

{"id":12630,"date":"2020-01-21T09:14:54","date_gmt":"2020-01-21T14:14:54","guid":{"rendered":"https:\/\/rud.is\/b\/?p=12630"},"modified":"2020-01-21T09:52:20","modified_gmt":"2020-01-21T14:52:20","slug":"davos-2020-world-economic-forum-2020-global-risk-report-cyber-cliffs-notes","status":"publish","type":"post","link":"https:\/\/rud.is\/b\/2020\/01\/21\/davos-2020-world-economic-forum-2020-global-risk-report-cyber-cliffs-notes\/","title":{"rendered":"Davos 2020 World Economic Forum 2020 Global Risk Report Cyber Cliffs Notes"},"content":{"rendered":"<p>Each year the World Economic Forum releases their Global Risk Report around the time of the annual Davos conference. This year&#8217;s report <a href=\"https:\/\/www.weforum.org\/reports\/the-global-risks-report-2020\">is out<\/a> and below are notes on the &#8220;cyber&#8221; content to help others speed-read through those sections (in the event you don&#8217;t read the whole thing). Their expert panel is far from infallible, but\u00a0IMO it&#8217;s worth taking the time to read through their summarized viewpoints. Some of your senior leadership are represented at Davos and either contributed to the report or will be briefed on the report, so it&#8217;s also a good idea just to keep an eye on what they&#8217;ll be told.<\/p>\n<p>Direct link to report PDF: <a href=\"http:\/\/www3.weforum.org\/docs\/WEF_Global_Risk_Report_2020.pdf\">http:\/\/www3.weforum.org\/docs\/WEF_Global_Risk_Report_2020.pdf<\/a>.<\/p>\n<h3>&#8220;Cyber&#8221; Cliffs Notes<\/h3>\n<ul>\n<li>Cyberattacks moved out of the Top 5 Global Risks in terms of Likelihood (page 2)<\/p>\n<\/li>\n<li>\n<p>Cyberattacks remain in the upper-right risk quadrant (page 3)<\/p>\n<\/li>\n<li>\n<p>Cyberattacks likelihood estimation reduced slightly but impact moved up a full half point to ~4.0 (out of 5.0) (page 4)<\/p>\n<\/li>\n<li>\n<p>Cyberattacks are placed as directly related to named risks of: (page 5)<\/p>\n<ul>\n<li>information infrastructure breakdown, (76.2% of the 200+ member expert panel on short-term outlook)<\/li>\n<li>data fraud\/theft, (75.0% of the 200+ member expert panel on short-term outlook) and <\/li>\n<li>adverse tech advances (&lt;70% of the 200+ member expert panel on short-term outlook)<\/li>\n<\/ul>\n<p>All three of which have their own relationships (it&#8217;s worth tracing them out as an exercise in downstream impact potential if one hasn&#8217;t worked through a  risk relationship exercise before)<\/p>\n<\/li>\n<li>\n<p>Cyberattacks remain on the long-term outlook (next 10 years) for both likelihood and impact by all panel sectors<\/p>\n<\/li>\n<li>\n<p>Pages 61-71 cover the &#8220;Fourth Industrial Revolution&#8221; (4IR) and cyberattacks are mentioned on every page.<\/p>\n<ul>\n<li>There are 2025 market projections that might be useful as deck fodder. <\/li>\n<li>Interesting statistic that 50% of the world&#8217;s population is online and that one million additional people are joining the internet daily. <\/li>\n<li>The notion of nation-state mandated &#8220;parallel cyberspaces&#8221; is posited (we&#8217;re seeing that develop in Russia and some other countries right now). <\/li>\n<li>They also mention the proliferation of patents to create and enforce a first-mover advantage <\/li>\n<li>Last few pages of the section have a wealth of external resources that are worth perusing<\/li>\n<\/ul>\n<\/li>\n<li>In the health section on page 78 they mention the susceptibility of health data to cyberattacks<\/p>\n<\/li>\n<li>\n<p>They list out specific scenarios in the back; many have a cyber component<\/p>\n<ul>\n<li>Page 92: <strong>&#8220;Geopolitical risk&#8221;<\/strong>: Interstate conflict with regional consequences &#8212; <em>A bilateral or multilateral dispute between states that escalates into economic (e.g. trade\/currency wars, resource nationalization), military, cyber, societal or other conflict.<\/em><\/p>\n<\/li>\n<li>\n<p>Page 92: <strong>&#8220;Technological risk&#8221;<\/strong>: Breakdown of critical information infrastructure and networks &#8212; <em>Cyber dependency that increases vulnerability to outage of critical information infrastructure (e.g. internet, satellites) and networks, causing widespread disruption.