61
Agility and Security Imperatives in tension

Agility and security

Embed Size (px)

DESCRIPTION

Slides for a talk at the FIRST / CEP round table meeting on 11/12/10 in NYC. I will post my speaker notes elsewhere.

Citation preview

Page 1: Agility and security

Agility and Security

Imperatives in tension

Page 2: Agility and security

Agility

Security

Page 3: Agility and security

• The Network Age• Network Age Enterprise• Agility and Emergence• Some Thoughts on Risk

Page 4: Agility and security

Meta Context

Industrial -> Information (Network) Age

Page 5: Agility and security

From: http://www.industrialrevolutionresearch.com/images/factory.gif

Page 6: Agility and security

From: http://www.nyc-architecture.com/LM/Ellis_island(1).jpg

Page 7: Agility and security

From: http://www.mkbergman.com/date/2006/07/

$

Page 8: Agility and security

From: http://theformofmoney.blogharbor.com/blog/_archives/2009/3/24/4131366.html

Page 9: Agility and security

From http://www.humanthermodynamics.com/watt-engine.jpg

Page 10: Agility and security

From: http://history.cultural-china.com/en/34History7223.html

Page 11: Agility and security

From: http://www.goldenswamp.com/2009/08/22/educations-reductionist-flaw-is-like-the-digesting-duck/

Page 12: Agility and security

http://www.lamag.com/featuredarticle.aspx?id=13526&page=2

http://www.computerhistory.org/internet_history/internet_history_70s.html http://www.livinginternet.com/i/ii_kahn.htm

http://www.velocityguide.com/internet-history/lawrence-roberts.html

http://www.let.leidenuniv.nl/history/ivh/chap2.htm

Page 13: Agility and security

http://www.fmsasg.com/SocialNetworkAnalysis/

Page 14: Agility and security

http://www.web-censorship.org/congratiolation-piratpartiet-pirate-party/

Page 15: Agility and security

http://farm3.static.flickr.com/2027/2449663234_ea24706dc8_o.png

Page 16: Agility and security

http://www.opensource.org/

Page 17: Agility and security

http://itunes.apple.com/us/app/seeclickfix-plus/id348529764?mt=8

Page 18: Agility and security

http://www.how-why.com/ph510/index.html

Page 19: Agility and security

http://www.ukuleleman.net/uploaded_images/Bush%20Faces%20of%20the%20dead-795931.jpg

Page 20: Agility and security

The Corporate Enterprise

In the Network Age

Page 21: Agility and security

http://www.acsu.buffalo.edu/~jconte/Images/Sheeler_American_Landscape.jpg

Page 22: Agility and security
Page 23: Agility and security
Page 24: Agility and security

http://swik.net/Technology-News+infrastructure

Page 25: Agility and security
Page 26: Agility and security

http://worldwidegoodnews.com/blog/?p=194

Page 27: Agility and security

http://connect.in.com/gravitational-force/photos-gravitational-20force-13347ed2bc4673f6.html

Page 28: Agility and security

http://www.calacirian.org/?p=725

Page 29: Agility and security

Becoming Agile

(and Emergent)

Page 30: Agility and security
Page 31: Agility and security

Intentional Emergence

Surroundings

Page 32: Agility and security

Generativity = “a system’s capacity to produce unanticipated change through unfiltered contributions from broad and

varied audiences.”

Page 33: Agility and security
Page 34: Agility and security
Page 35: Agility and security
Page 36: Agility and security
Page 37: Agility and security

http://21gov.net/about/press-release/

Page 38: Agility and security
Page 39: Agility and security

Thoughts on Risk

Page 40: Agility and security

Consumerization of IT Interconnected networks

Integrated suppliers

Outsourcing Identity

App prolilferation

Transactional relationships

Third party contractors

Page 41: Agility and security

http://www.walyou.com/blog/2008/10/05/usb-security-gadget-lock-up-your-gadgets/

Page 42: Agility and security

Work pushed here

Page 43: Agility and security

http://complexity.orconhosting.net.nz/history.html

Page 44: Agility and security

“…information is important as a stage in the continuous process by which we observe the outer world, and act effectively upon it.” … “There is no Maginot line of the

brain.”

“In anything like a normal situation, it is both far more difficult and far more important for us to ensure that we have an adequate knowledge than to ensure that some

enemy does not have it.”

“We need to emphasize our ability to observe and process the world, rather than protect what we know.”

Page 45: Agility and security
Page 46: Agility and security

Bias toward Safe Enablement

Page 47: Agility and security

http://www.mxcsoft.com/Man_Securing%20Your%20Emails.htm

Page 48: Agility and security

http://mapandcounters.blogspot.com/2010/05/tahgc-france-1940-1972.html

Page 49: Agility and security

Thanks!

Jim [email protected]

@jstogdill

Page 50: Agility and security

backups

Page 51: Agility and security

http://ifisc.uib-csic.es/img/Bio.jpg

Page 52: Agility and security
Page 53: Agility and security

http://upflysoft.com/2010/05/29/yahoo-weather-3-0-freeware-2/

Page 54: Agility and security

http://venturebeat.com/wp-content/uploads/2009/03/28811286_e1671e30a9.jpg

Page 55: Agility and security
Page 56: Agility and security
Page 57: Agility and security

Further Reading

Page 58: Agility and security
Page 59: Agility and security

From: http://kl.zensci.dk/industrial-revolution

Page 60: Agility and security
Page 61: Agility and security

http://www.autolife.umd.umich.edu/Race/R_Overview/Rouge_Plant.htm