Heads up! X PRIZE Foundation CEO Peter H. Diamandis will be interviewed on John Stossel’s special, “No, They Can’t,” tonight Friday April 6, 2012 at 10 p.m. EDT / 7 p.m. PDT on Fox News Channel. Peter will be discussing how incentivized competition has led to major technological breakthroughs in the past decade, all without taking any taxpayer funds.
Then if you enjoy this or maybe miss it I recommend getting in on next week’s Abundance webcast:
A webcast, live from Singularity University at the NASA campus in Mountain View, California, on April 11, 2 - 3 PM Pacific Standard Time (5 - 6 PM Eastern Standard Time).
Get answers to your questions during this live webcast and find out for yourself why and how a future of abundance is within your reach:
- How could the world be getting better when TV news has been telling you otherwise?
- Where is the hard proof for this hope and optimism?
- What are the next billion dollar startups that you can build to create a future of abundance for yourself and the world?
- What are the latest breakthroughs in technology, innovation and worldwide trends that you do not know about? That you can take advantage of?
- And more questions from you!
To participate:pre-register and log-in at www.SingularityU.org/WhichWayNext
To submit questions: In advance via Twitter (#whichwaynext) or during the live webcast.
Let me know what you think of the events!
Yesterday I had the pleasure of attending “Supply Chain Security - Do you know who your insiders are?” by Bob Hutchinson, Senior Manager, Sandia National Laboratories’ Information Security Sciences Group.
The key aspect of his presentation that I took away was the National Labs’ ability to control and prevent compromise of the Nuclear Weapons supply chain. And that the lessons learned from almost 7 decades of experience could be applied to the supply chain risk of Information Technology. We’ve solved most problems before it simply takes effort to find where.
This analogy led me to investigate a bit more and I discovered Bob’s statement to the United States House of Representatives Committee on Energy and Commerce, Subcommittee on Communications and Technology. His 4 key points are:
- While strategic data theft of intellectual property and national secrets has become a focus recently do not lose sight of the malicious data modification threat.
- Examine and be aware of your Information Technology aspects of your supply chain; from the software applications and patches to the sub-components of each piece of hardware (and it’s obvious supporting software -firmware).
- While developing the manner and mechanism for Cyber information sharing between Government and Industry there must be a strategy associated with it. This strategy could then be used to assist in an adversary “self-identifying.”
- Identifying the Nation’s noted “profound shortage of qualified cyber security experts.” He adds that having been tasked by DoE, Sandia to has built “a program that’s more like a medical residency than a trade certification” and that this model is much more appropriate to creating the requisite cyber security experts for the nation.
If you’re reading this blog and don’t know who Bruce Schneier, shame on me for not introducing him earlier.
With heavy roots in Cryptography he is a current day leader in security, especially in the information realm. I recommend checking out his blog (and it should be required if you work in this sector). He has written a whole host of Books including Liars and Outliers: Enabling the Trust that Society Needs to Thrive which was just released in February, 2012.
Some of the things Bruce points out in the video above is that we overestimate risks in environments we do not control. Remind you of what is going on with cyberspace and my recent comments? He also notes that in security “feeling must equal reality” in order to be both secure and successful. I have felt this way for several years but had yet to qualify it in this succinct manner. I fully agree that in order to really accomplish security the equation must look like this:
Feeling of Security = Security Reality
If this equation is biased toward one side of it or another you have an offset that will ultimately lead to a security failure. What do you think of this philosophy and equation?
Follow A Cyber Fellow on Twitter!
"Yesterday Apple Fixed A Bug In iOS 7. It’s A Doozy" http://t.co/3lZ2UVsEKW
"ICYMI: Rackspace president on why cloud is important but it’s not everything" http://t.co/SDcbGLsrtk
"Ustream launches nonprofit program to support citizen journalism in Ukraine and beyond" http://t.co/YzEqnXnq1y