<\/em><\/p>\n<\/li>\n<li>\n<p>Page 92: <strong>&#8220;Technological risk&#8221;<\/strong>: Large-scale cyberattacks &#8212; <em>Large-scale cyberattacks or malware causing large economic damage, geopolitical tensions or widespread loss of trust in the internet.<\/em><\/p>\n<\/li>\n<li>\n<p>Page 92: <strong>&#8220;Technological risk&#8221;<\/strong>: Massive incident of data fraud or theft &#8212; <em>Wrongful exploitation of private or official data that takes place on an unprecedented scale.<\/em><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>FIN<\/h3>\n<p>Hopefully this saved folks some time, and I&#8217;m curious as to how others view the Ouija board scrawls of this expert panel when it comes to cybersecurity predictions, scenarios, and ratings.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Each year the World Economic Forum releases their Global Risk Report around the time of the annual Davos conference. This year&#8217;s report is out and below are notes on the &#8220;cyber&#8221; content to help others speed-read through those sections (in the event you don&#8217;t read the whole thing). Their expert panel is far from infallible, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[681,4,66,650],"tags":[],"class_list":["post-12630","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","category-risk","category-risk-assessment","category-risk-management-2"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Davos 2020 World Economic Forum 2020 Global Risk Report Cyber Cliffs Notes - rud.is<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rud.is\/b\/2020\/01\/21\/davos-2020-world-economic-forum-2020-global-risk-report-cyber-cliffs-notes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Davos 2020 World Economic Forum 2020 Global Risk Report Cyber Cliffs Notes - rud.is\" \/>\n<meta property=\"og:description\" content=\"Each year the World Economic Forum releases their Global Risk Report around the time of the annual Davos conference. This year&#8217;s report is out and below are notes on the &#8220;cyber&#8221; content to help others speed-read through those sections (in the event you don&#8217;t read the whole thing). Their expert panel is far from infallible, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rud.is\/b\/2020\/01\/21\/davos-2020-world-economic-forum-2020-global-risk-report-cyber-cliffs-notes\/\" \/>\n<meta property=\"og:site_name\" content=\"rud.is\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-21T14:14:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-01-21T14:52:20+00:00\" \/>\n<meta name=\"author\" content=\"hrbrmstr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"hrbrmstr\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2020\\\/01\\\/21\\\/davos-2020-world-economic-forum-2020-global-risk-report-cyber-cliffs-notes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2020\\\/01\\\/21\\\/davos-2020-world-economic-forum-2020-global-risk-report-cyber-cliffs-notes\\\/\"},\"author\":{\"name\":\"hrbrmstr\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"headline\":\"Davos 2020 World Economic Forum 2020 Global Risk Report Cyber Cliffs Notes\",\"datePublished\":\"2020-01-21T14:14:54+00:00\",\"dateModified\":\"2020-01-21T14:52:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2020\\\/01\\\/21\\\/davos-2020-world-economic-forum-2020-global-risk-report-cyber-cliffs-notes\\\/\"},\"wordCount\":545,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"articleSection\":[\"Cybersecurity\",\"Risk\",\"Risk Assessment\",\"Risk Management\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/rud.is\\\/b\\\/2020\\\/01\\\/21\\\/davos-2020-world-economic-forum-2020-global-risk-report-cyber-cliffs-notes\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2020\\\/01\\\/21\\\/davos-2020-world-economic-forum-2020-global-risk-report-cyber-cliffs-notes\\\/\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/2020\\\/01\\\/21\\\/davos-2020-world-economic-forum-2020-global-risk-report-cyber-cliffs-notes\\\/\",\"name\":\"Davos 