AiiA March Roundup on: Industry

Thought provoking pieces on what affects you

Add bookmark

Seth Adler

Covid-19 is causing shakeups across the board. Cybersecurity is experiencing new threats in this work-from-home environment. Fintech is adapting—and innovating—during these uncertain times.  Pharma, auto, and defence are also explored in this March roundup of industry resources.



Monitoring and Preparing for Emerging Coronavirus-Related Cyber Security Threats

The coronavirus is not just a global health crisis – increasingly, it is becoming a cyber security threat as well as more organizations move employees to remote work. The federal government issued an alert encouraging organizations to adopt a heightened state of cybersecurity right now, noting that as more organizations are using virtual private networks (VPNs), “more vulnerabilities are being found and targeted by malicious cyber actors.”

Covered in this article:

  • Utilizing internal resources without checking out
  • Ways small businesses can improve their security


Security Standards for 5G

Momentum continues to build for 5G deployments, and while most industry observers agree that security is tighter than in its 4G and 3G predecessors, there are still considerations to ensure corporate data stays safe as the number of endpoints connected to networks increases.

Discussed in this article:

  • Enhancing security for 5G
  • Actions for security teams and network providers


The Role of Cyber Security in Compliance

Compliance needs to be viewed as a continuous, organizational process and not a reactive response, according to Cyber Security Hub’s recently released report Decreasing Risk Through Enterprise Compliance. As a myriad of industry regulations and legislation have increased complexity in C-suite decision making, CISOs must educate executives on new and evolving risks and why investments in cyber security are more critical than ever.

Discussed in this article:

  • Governance, risk management and compliance
  • The role of cyber security in compliance
  • Regulatory compliance frameworks
  • Cyber security as an opportunity – not an obligation
  • The value of third-party partnerships in compliance


Cyber Security Standards and Frameworks

Many organizations must comply with a mixture of state-mandated, industry-specific and international cyber security regulations. The challenge for an organization operating nationally, or even globally, is considerable.

In this report, hear from practitioners and thought leaders about the need for a prioritized, flexible, repeatable, performance-based, and cost-effective standards-based framework for critical infrastructure cyber security.

Also included in this report:

  • Creating business value with cyber security standards and frameworks
  • Industry regulation as a guidepost for popular frameworks
  • Assessing the organization’s cyber security readiness
  • Understanding an organization’s true risk
  • Cyber security framework swot analysis


The Cost of an Enterprise Ransomware Attack

Cyber-attackers search enterprise networks millions of times every day to identify a vulnerability that can be exploited and provide access to sensitive company and personnel data. Even more devastating is when that exploit is used to encrypt the organization’s data, rendering it unable to continue business operations. A ransom is often requested in exchange for a key to decrypt the data.

While government agencies tell organizations to not give in to ransom demands, little empirical data is available about the outcomes of these attacks. What are the average ransom amounts, data recovery rates, and attacked industry sectors?

Discussed in this article:

  • The majority of ransomware attacks are relegated to two variants
  • Average ransom payments double in three months’ time
  • Loss of revenue tied to increase in downtime
  • Not all industries attacked at similar rate


Phishing Attacks Work Because… Humans

Despite its well-documented history and maturity as a cyber-attack, phishing remains one of the leading methods that attackers use to target enterprise users and infiltrate the workplace. Phishing exploits still work because hackers require only a small percentage of conversions to achieve the goal of acquiring user credentials are studying their targets and employing new techniques to get past email content security filters. Why does phishing continue to haunt security professionals and what can be done to reduce or mitigate the loss of sensitive data?

Included in this article:

  • Phishing’s impact on human behavior
  • The psychology behind phishing requires a layered response


Design Flaws in Cyber Security Reports and Related CISO Sleep Patterns

The role of the CISO isn’t to read all the data and derive a conclusion on their own. Rather, it’s to review the summaries and the opinions of trusted advisors before making decisions or presenting those decisions to the Board.

