The Hybrid World

The Hybrid World

“born from the ashes of a world at war…..

warfare is evolving…..

everything we touch is a weapon….”

4th PSYOP Group – Ghosts in the Machine (May 2022)

There has been much discussion about the impact of new technologies such as VR and how they will change our society.?The reality is that it has already changed, most of us just don’t fully appreciate it.?We are already living in a hybrid world where the “real” world and the “cyber” world are inextricably linked and impact each other.?For those old enough to remember the time before the Internet, think about how differently you retained and searched for information before Google, how many “friends” you had that you and never actually met in person, how many times you bought an item from a store without a physical presence, or better yet, how many items you bought that weren’t actually physical items, versus virtual goods such as NFTs.?No, we don’t all walk around with VR headsets on, at least yet, we use a screen and a keyboard on our phones, which are really portable computers with computing power that is millions of times larger than the guidance computer for Apollo 11.?The only real difference is the interface we use (VR headset versus device screen) but that is an interface issue only.

And by that I mean this—whether we all run out tomorrow and buy a mansion in the Metaverse or not, we already live in a hybrid world with “real” and virtual hopelessly enmeshed—how much time we spend in each, and what mechanism we use to interact our hybrid world, matters exactly not at all.

While you may wonder why I followed a series of articles about corporate governance with this one, and what this has to do with companies and how they govern themselves.?The answer is everything.?The reason we have entered this hybrid world is that our predominant line of communication is, for the first time, virtual, and many things in the “physical” world now depend on the virtual world.?One of many such examples is a connected medical device—is that a physical device or a “virtual” device??The answer is a hybrid device.?Given the dependence upon the “Internet” by businesses now, most business processes are at minimum hybrid, if not fully virtual.

What do I mean by a line of communication??To understand that, you have to put into context the history of how society moves things over great expanses.?Society has always looked for ways to connect itself, which required the creation of technology to do it, and understanding the core components to that process is important, because there are certain consistencies in these methods of connecting—namely there is a medium that is used to connect—a “road,” a “platform” that travels along the road, an “engine” that propels that platform, and “propellant” or fuel to move the platform.?Over time, our ability to connect in a more efficient way has only increased, and not surprisingly the state, in many cases the military, created this technology.

If one looks at the history in context, roads were used for centuries, with various carts serving as the platform, pack animals provided the engine, and food for the animals fueled the engines.?Society eventually began using the ocean when ships were created that could travel long distances, and sails were the engine (before the creation of other engines for ships), and wind was the propellant. Eventually the skies became the “road,” when the plane became a way to connect quickly after the advent of the jet engine, which ran on oil.

No alt text provided for this image

Now we connect in cyberspace via a web of networks that are linked via our current road, the telecommunications backbone, with myriad platforms, and the engines being computing power, including AI/ML, which is propelled by information.?And as with many of these prior roads, this one was funded by the military—in this case what is now known as the Defense Advanced Research Projects Agency, or DARPA.?There are no natural or man-made borders, in most cases, with our current road, and the size of the engine keeps growing.?And, as always, as the engine grows, so too does the need for the propellant—in this case data.

No alt text provided for this image

A point is worth noting on the fuel/propellant point.?While I recognize that energy is needed to make the computers turn on, they are equally dependent on data to propel the computing process.?And to be clear, I do not just mean personal data.?Data of all types fuels, or propels, computing power in our current line of communication.

One can look at all of the examples above of how the creation of technology enhanced the connectivity of our world, and a key point becomes clear—these lines of communication can be used to do four things that are generally helpful for societies, but they also can be used to do four things that are detrimental to society.?

  • Diplomacy v. War
  • Information Sharing v. Propaganda
  • Commerce v. Crime/Piracy
  • Social Connection v. Espionage

No alt text provided for this image

Our core challenges in “privacy” and cyber result from our inability to see two things.?First, from a “privacy” perspective, much of our society depends upon a DARPA-created line of communication that is propelled by, and inherently dependent upon, an ever-increasing amount of data.?Second, from a cyber and national security perspective, our current line of communication is a borderless global road that permits these four sets of activities to occur, with few checkpoints along the way to regulate conduct.