2020 World Economic Forum 2020 Global Risk Report Cyber Cliffs Notes - rud.is\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#website\"},\"datePublished\":\"2020-01-21T14:14:54+00:00\",\"dateModified\":\"2020-01-21T14:52:20+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2020\\\/01\\\/21\\\/davos-2020-world-economic-forum-2020-global-risk-report-cyber-cliffs-notes\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/rud.is\\\/b\\\/2020\\\/01\\\/21\\\/davos-2020-world-economic-forum-2020-global-risk-report-cyber-cliffs-notes\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2020\\\/01\\\/21\\\/davos-2020-world-economic-forum-2020-global-risk-report-cyber-cliffs-notes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/rud.is\\\/b\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Davos 2020 World Economic Forum 2020 Global Risk Report Cyber Cliffs Notes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#website\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/\",\"name\":\"rud.is\",\"description\":\"&quot;In God we trust. All others must bring data&quot;\",\"publisher\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/rud.is\\\/b\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\",\"name\":\"hrbrmstr\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"width\":460,\"height\":460,\"caption\":\"hrbrmstr\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\"},\"description\":\"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7\",\"sameAs\":[\"http:\\\/\\\/rud.is\"],\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/author\\\/hrbrmstr\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Davos 2020 World Economic Forum 2020 Global Risk Report Cyber Cliffs Notes - rud.is","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rud.is\/b\/2020\/01\/21\/davos-2020-world-economic-forum-2020-global-risk-report-cyber-cliffs-notes\/","og_locale":"en_US","og_type":"article","og_title":"Davos 2020 World Economic Forum 2020 Global Risk Report Cyber Cliffs Notes - rud.is","og_description":"Each year the World Economic Forum releases their Global Risk Report around the time of the annual Davos conference. This year&#8217;s report is out and below are notes on the &#8220;cyber&#8221; content to help others speed-read through those sections (in the event you don&#8217;t read the whole thing). Their expert panel is far from infallible, [&hellip;]","og_url":"https:\/\/rud.is\/b\/2020\/01\/21\/davos-2020-world-economic-forum-2020-global-risk-report-cyber-cliffs-notes\/","og_site_name":"rud.is","article_published_time":"2020-01-21T14:14:54+00:00","article_modified_time":"2020-01-21T14:52:20+00:00","author":"hrbrmstr","twitter_card":"summary_large_image","twitter_misc":{"Written by":"hrbrmstr","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/rud.is\/b\/2020\/01\/21\/davos-2020-world-economic-forum-2020-global-risk-report-cyber-cliffs-notes\/#article","isPartOf":{"@id":"https:\/\/rud.is\/b\/2020\/01\/21\/davos-2020-world-economic-forum-2020-global-risk-report-cyber-cliffs-notes\/"},"author":{"name":"hrbrmstr","@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"headline":"Davos 2020 World Economic Forum 2020 Global Risk Report Cyber Cliffs Notes","datePublished":"2020-01-21T14:14:54+00:00","dateModified":"2020-01-21T14:52:20+00:00","mainEntityOfPage":{"@id":"https:\/\/rud.is\/b\/2020\/01\/21\/davos-2020-world-economic-forum-2020-global-risk-report-cyber-cliffs-notes\/"},"wordCount":545,"commentCount":0,"publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"articleSection":["Cybersecurity","Risk","Risk Assessment","Risk Management"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/rud.is\/b\/2020\/01\/21\/davos-2020-world-economic-forum-2020-global-risk-report-cyber-cliffs-notes\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/rud.is\/b\/2020\/01\/21\/davos-2020-world-economic-forum-2020-global-risk-report-cyber-cliffs-notes\/","url":"https:\/\/rud.is\/b\/2020\/01\/21\/davos-2020-world-economic-forum-2020-global-risk-report-cyber-cliffs-notes\/","name":"Davos 