This article explores how to:

  • Avoid panic or fatigue from data overload
  • Strive for data-driven decision making


RSAC2020: IoT is Officially Part of Enterprise Mobility

The expanded market presence of IoT, 5G, machine learning, cloud security and other factors has resulted in an increasingly decentralized network for enterprise organizations to monitor and secure. This is no surprise to cyber security practitioners and some might even say that this is “the new normal.”

The change in behavior for the contemporary enterprise cyber security leader is less about the procurement of mobile devices and more about the strategic security planning.

Discussed in this article:

  • IoT is officially part of enterprise mobility
  • Are desktop and server threat response processes distracting from mobile defense?
  • Actionable steps for enterprise security leaders
  • The perils of bad wi-fi
  • Identifying desired outcomes in secure enterprise mobility


Preparing Cyber Security Leaders for Regulation and Compliance

Compliance is often viewed as a reaction for organizations. The auditing of compliance becomes the event that is anticipated with resources and preparation aligned to culminate in the audit itself. A famous approach used in product development is that launch is a process; not an event. The spirit of that message is important for security leaders to consider in building a sustainable business case for compliance. Compliance should be viewed as a continuous, organizational process.

Discussed in this article:

  • Realizing the extent of cyber exposure
  • Transforming risk into business measurements


Malware Analysis Strives to Outpace Enterprise Digitalization

An increase in enterprise phishing threats and malware delivery has boosted demand for malware analysis.

Malware analysis is the process by which the purpose and functionality of malware samples are analyzed and determined. The information gathered from the malware analysis provides insights into developing an effective detection technique for the malicious code. In addition, it is an essential element for developing the efficient removal tools that can ultimately eliminate malware from an infected system.

This article looks at:

  • How mobile devices change the malware dynamics
  • A breakdown of the malware analyst market
  • How future enterprise endpoints pose new risks



Quarantini, (Fintech) and Chill?

One of the slightly more controversial products of COVID-19, which has come to light, is the new evolution of a Cryptocurrency named: CoronaCoin. This bitcoin-rival, bragged as “world’s first crypto backed by death” has been made from mostly European anonymous developers, all bar one, named Sunny Kemp. This coin allows traders to gamble on the current coronavirus pandemic.  This works by the cryptocurrency’s supply being based on the world’s population, the tokens diminish every 48 hours and as such, the value is based on how many new cases have been reported, either people falling ill, or dying. This article explores such effects of Covid-19.


Coronavirus - A New Regulatory Risk Facing Firms in the UK Financial Sector

Sushil Kuner from Gowling WLG's Financial Services Regulatory team explores the impact of COVID-19 on Financial Services and some practical steps which firms should consider taking in response.

Discussed in this article:

  • Impact of COVID-19 on Financial Services
  • Contingency measures - key considerations
  • Lessons learnt
  • Next steps


Are the New Kings & Queens of Fintech, Actually the Court Jesters

This article discusses what the Neo-Banks can learn from WeWork. An awful lot it would seem; and it is clear they will be looking over their shoulders and make sure they do not fall into the same trap.


Blockchain in 2020 Part 2

Explored in this article: How does blockchain avoid its Kodak moment? What will 2020 bring for an industry that is looking at the drive for interoperability? What has Mark Zuckerberg got up his sleeve next? Will the real Satoshi Nakamoto announce themselves and start becoming a ubiquitous feature on reality TV shows? All will be revealed for the final time in Part 2 of Blockchain in 2020.



[Webinar] Life Science Leaders Reveal their Stories of Digital Transformation Moving Buyers from Awareness to Decision-Making Faster

Learn why marketers in the pharma space are looking to innovative technologies such as interactive storytelling, laboratory design and product configuration tools, 3D product demonstrations, and augmented and virtual reality to gain an advantage over their competitors as they look to generate cost savings and increase productivity. Discover how to amplify customer experiences, increase profitability and elevate the expertise of sales teams.

This free, on-demand webinar covers how to:

  • Simplify complex benefit stories that go beyond the product by using personalized and relevant simulators, calculators and configuration tools.
  • Eliminate inefficacies with laboratory planning throughout the use of industry-leading digital laboratory design tools that help customers visualize and implement solutions within their own laboratories.
  • Reduce the high cost of product shipping, drayage and logistics when transporting instruments to events or customer demonstrations.