You cannot solve complex problems without first identifying what the problems actually are.?It is past time to do that with “privacy” and cyber.?Future articles will link these issues more directly to how companies should rethink these issues, as well as how we all should rethink “privacy” and cyber to help improve our Hybrid World.?Until we do that, we will continue to provide the same answers to the same questions, and get the same results.

David Pitts CCISO, CISSP, ISSMP, CIPP-G, PMP, ITIL, CCSP

Executive Manager (Board Member, CISO, CIO, Former CEO, CISO, Dir of Technology, Dir of Operations, Dir of Security). US Government Clearance: Secret

2 年

I agree with much of what you have said, however, I find the premise to be incorrect. Privacy and cybersecurity is not a problem. A problem (like 2+2) is solvable. This is not solvable. This is a dilemma. Dilemmas are not solvable but instead must me worked and managed (like 1/3).

Glen Day

NVISIONx Founder & CEO | Data Risk Intelligence, DSPM & Smart Data Solutions Entrepreneur | 1st Chief Privacy Officer for LA County | Retired US Navy Commander (Information Warfare)

2 年

Andrew worthy insights and fully agree. #cyber and #privacy are complex and critical functions in which many still struggle on how to effectively manage both. However, defining the problem is also challenging as the risk factors can vary greatly from one company to another. If we're overly dependent on human knowledge, which as a number of limitations including recall, the problem may get somewhat defined, but unlikely to be a feasible solution. #DataRiskIntelligence #DRI is at the core of integrating business data analytics (privacy or any other data of interest) with cyber intel. The results are that the data tells a story of what's actually happening and not what others may think is happening, but then validated by human review and refinement. We've seen dramatic results in defining, modeling and then verifying the problem with highly valuable #DRI that led to complete transparency, controls optimization and substantial risk reduction. Defining the problem is critical, but not easy if incomplete models are used.

Steve Kenny

Founder at Assured Privacy

2 年

Nice sentiment Andrew Serwin and this all makes much practical sense. I guess I’m just lacking a bridge to what some might call a (Lawrence Lessig) vision of law as (perhaps self writing) code as a North Star.

要查看或添加评论,请登录

Andrew Serwin的更多文章

  • Cybersecurity and the Hybrid World

    Cybersecurity and the Hybrid World

    Having just examined privacy and data and shown that how we look at “privacy” isn’t perhaps the best way, I will not…

    1 条评论
  • Value and Data

    Value and Data

    Picking up on the last post regarding value, risk and data, it is helpful to again return to the types of data that…

  • Defining Value and Risk in Corporate Governance, and the Limits on Privacy

    Defining Value and Risk in Corporate Governance, and the Limits on Privacy

    As we continue to explore new strategies for governance around data and cyber, it is helpful to return to our corporate…

    1 条评论
  • Data Sustainability

    Data Sustainability

    Having taken what seems like a detour down the path of “primary purpose” after having identified the problems with…

    1 条评论
  • Mission Statements, Strategy, Values and Ethics--How They Relate to Governance, Data and Connectivity.

    Mission Statements, Strategy, Values and Ethics--How They Relate to Governance, Data and Connectivity.

    Corporations and other entities frequently create mission statements, values, or other similar statements regarding the…

    2 条评论
  • The Problem With Privacy

    The Problem With Privacy

    Brand … Trust … Digital risk … Values … Ethics … The right to be let alone … The “creepy” factor … Notice and choice ……

    8 条评论
  • Boards and Risk

    Boards and Risk

    Lawyers love writing about talking to the Board about privacy and cyber, and I could add yet another article to that…

    6 条评论
  • Applying Corporate Governance

    Applying Corporate Governance

    In my last article, I covered corporate governance and defined what it was, and most importantly what it was “keyed”…

    3 条评论
  • Corporate Governance

    Corporate Governance

    The first step in our journey was to define governance, which is summarized by the process below, where a direction for…

    2 条评论
  • Defining Governance

    Defining Governance

    Governance is perhaps one of the most often used, but misunderstood, concepts by business people and compliance…

    5 条评论

社区洞察

其他会员也浏览了