2020 World Economic Forum 2020 Global Risk Report Cyber Cliffs Notes - rud.is","isPartOf":{"@id":"https:\/\/rud.is\/b\/#website"},"datePublished":"2020-01-21T14:14:54+00:00","dateModified":"2020-01-21T14:52:20+00:00","breadcrumb":{"@id":"https:\/\/rud.is\/b\/2020\/01\/21\/davos-2020-world-economic-forum-2020-global-risk-report-cyber-cliffs-notes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rud.is\/b\/2020\/01\/21\/davos-2020-world-economic-forum-2020-global-risk-report-cyber-cliffs-notes\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/rud.is\/b\/2020\/01\/21\/davos-2020-world-economic-forum-2020-global-risk-report-cyber-cliffs-notes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rud.is\/b\/"},{"@type":"ListItem","position":2,"name":"Davos 2020 World Economic Forum 2020 Global Risk Report Cyber Cliffs Notes"}]},{"@type":"WebSite","@id":"https:\/\/rud.is\/b\/#website","url":"https:\/\/rud.is\/b\/","name":"rud.is","description":"&quot;In God we trust. All others must bring data&quot;","publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rud.is\/b\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886","name":"hrbrmstr","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","contentUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","width":460,"height":460,"caption":"hrbrmstr"},"logo":{"@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1"},"description":"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7","sameAs":["http:\/\/rud.is"],"url":"https:\/\/rud.is\/b\/author\/hrbrmstr\/"}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p23idr-3hI","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":4886,"url":"https:\/\/rud.is\/b\/2017\/01\/16\/the-devils-in-the-davos-details-a-quick-look-at-this-years-wef-global-risks-report\/","url_meta":{"origin":12630,"position":0},"title":"The Devil&#8217;s in the [Davos] Details \u2014 A quick look at this year&#8217;s WEF Global Risks Report","author":"hrbrmstr","date":"2017-01-16","format":false,"excerpt":"It's Davos time again. Each year the World Economic Forum (WEF) gathers the global elite together to discuss how they're going to shape our collective future. WEF also releases their annual Global Risks Report at the same time. I read it every year and have, in the past, borrowed some\u2026","rel":"","context":"In &quot;R&quot;","block_context":{"text":"R","link":"https:\/\/rud.is\/b\/category\/r\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2017\/01\/Cursor_and___Development_devils_in_the_davos_-_RStudio-4.png?fit=1200%2C536&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2017\/01\/Cursor_and___Development_devils_in_the_davos_-_RStudio-4.png?fit=1200%2C536&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2017\/01\/Cursor_and___Development_devils_in_the_davos_-_RStudio-4.png?fit=1200%2C536&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2017\/01\/Cursor_and___Development_devils_in_the_davos_-_RStudio-4.png?fit=1200%2C536&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2017\/01\/Cursor_and___Development_devils_in_the_davos_-_RStudio-4.png?fit=1200%2C536&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":2089,"url":"https:\/\/rud.is\/b\/2013\/02\/19\/redux-reassessing-cyber-risks-as-a-security-strategy\/","url_meta":{"origin":12630,"position":1},"title":"[REDUX] Reassessing Cyber Risks as a Security Strategy","author":"hrbrmstr","date":"2013-02-19","format":false,"excerpt":"I happened across [Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy](http:\/\/scholarcommons.usf.edu\/cgi\/viewcontent.cgi?article=1107&context=jss) [PDF] when looking for something else at the [Journal of Strategic Security](http:\/\/scholarcommons.usf.edu\/jss\/) site and thought it was a good enough primer to annoy everyone with a tweet about it. The paper is\u2014well\u2014_kinda_ wordy and has a\u2026","rel":"","context":"In &quot;Cybersecurity&quot;","block_context":{"text":"Cybersecurity","link":"https:\/\/rud.is\/b\/category\/cybersecurity\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":44636,"url":"https:\/\/rud.is\/b\/2026\/01\/10\/ai-proofing-your-it-cyber-career-the-human-only-capabilities-that-matter\/","url_meta":{"origin":12630,"position":2},"title":"AI