Cyber Security Threats for 2017

During 2017 we will suffer ‘old’ threats like ransomware, cyber espionage and ‘hacktivist’ exposing privacy issues but in addition to known them, our threats list will upgrade so much adding new concepts like machine learning accelerates social engineering attacks or cloud computing providers infection.

The list is a very long, so a big effort (time, money, people) is needed to mitigate all these risks.

After reading more than 10 different reports about Cyber Security Threats 2017 published in Internet I did my own version. I hope you like it.

You can see my presentation here:

 

What are the dangers facing your computer system?

Every year, the challenge of protecting our IT assets from growing threats and cyber attacks is growing.

Once some malicious application is in our network and later can quickly move with traffic and produce a big impact in our the network.

These attacks can be devastating.

I created a presentation where I explain in details this topic, you can see my presentation here (in Spanish):

Cloud Computing, IoT, BYOD. Our perimeter is gone, so what?

In times when Cloud Computing, Internet of Things, mobile devices (including environments BYOD) are an increasingly widespread reality (and unstoppable future), thereby opening backdoors to our corporate network (and their respective threats), which place touches the IT security officer to manage an increasingly large number of hits and risks? Where is our corporate perimeter?

Block accesses can talk or we have only to settle for being resilient to attacks due to a lack of control visibility and access control?

Many doubts are raised, the market has responded and there are technological and non-technological solutions that seek to remedy the growing risk are suffering the organizations with new access technologies and cloud storage finally have access to our network.

I created a presentation where I explain in details this topic, you can see my presentation here (in Spanish):

Lean Six Sigma Methodology

Lean Six Sigma is a process improvement methodology that relies on a collaborative team effort to improve performance by systematically removing waste, combining Lean and Six Sigma to eliminate the eight kinds of waste

Lean Six Sigma projects comprise aspects of Lean’s waste elimination and the Six Sigma focus on reducing defects.

Lean Six Sigma utilizes the DMAIC (Define, Measure, Analyze, Improve and Control) phases similar to that of Six Sigma. Lean Six Sigma projects comprise aspects of Lean’s waste elimination and the Six Sigma focus on reducing defects, based on critical to quality (CTQ) characteristics.

Six Sigma use statistics tools for characterization and study of the processes, this is the reason of the name, as sigma is the standard deviation which gives an idea of the variability in a process and the goal of Six Sigma is to reduce it so that the process is always within the limits set by customer requirements.

Note: DPMO means Defects per million opportunities

1 sigma = 690,000 DPMO = 32% efficiency
2 sigma = 308,538 DPMO = 69% efficiency
3 sigma = 66,807 DPMO = 93.3% efficiency
4 sigma = 6.210 DPMO = 99.38% efficiency
5 sigma = 233 DPMO = 99.977% efficiency
6 sigma = 3.4 DPMO = 99.99966% efficiency
7 sigma = 0.019 DPMO = 99.9999981% efficiency

Lean is a systematic method for the elimination of waste (“Muda”) within a manufacturing system. Lean also takes into account waste created through overburden (“Muri”) and waste created through unevenness in work loads (“Mura”).

The eight muda are:

1.Transport (moving products that are not actually required to perform the processing
2.Inventory (all components, work in process, and finished product not being processed
3.Motion (people or equipment moving or walking more than is required to perform the processing
4.Waiting (waiting for the next production step, interruptions of production during shift change
5.Overproduction (production ahead of demand
6.Over Processing (resulting from poor tool or product design creating activity
7.Defects (the effort involved in inspecting for and fixing defects
8.Skills (waste of Skills, referred to as “under-utilizing capabilities and delegating tasks with inadequate training)

I created a presentation where I explain in details this topic, you can see my presentation here:

 

IT Governance & ISO 38500

IT Governance or Corporate governance of information technology is a subset discipline of corporate governance, focused on information and technology (IT) and its performance and risk management.

The interest in IT governance is due to the ongoing need within organizations to focus value creation efforts on an organization’s strategic objectives and to better manage the performance of those responsible for creating this value in the best interest of all stakeholders.

I created a presentation where I explain in details this topic, you can see my presentation here: