Information fuels much of the growth we’re experiencing in western civilization—some have gone as far as to call information “the new oil.”
However, I'd like to consider another metaphor, which will better capture both the benefits and the risks of the information age: nuclear energy.
For starters, information exists all around us—essentially raw bits generated from nearly every interaction we engage in as individuals, citizens and business managers. Whether we're purchasing, reading online or communicating, we are constantly emanating a trail of bits as we go.
Frank Downs, ISACA’s Sr. Cyber/Information Security Manager, discusses a massive Distributed Denial of Service DDoS attack on Dyn on Friday, 21 October, in a 12 minute YouTube video.
Companies such as Amazon Web Services, Spotify, Twitter, PayPal, Netflix and Reddit were impacted by the three-part attack on Dyn, which is responsible for providing Domain Name System (DNS) services. DNS maps internet domain names to specific internet protocol (IP) network addresses, enabling websites to use names instead of complicated IP addresses.
The Dyn incident involved an Internet of Things (IOT) attack that leveraged Mirai, the same method to attack security blogger Brian Krebs earlier in October.
It is time to consider the next evolution of the COBIT framework beyond 5.0—and here is your chance to play an important role.
As you are well aware, COBIT is the premier IT governance framework, helping organizations around the world realize significant value. ISACA is seeking your help to ensure that COBIT continues to evolve as a vibrant framework that encompasses the new capabilities and threats (Internet of Things, big data, cyber security, DevOps, etc.) constantly arising in the world of IT governance.
Cyber security governance jobs are growing significantly faster than information technology jobs. However, this very exciting industry lacks the number of skilled professionals required to fill the available jobs.
Some common roles within cyber security include cyber security governance manager/consultant, information assurance, security analyst, forensics consultant, penetration tester and malware analyst/reverse engineering. With these types of opportunities available, new or aspiring cyber security professionals should focus on continually increasing their skillsets, because the cyber security industry is continually changing.
Magic! It is the basis for countless children’s stories filled with adventure and excitement. It is also how many kids think cyberspace works. There is nothing like seeing our child’s reaction when the slight of a magician’s hand produces awe-inspiring results. However, as IT professionals we know the internet is no Penn & Teller illusion. A technical understanding of their digital lives is a crucial life lesson for today’s youth.
How many of the kids in our lives truly know what mom or dad or their aunt or uncle do at work? Let’s face it, many of us find it difficult to explain our work to most adults, maybe even our bosses. Or we assume that our kids won’t understand because we think it is too complicated for them. Maybe it is easier to let kids think that in tech we wave our magic wands at code or pull rabbits out of servers. Except, we all know that’s not true.
This blog is intended to offer a way for ISACA leaders, constituents and staff to exchange information of interest pertinent to the association, the business environment and/or the profession.
The comments on this site are the author’s own and do not necessarily represent ISACA’s opinions or plans. ISACA does not endorse, monitor or control any links to external sites offered in this blog, and makes no warranty or statement regarding the content on those external sites.
Anyone posting comments on this site should ensure that the content remains on-topic and steers well clear of any statements that could be considered insensitive, offensive or threatening. Given ISACA’s global nature, the need to communicate in a way that is accessible and acceptable to many cultures should be taken into account. ISACA retains the right, at its sole discretion, to refuse content that is considered inappropriate.
To volunteer to write a blog or suggest a topic send an email here.