Breaking Down the Barriers to the Lab of the Future

Investment in the laboratory informatics market has been predicted to reach $80bn by 2023 with many pharma companies undertaking digital transformation initiatives across their operations.

These strategies range from the introduction of intelligent lab systems that have the potential to democratize access to data, to the integration of disparate informatics platforms in order to secure a return on investment and enable effective change management strategies in the lab.

This report, produced in collaboration with Dotmatics, aims to answer the concerns of those working within the pharmaceutical realm who are witnessing increasing investment in precision medicine and biologics, as well growing their focus on next-generation sequencing and high-throughput screening – both of which have been fueling the rapid growth in the amount of data generated from each experiment.



Column: Could the impact of the coronavirus be as disruptive and transformative as CASE?

While the human aspect of this outbreak is clearly the biggest story, the virus is also disrupting businesses around the globe.

This article discusses:

  • The impact of COVID-19 on global business and automotive supply chains
  • Managing the risk of catastrophic supply-chain disruption post COVID-19
  • Corona gives manufacturers a reason to try out new models to disrupt traditional thinking
  • What does the future of fighting against force majeure hold?


Automotive IQ Guides: Shared Mobility

Shared mobility is transforming the way commuters, tourists and more move around cities. At the same time, these new mobility solutions are challenging traditional modes of transport, such as the private car, taxi and public transit. There are many mobility services within the context of Mobility as a Service.

This article explores:

  • Which shared mobility services are attracting the most investment
  • What challenges shared mobility has to overcome before the benefits are unlocked
  • Ridesharing mobility services face several challenges before transforming transportation
  • Is driverless car technology alone the solution to the industry’s viability woes?
  • Could carsharing be the answer to traffic congestion, emissions and ownership costs?



Hacking 4 Defense: A Dynamic Approach to Innovation
The Hacking 4 Defense (H4D) initiative came about through the recognition that Defence needed to innovate at speed. As part of Defence iQ's ongoing research into innovation and enterprise transformation in Defence, Hannah Croft spoke with Steve Weinstein, part of the H4D Teaching Team at Stanford University, to find out how the initiative has engendered entrepreneurialism, fostered cross-sector networking, and brought about greater innovation in national security thinking and process.


COVID-19 – Out of Crisis Comes Opportunities for Digital Transformation

In many organizations, the impacts of the Corona Virus on the workforce will accelerate technology, process and policy changes that will permanently enable a more mobile, secure and effective workforce. It is possibly the one positive that can come out of this global seminal event in our lives.

Organizations must seize the opportunity to examine their processes and “no fail” missions and see how those can be better done using a remote and distributed workforce on secure, robust, reliable, and scalable information technology (IT) and Operational Technology (OT) systems.  The challenges in addressing this are both technical and human.

Discussed in this article:

  • “No-fail” missions
  • Information technology and cybersecurity as part of an effective digital strategy
  • Process excellence and digital strategy
  • Digital leadership


Innovation and Enterprise Transformation in the NATO Communications and Informat...

As part of Defence iQ's ongoing research into Innovation and Enterprise Transformation in Defence, Hannah Croft spoke with Dr Michael Street, Head of Innovation and Data Science, and Rasa Pagone, Senior Officer in Industry Relations and the NITEC21 Conference Director at the NCI Agency. They discussed the upcoming Innovation Challenge, the NITEC Conference, and the broader NATO innovation strategy as it relates to defence-industrial relations, technology development and acquisition.


Synthesising Military and Industrial Leadership to Innovate

The respective leadership styles, cultures and organisational structures of the military and of industry are often contrasted. Periodically one side is urged to be more like the other: some argue that the military needs to be more flexible and innovative, whereas industry needs to be more mission-oriented, for instance.

This article explores:

  • Military leadership culture
  • The blessings and curses of a mission-oriented mindset
  • Diversity, flexibility, and talent pools in industry
  • Short-termism in industrial culture
  • Harnessing cross-functional synergy for innovation in defence