Get Plugged In - Week 8
By Scarlett via @MidJourney - /imagine A guy that does technology that is turning purple because his head is plugged into the Internet wire futuristic ultra realistic --ar 3:2

Get Plugged In - Week 8

Welcome back my fast adapting friends.

It’s week 8 - 8 is our favorite number for reasons I might disclose in the near future.

Here’s what’s going on this week:

  • Adapt Faster: Get Plugged In
  • Transform Smarter: How to calculate the ROI of Cybersecurity
  • Prompt Smarter: 11 yr. old hack
  • Around the Angle: Verizon DBIR + OpenAI’s Cyber commitment

New here? Subscribe.


Adapt Faster

Get plugged in.

We get stuck in the routines we’ve created either consciously or sub-consciously. It makes it difficult to find time to up skill and learn something new with intention and focus.

It’s one of those things that’s easy to talk about in the digital town square yet seemingly very few people eat their own words.

I could tell you all about 5 strategies to maximize your focus or 4 reasons you’re not leveling up, but none of that will matter if you don’t take control of your priorities for yourself.

It’s real simple. If you’re able to, block out a couple of hours per week and consider signing up for an affordable training, an online course, or pick up a book geared towards something you’re most interested in learning about.

Then commit to it and take your time. The only thing you’ll accomplish by rushing through a training, course, or book is a waste of valuable time. It doesn’t count if you don’t remember and are unable to apply what you’ve learned.

Get plugged in,

to SELECT sources of knowledge that will help you level up the fastest.

I’ve read only 2 books this year, INTENSELY; starting my 3rd

  1. Grow Your Business Like a Weed by Stu Heinecke - strategy & tactics in my business growth
  2. Cyber Defense Matrix by Sounil Yu - using this in my cyber program
  3. Start-Up Secure by Chris Castaldo - on deck

fun fact: I had Stu on the old LIVE show over 3 years ago

No alt text provided for this image

I’ve been gun shy of online courses, but here are two low-cost, high value courses I don’t regret in the slightest.

  1. Justin Welsh’s Linkedin OS Course (Marketing) - you may have noticed my Linkedin game lately : )
  2. Josh Braun’s Badass B2B Growth Guide (Sales) - love his outlook on detachment, the opposite of attachment; it’s what creates sales people you tend to despise.

Adapt faster.


Transform Smarter

DISCLAIMER: I’m a vendor agnostic, humanly biased Cybersecurity Advisor by trade. If you’d like to support me, visit catchadvisors.com and talk to me face-to-face.

Calculating the ROI for cybersecurity is one of those things that very few people know how to do, well.

That’s because there’s too many variables, too much mystique, and it’s too complex for most of us to compute. Larger organizations have attempted the challenge, but they end up skewing the results of the ROI as a marketing play to get you to buy their solution.

Is there not a vendor agnostic ROI calculation for cybersecurity?

One that tailors to a multitude of solutions vs. one?

This possibly exists somewhere behind closed doors and locked files, or I simply haven’t found the best answer yet (if you know a guy/gal, hook me up).

Until then, this will have to do, take a look.

No alt text provided for this image

To properly calculate this, we’re going to need 4 numbers. I previously posted 2 of the 4 this past week on Linkedin and planned to post the other 2, but got delayed (clients come before this newsletter).

No alt text provided for this image

Most of the organizations reading this line of text will be hit.

There is a 76% likeliness of a cyber attack happening within your organization

No alt text provided for this image

The most disruptive part of a cyberattack is downtime.

The avg. daily cyberattack downtime across all industries is $225,500

We need these 4 numbers:

  1. Annualized rate of occurrence (how many cyber attacks do you anticipate per year, can’t be zero).
  2. Expected monetary loss for a single event
  3. Cost of control (cyber security spend)
  4. Reduction in probability of risk of occurrence with the implemented control (this one is the trickiest).


For obvious reasons, the best numbers to use are your numbers. But in the absence of your numbers, the 2nd best numbers to use are our numbers (collective).

We’re going to focus on the mid-market segment, $50M to $2B for this example. It’s about to get real, hang with me.

$100M Company’s Cyber ROI

The average IT budget in mid-market is about 4% of revenue.

