Cyber Security Theory of Everything
John Mackenzie DCSc DBA(Cyber)-can GRCP GRCA IRMP IDDP
Cyber Misfit | CISO Support | Cyber Advisor | GRC Specialist | Conducted thousands of Business Reviews and Cyber Audited > $300B of assets | Won 16 State/Country Titles & 22 Marathons/Ultras
To date, understanding and solving the complex nature of classical Cyber Security has proven to be difficult, if not impossible.
By observing and re-appraising this through the lens of Quantum Mechanics, and in particular Quantum Field Theories Standard Model of Particle Physics, Cyber Security can be defined as 4 Fundamental Dimensions, 2 Strong Forces, and 2 Weak Forces. Augmenting this with an Environmental Force, Interaction Force, and Connectedness Force, a grand Cyber Security Theory of Everything can begin to be developed.
The classical and mostly one-dimensional approach to Cyber Security inevitably leads to gaps and inconsistency in the security profile of an organisation. Key detractors include the implementation manner of the 4 Fundamental Forces and the existing limitations of the Strong Force, noticeably the Technical focus and the inferior Decision-Making process. These subsequently cause widespread entropy and decay of the Interaction and Connectedness Forces. Such misalignment can be discerned by weighing the disparate nature of organisational statements and delivery of Values, Vision, Mission, and Goals. Over time, as such deviant gaps are perceived by the workforce, a fractionation occurs, leading toward systemic internal challenges and widespread deficient Cyber Security practices.
Stupendously, the supportive and protective nature of the Environmental Force has seemingly undermined the 4 Fundamental Forces, the Strong Force, and the Weak Force due to a variety of nuanced factors. Misdirected industry norms, slow regulations and legislation including lack of authority accountability, and resistance to organisational governance and compliance have all contributed to insufficient resourcing and alignment to stated organisational and executive Values, Vision, Mission, and Goals, all of which typically relate to customer care and safety.
Eventually, rudimentary fractures begin to be detected as the organisational statement and delivery are quite divergent, and if left unchecked, advances toward a fractionation.
领英推荐
This workforce fractionation occurs uniquely at an individual level, as every person has both a conscious and unconscious state of awareness. Remarkably, fractionation is represented across a quadality of realities that exist simultaneously and equilaterally in each person, being our mental, physical, emotional, and spiritual selves. If one becomes triggered or aware, a state of hypervigilance or awareness is invoked, hardwiring involuntary responses from the amygdala, an area of the brain that contributes to emotional processing. This humanistic heuristic inherently leads to beware, danger, and distrust, which leads to employee self-preservation and disconnect.
If a quadality connection is consequentially eroded or damaged at a local (individual) level or system (organisational) level, relational engagement, and interconnectedness begin to break down, leading to negative traits and counterproductive workplace behaviours. The timeline horizon may often collapse, contingent upon the proximity and importance of the trigger genesis, which may also be accelerated by the Environmental and Personal State of the individual's situational needs and characteristics.
Unfortunately, organisationally, not until alignment or reconnection happens across all Interaction and Connectedness Forces of an individual's quadality, can the divide be bridged. And in most instances, this is highly unlikely.
Accordingly, any succeeding Cyber Security efforts within the 4 Fundamental Dimensions, 2 Strong Forces, and 2 Weak Forces are prone to abject failure.?
By John Mackenzie, Founder CyberEQ, GRC Cyber/Risk Specialist, Cyber Security Researcher
Technology Futurist | Keynote Speaker | Strategic Consultant | Thought Leader | Forbes Top 50 Female Futurist | Future of Work | Innovation Strategist
2 年John Mackenzie - an interesting analysis of the #cybersecurity matrix. I'm particularly intrigued by the "Connectedness Force" - as emotional and mental states are rarely discussed in this context, but certainly play a role in how one might react to a cyber threat.
Moderator of Cyber Security and Real Time Systems & Global Digital Identity Groups
2 年This is certainly not a conventional way of thinking about the effectiveness and efficiency of internal (security) controls within a business.
Experienced Leader in Risk, Security, Resilience, Safety, and Management Sciences | PhD Candidate, Researcher and Scholar
2 年Very interesting and informative. Love it!
Cyber Misfit | CISO Support | Cyber Advisor | GRC Specialist | Conducted thousands of Business Reviews and Cyber Audited > $300B of assets | Won 16 State/Country Titles & 22 Marathons/Ultras
2 年Don Tibbits GradCertCyberSecurity MACS CP MAISA Marcus Thompson, AM, PhD
Cyber Misfit | CISO Support | Cyber Advisor | GRC Specialist | Conducted thousands of Business Reviews and Cyber Audited > $300B of assets | Won 16 State/Country Titles & 22 Marathons/Ultras
2 年Alexandre BLANC Cyber Security Tony Vizza Dirk Hodgson Haisav Chokshi Dr Chris Booth Simon Horne Ian Markram Karissa A. Breen (KB) Keith Howard Mariam Hakobyan Nicolas M. Chaillan Noam Rozen Nathan Cook, FIML, MBA Rachael Qualls Ricki Burke Rod Bristow Vicki Brady Dr Vladas Leonas, GAICD, FACS, FIEAust Vikram Sharma Stephen Pitt-Walker, JD, FGIA Silent Breach Simon Linstead Jay Jay Davey Dr. Ed Pope Dan Maslin Andy Watkin-Child CSyP, CEng, AMAE David Spinks Heath Spencer Shara Evans Andy Jenkinson Chuck Brooks David Sym-Smith Stefan Zurflüh Harold Walker Roger Smith Jack Lindsay Gerry Kennedy Jacqueline Steel Nuwanthi Mahamaya Senevirathna Rowena Barrett Charles "cp3o" Parks III Julia Spicer OAM Matt Warren Tony Ridley, MSc CSyP MSyI Muna Al-Hawawreh Gilbert C. Chris Hall Stephen Pitt-Walker, JD, FGIA Ivan Savov, FARPI Dr. Gavriel (Gav) Schneider Steve Morgan Mamoun Alazab Lucia Gerrie Linda Ginger