Texas DIR Security 18 2018...The Dark Ages. Connected People Web 2.0 Connected Devices Web 3.0...
Transcript of Texas DIR Security 18 2018...The Dark Ages. Connected People Web 2.0 Connected Devices Web 3.0...
Scott Klososky
Digital Darwinism:Disruption, Transformation & Opportunity
Digital Darwinism
is when the pace
of digital innovation is faster
than the speed organizations are willing to adapt.
(survival of the fittest)
Cycle of Disruption
1.NewcomerImplements betterdigital tools
2.Incumbentsignorenewcomer
3.Marketsatisfactiongrows
4.Incumbentsbully or buynewcomer
5.Marketadapts andimproves
6.Marketreapsbenefits
Innovation Risk - The Danger of Disruption
Being disrupted, or innovating proactively, with is a choice.
When you are repeatedly disrupted and slow to adapt, you will suffer from Digital Darwinism and cease to become relevant and productive
Seven Disruptive Catalysts
Wider Reach
Rapid Scaling
Automation
Wiser Decisions
Quality & Speed
Amplified Connections
User CapabilitiesCognitiveComputing
RPA/Robotics
SocialTechnologies
3D Printing
DataIntelligence
Cloud
UniversalInternet
Digital Transformation 2000 to 2050
A historically significant change in humanity…
Using Digital
Wearing Digital
Implanting Digital
The Hive Mind
Disconnected The Dark Ages
Connected PeopleWeb 2.0
Connected DevicesWeb 3.0
Connected Data PlatformsWeb 4.0
Augmented HumanityWeb 5.0
Connected OrganizationsWeb 1.0
IoT & M2MAmbient
Computing
AmbientIntelligence
Transhumanism
SocialTechnologies
Digital MarketingeCommerce
The Transformation of Connection
2000
2010
2020
2028
2045
Yearof
Traction
Connected PeopleWeb 2.0
Connected DevicesWeb 3.0
Connected Data PlatformsWeb 4.0
Augmented HumanityWeb 5.0
Connected OrganizationsWeb 1.0
IoT & M2MAmbient
Computing
AmbientIntelligence
Transhumanism
SocialTechnologies
Digital MarketingeCommerce
The Transformation of Connection
Cybersecurity Risk Grows
Viruses
Social Engineering
Device Takeover
Data Extortion/Corruption
Augmentation Extortion/Control
2000
2010
2020
2028
2045
Yearof
Traction
HUMALOGY
The integration of humans and technology to accomplish processes
HUMAN INVOLVMENT
0
TECHNOLOGY INVOLVMENT
H5 H4 H3 H2 H1 T1 T2 T3 T4 T5
HUMALOGY SCALE
HUMAN INVOLVMENT
0
TECHNOLOGY INVOLVMENT
H5 H4 H3 H2 H1 T1 T2 T3 T4 T5
HUMALOGY SCALE
H5 H2 T2 T50
TODAY
Digging a HoleDigging a Hole
We are now shifting from the Information Age to:
The Age of Entanglement
As technology and humanity continue to converge the repercussions on our future are staggering…
Rate
of
Ch
an
ge
Time
People & Organizations Change Logarithmically
Technology Changes Exponentially
Strategy Risk Gap
The Transformation Dilemma
Rate
of
Ch
an
ge
Time
People & Organizations Change Logarithmically
Technology Changes Exponentially
The High Beam Zone
The Transformation Dilemma
PRACTICE
Not on your radar
You first hear of it
Clearly a trend
Common Practice
FuturePast
What you are actively working on
}
Present 1YR 5YR
ORGANIZATION & LEADERS
REACTION TIME
Becomes a practice
-1YR-5YR
Learning to be High Beam
PRACTICE
Not on your radar
You first hear of it
Clearly a trend
Common Practice
FuturePast
What you are actively working on
}
Present 1YR 5YR
ORGANIZATION & LEADERS
REACTION TIME
Becomes a practice
-1YR-5YR
Learning to be High Beam
The Growing Digital Skills gap
Hyper Personalization(Individualizing Tech)
Relentless Automation
Growing EA complexity(Enterprise architecture)
The Maturation of Data Services
Integrated Security
Machine Intelligence
The High Beam 2018 List
David Ferrucci, the developer of IBM Watson, was asked if the system can think…
He answered, “Watson can think like a submarine can swim”
Machine Intelligence
Machine Intelligence EcosystemRoboticsRPA (Robotic Process Automation)
Artificial IntelligenceNatural Language ProcessingRecommendation EnginesMachine LearningDeep LearningPredictive AnalysisCognitive Computing
Machine Intelligence RoadmapStep
One
Step Four
Systems have the ability to review data and learn for themselves
Self Learning
Step Three
Systems go through a human led training process in order to refine algorithms
Trained
Step Five
Systems have decision making flexibility with a desire to improve
Intelligent
Systems are connected to the Internet with the ability to “talk” to other systems
Smart (connected)
Step TwoSystem is hard coded
with rules that mimic human thought process
Programmed
Step Six
Systems understand their mission and have ethics to guide them
Enlightened
PEOPLE
ELECTRONICPHYSICAL
AN INTEGRATED SECURITY MODEL
FACILITIES
ORGANIZATIONAL ASSETS
CYBER
Hacker Internal Threat
3rd Party Co-conspirator
The ability to join and manage
as a single unified platform the three pillars
of security to mitigate risks
PEOPLE
PHYSICAL
AN INTEGRATED SECURITY MODEL
FACILITIES
ORGANIZATIONAL ASSETS
CYBER
Hacker Internal Threat
3rd Party Co-conspirator
The ability to join and manage
as a single unified platform the three pillars
of security to mitigate risks
ACCESS CONTROLMONITORINGELECTRONICS
ACCOUNTABILITYTESTING
TRAINING
SECURITY AI’SAPPLICATIONS
DEVICES
The Three Security Firewalls
DIGITAL FIREWALL
HUMAN FIREWALL
PHYSICAL FIREWALL
CON
STA
NT
STRA
TEG
Y EV
OLU
TIO
N
GO
VERN
AN
CE (
P&P)
AU
DIT
S &
ASS
ESSM
ENTS
SECU
RITY
TEA
M S
KILL
S
RISK
TO
LERA
NCE
(ES
RM)
FOUNDATIONS
Like it or not, technology has become the jugular vein of the organization
Mike Foster
Where you tell them the strategy needs to go….
When they reject the leaders vision….
The Importance of Cultural Transformation
Where you tell them the strategy needs to go….
When they reject the leaders vision….
The Importance of Cultural Transformation
.
Capacity for
Change
Adaptive Entrenched
Excellent Performance
Innovative Processes & Solutions
A Stagnant Culture
Success
Failure
.
Capacity for
Change
Adaptive Entrenched
Excellent
Performance
Innovative
Processes &
Solutions
A Stagnant Culture
Success
Failure
.
Capacity for
Change
Adaptive Entrenched
Excellent Performance
Innovative Processes &
Systems
An Innovation Culture
Success
Failure
.
Capacity for
Change
Adaptive Entrenched
Excellent Performance
Innovative Processes & Systems
An Innovation Culture
Success
Failure
What will be the digital footprints you leave on the
organization?
Someone once told me not to bite off more than I can chew. I said I would rather choke on greatness than nibble on mediocrity
NEXT STEPS
DOWNLOAD THIS PRESENTATION
WWW.FPOV.COM/SK
BUILD YOUR RIVER OF INFORMATION THE DOWNLOAD
FROM MIT
GET OUT AND LOOK AT BEST PRACTICES
IN YOUR FIELD