On average 10% of the IT budget is spent on cyber.

So a $100M organization might look like this.

IT Budget: $4M

Cyber Budget: $400K

Annualized rate of Occurrence: 72% (mean of 76% likeliness & 68% actually attacked in 2022)

Expected Monetary Loss: $3.16M ($225,500 × 14 days)

Reduction in Probability: 40% (highly subjective generosity)

No alt text provided for this image
No alt text provided for this image

There you have it. A not so simple vendor agnostic Cyber ROI proving what we already knew; investing in cyber is a good idea. This also serves as some resemblance of proof that the avg. numbers we gathered on the web are backed by some form of reality. I’m sure you can find many ways to poke holes at this, it’s far from perfect, but it’s still a great addition to have in your cyber program and as a part of executive sponsorship.

p.s. I can help you do this for your unique organization, visit catchcyber.com and take the 5 min assessment.


Prompt Smarter

Here’s a new prompt I tried this week:

Explain [TOPIC] to me like I’m 11 years old.

No alt text provided for this image

Seems too easy right? Well its a great hack to learn anything you can think of in hyper speed. Give it a go.


Around the Angle

Verizon dropped it’s annual security report (DBIR 2023)

No alt text provided for this image

3 Key Takeaways

  1. Data breaches surged due to ransomware attacks with data exfiltration.
  2. Privilege abuse is a key security risk.
  3. Phishing, ransomware, and web app attacks are on the rise again.

OpenAI's $1M Push to Supercharge AI Security

OpenAI is throwing a cool million into a new Cybersecurity Grant Program. The goal? Supercharge AI-driven security and spark deep convos on how AI and cybersecurity play together.


Always Adapting

Thanks for reading! When you signed up for this newsletter I promised to help you adapt faster, transform smarter, and keep up with the hype cycle in AI and Cyber. What did you think of today's newsletter? Leave a comment below and let me know what you'd like to see more of.

Thanks for reading.

See you next week,

KB

p.s. if you want to sign up for the Adapt Faster newsletter or share it with a friend, you can find us here

要查看或添加评论,请登录

Kyle Burt的更多文章

  • Zero Trust IRL

    Zero Trust IRL

    I'm an unseen force, felt rather than seen, swiftly lost yet painstakingly constructed. I stand unyielding when all…

    2 条评论
  • The Risk of Risk Aversion - Wk 12

    The Risk of Risk Aversion - Wk 12

    Adapt Even Faster | Catch Cyber | Catch CX Welcome back fast adapter. Today is another beautiful Sunday to share this…

    3 条评论
  • Avoid These 7 Pitfalls - Week 11

    Avoid These 7 Pitfalls - Week 11

    Welcome back fast adapter. Happy 4th of July weekend, another perfect Sunday to share this email with your co-workers &…

    1 条评论
  • They're Hyped About AI Too

    They're Hyped About AI Too

    Welcome back fast adapter. Today is another beautiful Sunday to share this email with your co-workers & colleagues to…

  • We've Been Hacked - Week 9

    We've Been Hacked - Week 9

    Read time: 4 minutes Welcome back. It’s week 9 and we’ve been hacked.

    2 条评论
  • The Greatest Balancing Act of All Time - AF Week 7

    The Greatest Balancing Act of All Time - AF Week 7

    Read time: 4 minutes The Greatest Balancing Act of All Time There are two major trains of thoughts. Unwavering…

    1 条评论
  • Escaping the Consumption Trap

    Escaping the Consumption Trap

    Read time: 3 minutes Noise everywhere. Everyone is vying for every minute of your day (heck, I’m doing that to you now…

    2 条评论
  • We Will Become Obsolete

    We Will Become Obsolete

    Hey there, Quick shout out to say thank you for reading and following along. If you’ve read a single word I’ve written…

  • Limitless

    Limitless

    I witnessed 2 clients get hit with ransomware 2016. At the time I was somewhat familiar with cybersecurity; I knew…

    2 条评论
  • Interrupt Your Patterns

    Interrupt Your Patterns

    You thought this one was going to be called “found” didn’t you? (for the record, so did I) Our human brains like…

    2 条评论

社区洞察

其他会员也浏览了