted #user regardless of the status on the respective hierarchy can become the channel of #contagion that can compromise the complete #network of #trust as well as all other trusted users on those #networks. Taking the process a step further beyond inter-#enterprise focus to intra-#enterprise focus, any compromised #trusted #network can become the channel for infiltration of the #trusting #network. Hence, across diverse #networks, any #entity or #device trusting any other #network which can be compromised can become potentially #vulnerable and after being #compromised becomes a #carrier that can result in other devices being #compromised. Once compromised, the exposed #network, #device, and/or #entity serves as a channel for #transfer of #economic #value or #destruction of #economic #value in the online #cyber #war #game.

#Everyone is a potential #target, potential #accessory, or even a potential #source of #attack, even when they are unwilling or unknowing participants in any given #attack or a ‘ #network of #attacks ’.

AWS Partner: Cloud Ventures: Silicon Valley-Wall Street-Pentagon: Global Risk Management Network LLC

Share this post
Avatar photo

Silicon Valley's 'Next Big Thing': "Do Something Epic: Save the World™": "Venture capitalist Roger McNamee recently implored Silicon Valley to embrace human-driven social networks that empower rather than exploit users as the Next Big Thing. Having pioneered such networks, we were invited to guide Silicon Valley three decades or so ago on building Digital enterprises for the Wild Wild Web*. Today, we are ready to again lead Silicon Valley to further advance human-driven technologies in collaboration with the AFRL..." - Dr. Yogesh Malhotra, Founder, AWS-Quantum Valley™: BRINT.com Know-Build-Monetize™ Networks: YM-ABC™: YogeshMalhotra.com: AIMLExchange.com : BRINT.com : C4I-Cyber.com