Rethinking Cybersecurity and Techsecurity; The Hackables

Rethinking Cybersecurity and Techsecurity; The Hackables

Cybersecurity and Techsecurity are arguably some of the foremost challenges of the 21st century, and are estimated to exacerbate in an increasingly connected world. It is essential to differentiate between Cybersecurity and Techsecurity, cybersecurity often pertains to securing the cyber highway or the internet connected whereas Techsecurity secures multiple other forms of communication/connections that never transverse the cyber highway; both employ dissimilar aspects of management, operation and remediation. 

At a high-level evaluation, the main categories of assets to cyber/tech secure include:

  •     Data
  •     Utilities; differs from Services per legislation
  •     Infrastructures
  •     Services
  •     Discrete Entities: such include National Security, Human Security …

In rethinking security, it may be contended that a holistic approach from the viewpoint of industry leaders, CISOs and Security Organizations should be along the lines of “Disciplines” as tributaries of compensating and executable functions. The suggested executable functions that institute a more complete security purview can be categorized as: 

1.    Intelligence and Warfare Management

2.    Security Management: Identity, Configuration, Threat and Trust.

3.    Policy and Legislation Management

4.    Education, Culture and Professional Ethics Management

5.    Security Engineering: Architecture, Innovation, Security providers, Frameworks, Solutions…Management

6.    Industry Tactical Alignment, R&D, Insurance and General Governance… Management

7.    Social Engineering, Community Outreach and Awareness, Incentives…Management

In assessing the expanse of today’s digital economy, there seems to exist a misconception which discounts the fact that Central Banks, Monetary Entities, Stock Exchanges and Banks at large in a cashless economy are often more digital than presumed. The use of “digital” currencies are far more wide-spread and more aligned with Techsecurity concepts.

Someone once said: 

“Policy is a creation of experience and experience ought not to be shaped through policy”.

This is an estimable perception, as hackers are embracing the Gig Socio-Economy, Ransomware are more prevalent, innovations in discrete-unique undetectable protocols and various other developments seem to puzzle the industry.

Rethinking “Cybersecurity” requires a modular, resolute, streamlined and executable disciplines of Cybersecurity and Techsecurity.

 

DADISI OLUTOSIN

Muslim-Humanitarian ?? | COO/VP @ Veterans Technology Solutions-USA ???????? | SDVOSB offering IT Business Solutions to Public and Private Sector Enterprises

7 年

Great insights...

回复
Damien Connolly

Network Engineer/Project Manager

7 年

Uche, great article.

回复
Chukwuemeka Afigbo

Developer Success at Okta

7 年

Thank you for sharing this. I never thought about the differnce myself until I read this

回复
Yon Lew

COO ISRSEC International, Ltd. CISO ISRSEC (North America)

7 年

'teach them properly major forbes' ;) on the 'range fan' is not the same as being 'downrange' ;) :D https://www.youtube.com/watch?v=wEcu7d4dvXg

回复

要查看或添加评论,请登录

社区洞察

其他会员也浏览了