Proofing Your It\/cyber Career: The Human Only Capabilities That Matter","author":"hrbrmstr","date":"2026-01-10","format":false,"excerpt":"In the past ~4 weeks I have personally observed some irrefutable things in \"AI\" that are very likely going to cause massive shocks to employment models in IT, software development, systems administration, and cybersecurity. I know some have already seen minor shocks. They are nothing compared to what's highly probably\u2026","rel":"","context":"In &quot;AI&quot;","block_context":{"text":"AI","link":"https:\/\/rud.is\/b\/category\/ai\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1033,"url":"https:\/\/rud.is\/b\/2012\/05\/10\/off-by-one-the-importance-of-fact-checking-breach-reports\/","url_meta":{"origin":12630,"position":3},"title":"Off By One : The Importance Of Fact Checking Breach Reports","author":"hrbrmstr","date":"2012-05-10","format":false,"excerpt":"I didn't read through the Massachusetts 2011 Report on Data Breach Notifications\u00a0[PDF] until recently, but once I went through the report my brain kept telling me \"something is wrong\". Not something earth shattering, but more of a \"something is off\" signal. This happens more than I'd like as I tend\u2026","rel":"","context":"In &quot;Breach&quot;","block_context":{"text":"Breach","link":"https:\/\/rud.is\/b\/category\/breach\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":563,"url":"https:\/\/rud.is\/b\/2011\/06\/14\/weis-2011-keynote-dr-christopher-greer\/","url_meta":{"origin":12630,"position":4},"title":"WEIS 2011 :: Keynote :: Dr Christopher Greer","author":"hrbrmstr","date":"2011-06-14","format":false,"excerpt":"Dr Greer [cgreer at ostp.eop.gov] is Assistant Director, Information Technology R&D, Office of Science & Technology Policy, The White House Opening: \"The expertise of the attendees is greatly needed.\" He provided a broad overview of the goals & initiatives of the federal government as they relate to domestic & international\u2026","rel":"","context":"In &quot;Information Security&quot;","block_context":{"text":"Information Security","link":"https:\/\/rud.is\/b\/category\/information-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":9392,"url":"https:\/\/rud.is\/b\/2018\/04\/02\/nykolas-z-updates-global-alternative-dns-speed-test-to-include-cloudflare-1-1-1-1\/","url_meta":{"origin":12630,"position":5},"title":"Nykolas Z Updates Global Alternative DNS Speed Test to Include Cloudflare (1.1.1.1)","author":"hrbrmstr","date":"2018-04-02","format":false,"excerpt":"A while back, Medium blogger 'Nykolas Z' posted results from a globally distributed DNS resolver test to find the speediest provider (NOTE: speed is not the only consideration when choosing an alternative DNS provider). While the test methodology is not provided (the \"scientific method\" has yet to fully penetrate \"cyber\")\u2026","rel":"","context":"In &quot;DNS&quot;","block_context":{"text":"DNS","link":"https:\/\/rud.is\/b\/category\/dns\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2018\/04\/cf-speed.png?fit=1200%2C663&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2018\/04\/cf-speed.png?fit=1200%2C663&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2018\/04\/cf-speed.png?fit=1200%2C663&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2018\/04\/cf-speed.png?fit=1200%2C663&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2018\/04\/cf-speed.png?fit=1200%2C663&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/12630","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/comments?post=12630"}],"version-history":[{"count":0,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/12630\/revisions"}],"wp:attachment":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/media?parent=12630"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/categories?post=12630"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/tags?post=12630"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}