Uncategorized

NWTP | Technology Risk Management

Once a minor component of Operational Risk, Technology Risk and its related impacts are dominant in the global risk mosaic – affecting individuals, enterprises, governments and society. Information and Communications Technology (ICT) risk embodies a complex, vulnerable Enterprise Eco-system of digital elements (operating within their larger risk-laden Industry Eco-system) than has been considered in traditional Cyber Security analyses. The coming decade will see risk from an expansive portfolio of technologies that includes:

  1. Core technologies that create, manipulate, process, store, communicate or control information, including:
    • Computers – Digital, Quantum, Memory Systems, FPGAs
    • Control Systems – PLCs, Sensors, PID SW, Digital Signal Processors
    • Local and Broadband Networks – particularly Low Latency 5G
    • Cryptography and Data Obfuscation
    • AI
  2. Application technologies and processes employing core technologies to provide or assist enterprise or personal endeavors, including:
    • Supply Chain Management, through which enterprises interact with their Industry Ecosystem
    • Privacy – PII, Enterprise Insider Information, Classified Information
    • IoT – SCADA, PID
    • FINTECH
    • Cloud
  3. Data representing Information artifacts and Real-time Control Signals and their associated Sensor Readings

Eco-systems’ integration of new and emerging technologies, applications and information artifacts, upon which agencies and enterprises rely to operate, creates a real-time, complex “systems-of- systems,” composed of thousands of interdependent components and myriad channels. They operate in a rapidly changing socio-political environment that presents threats from individual, group and state actors with shifting alliances, attitudes and agendas that – once triggered – have a runaway effect with multiple, severe, often irreversible consequences.

We cannot stop all breaches, deter potential adversaries nor afford to fund all needed security protections

  • Learn to anticipate high-impact emergent threats (skate where the puck will be – Wayne Gretzky) and evolve truly resilient systems (absorb “rope-a-dope” punches and defeat your tired and spent adversary – Muhammad Ali)
    • Model Eco-systems with a wide-angle lens – look at the whole picture from adversary to infrastructure to business unit operations to enterprise exposure to shareholder/stakeholder value and volatility
      • Integrating digital HW/SW behavior models with actors’ behavior models and financial models to uncover systemic risks from propagating
    •  For which there are individual tools and model integration methodologies.
  • Quantify Enterprise Risk consequences in well understood Financial, Mission and Reputation/Trust consequences to enable enterprise risk triage:
    • Among and between high impact and low impact (acceptable) technology risks
    • Among and between technology and non-technology enterprise risks

Author:

  • Bob Gardner, Founding Partner, New World Technology Partners

Compliments of New World Technology Partners – a member of the EACCNY.