Source: https://www.linkedin.com/feed/update/urn%3Ali%3Ashare%3A6949778331428954112
Building Post-#AI-#Quantum #WellArchitected #Cloud #Networks: Following on continuing dialog in #AWS #Partners global sessions, recently across from #London (UK) & #Sydney (Australia): Why does #AWS focus on #Risk, as we have focused on it going back to the beginning of the WWW in early 1990s?… AWS is doing a great job in helping all recognize #Risk-#Return as two sides of the same coin as we have done with focus on integrating #Agility AND #Resilience for leading #Digital #Innovation AND #Cost-#Optimization with #Leading #Business #Performance.: https://lnkd.in/esk8PEp :
National Association of Insurance Commissioners (NAIC) #Expert #Paper and #Post-#Doctoral #Cybersecurity #Network #Security #Engineering #ArtificialIntelligence #MachineLearning #Quant #Cyber #Crypto #Quantum #Quant #Finance & #Risk #Computing & #Resilience #Engineering Thesis (2015): https://lnkd.in/gyQSx6n : https://lnkd.in/ea27wsh :
Beyond #Cliche to #CommonSense
‘What gets measured gets managed.’ – Peter Drucker
‘What gets mismeasured gets mismanaged.’ – Dr. Yogesh Malhotra
#Trust #Distrust #ZeroTrust #AssumeBreach
From #trust #computing perspective, every component of #software, #hardware, #firmware, or #networks that interacts with any other upstream or downstream second-party or third-party #provider, #vendor, or #contractor is #vulnerable and #exposed. Given known #infiltration and #compromises through #spear #phishing and #whaling at the most senior echelons of world #governments and global #firms, no one is safe including heads of governments and heads of corporate firms.
How #Risk #Contagion’s #Spread Across #Global #Trust #Networks: Published & Presented 6-Yrs Prior to #COVID:
Once compromised, any such #trusted #user regardless of the status on the respective hierarchy can become the channel of #contagion that can compromise the complete #network of #trust as well as all other trusted users on those #networks. Taking the process a step further beyond inter-#enterprise focus to intra-#enterprise focus, any compromised #trusted #network can become the channel for infiltration of the #trusting #network. Hence, across diverse #networks, any #entity or #device trusting any other #network which can be compromised can become potentially #vulnerable and after being #compromised becomes a #carrier that can result in other devices being #compromised. Once compromised, the exposed #network, #device, and/or #entity serves as a channel for #transfer of #economic #value or #destruction of #economic #value in the online #cyber #war #game.
#Everyone is a potential #target, potential #accessory, or even a potential #source of #attack, even when they are unwilling or unknowing participants in any given #attack or a ‘ #network of #attacks ’.
AWS Partner: Cloud Ventures: Silicon Valley-Wall Street-Pentagon: Global Risk Management Network LLC