Perspective

Insights, perspective, and analysis for navigating the ever-evolving cybersecurity landscape.

Kenneth Holley Kenneth Holley

Issue Thirty Three

A tidal wave of stringent cyber regulations now permeates every economic sector, making security central to business integrity and supply chain resilience. Moreover, enterprises must elevate data governance to ensure integrity and drive decision-making amid surging volumes, lest they risk chaos. Interlacing these trends, emerging quantum computing capabilities could introduce dramatic improvements in cyber defense and data analytics via advanced encryption and processing. This regulatory, data and innovation convergence signals that leaders must recognize cybersecurity, governance and quantum progress as interconnected strategic opportunities. To extract maximum value, businesses need cross-disciplinary collaboration rather than siloed functions. This nexus collectively crafts a landscape that is markedly more secure, effective and technologically advanced. However, seizing this potential hinges on integrating their symbiosis into corporate strategy.

Read More
Kenneth Holley Kenneth Holley

Issue Thirty Two

The recent executive order on AI development offers vital guidance, not just for the public sector but also private enterprises pursuing ethical integration. It emphasizes persistent governance throughout systems' lifecycles via regular auditing, monitoring and alignment with evolving societal values. This continuous oversight ensures AI solutions remain ethical long after initial deployment. Comprehensive workforce training embeds responsible innovation, while transparency around processes builds public trust. Additional tenets like impact assessments and advisory boards oversight inject diverse perspectives into identifying issues. Ultimately this order provides a strategic blueprint for aligning AI with democratic principles in a way that manages inherent risks and establishes credibility. Rather than a check-box compliance exercise, it enables creating technology that uplifts humanity.

Read More
Kenneth Holley Kenneth Holley

Issue Thirty One

Amid hype around emerging technologies like AI, pragmatism and ethical foundations remain vital - gradual piloting with oversight can balance demands and mitigate risks. Precisely targeted phishing also threatens organizations, requiring human vigilance to complement controls and enhance prevention, response and detection. Though technical capabilities rapidly advance, human knowledge accrues slowly - upholding duties over expediency is crucial. With pragmatic patience, vigilance and principles, leaders can harness innovations prudently, amplifying human potential and discernment. Our guidance will shape whether technologies steer toward progress or catastrophe. The future awaits our wisdom.

Read More
Kenneth Holley Kenneth Holley

Issue Thirty

Complacency often takes root after major cybersecurity implementations, but static defenses degrade over time. Leaders must combat this by framing security as an ongoing journey, modeling vigilance, and aligning cyber priorities with business goals through consistent involvement and education. Resilient security also demands evolving incident response from reactive plans to proactive, coordinated strategies leveraging threat intelligence. Ultimately, resilience requires leaders drive adaptation across both strategy and operations, treating cybersecurity as an integrated, living system demanding sustained commitment.

Read More
Kenneth Holley Kenneth Holley

Issue Twenty Nine

In a world where digital transformation is no longer optional, businesses are racing to harness the full potential of AI advancements, a journey fraught with both unprecedented opportunities and evolving threats. McKinsey's recent study in the banking sector unveils the remarkable dividends awaiting digital leaders who dare to reimagine the end-to-end process, leveraging AI not just as a tool but as a catalyst for holistic transformation.

Read More
Kenneth Holley Kenneth Holley

Issue Twenty Eight

This issue of Target Lock illuminates the path on our journey to a secure digital future, navigating the intertwining realms of human behavior, data security, software liability, and digital trust. As we innovate and evolve, earning and maintaining digital trust will unlock the profound advantages of adaptability, vigilance, and accountability - crafting the future of cybersecurity.

Read More
Kenneth Holley Kenneth Holley

Issue Twenty Seven

Businesses today are faced with a pressing imperative: to integrate ethical digital practices deeply into their organizational fabric. The synergy between digital responsibility, cybersecurity strategy, and threat understanding isn't just beneficial—it's critical. These are not merely boxes to be checked; they’re priorities that garner trust and loyalty from consumers, employees, and investors alike. Achieving this trust, however, is a challenging task, given the continuously evolving landscape.

Read More
Kenneth Holley Kenneth Holley

Issue Twenty Six

In the dynamic realm of the digital world, the thin line between opportunity and risk is where organizations navigate daily, especially when it comes to cybersecurity. According to a disquieting report by the National Association of Corporate Directors (NACD), corporate boards are often engaged in the wrong conversations about cybersecurity. The resulting misalignment with their Chief Information Security Officers (CISOs), misplaced focus on protection rather than resilience, and a lack of understanding of cybersecurity as an organizational and strategic imperative, are creating considerable security vulnerabilities.

Read More
Kenneth Holley Kenneth Holley

Issue Twenty Five

Organizations are facing increasingly complex challenges, such as the convergence of business and IT risk, the rise of misinformation-driven cyberattacks, and the critical importance of password security. The post-pandemic era has accelerated the integration of business and cybersecurity threats, forcing companies to adopt a holistic approach to risk management. Cybercriminals, adept at exploiting misinformation, have crafted sophisticated financial scams, targeting businesses and individuals. Additionally, the often-overlooked aspect of password management poses significant risks, with the potential for misuse by former employees.

Read More
Kenneth Holley Kenneth Holley

Issue Twenty Four

The constant evolution of our landscape is introducing new challenges in cybersecurity, data privacy, and international relations. With cyberattacks posing a constant threat to businesses, it has become increasingly apparent that developing a proactive communication strategy is essential to survive and thrive in this digital age. Organizations must focus on transparency, accuracy, and adaptability - fostering resilience in the face of adversity.

Read More
Kenneth Holley Kenneth Holley

Issue Twenty Three

We’re seeing business leaders, global cybersecurity leaders, and the Federal Government calling for action. The message is clear: We cannot maintain the status quo and expect to catch up to national and global threats. Collaboration and automation are common themes within the discussions – in large part to combat the massive increase in threats, but also to address the impact of the talent shortage on the industry.

Read More
Kenneth Holley Kenneth Holley

Issue Twenty Two

The cybersecurity and data privacy conversations continue to gain velocity, illuminating confusion around the relationship between the two. Organizations understand the importance of building digital trust, but there’s work to be done around properly staffing, funding, and managing privacy and security initiatives. The digital economy we have all become a part of insists that we are active participants in protecting the infrastructure we’re responsible for.

Read More