This is the final of three posts for improving front end capacity to prevent and detect predatory physical access and programs access attacks to critical infrastructure facilitated by bogus documents. The potential of security and front line employees face-to-face with would-be attackers is often underutilized. Hereafter this article refers to security and front line employees …
Deception: Nonverbal Behaviour
Risk appetite at Critical Infrastructure depends on the the level of threat and anticipated outcome of a security compromise. The outcome was catastrophic from terrorist boarding airplanes in Boston [2001] and crashing them into the World Trade Center, the Pentagon and a field in Pennsylvania. There was a lot of political noise post-911. What to …
Affective Realism
“We do not passively detect information in the world and then react to it — we construct perceptions of the world as the architects of our own experience.” Researchers on affective realism are arriving at a consensus that, at any given moment, emotional state influences perception of information received through sensory channels, with the exception …
Heath Care Systems: Outside-the-System Predatory Fraud Controls (3 of 3)
This is the last in this three part series on the financial harms posed by misuse, abuse and predation. The last post explored inside-the-system threats. This post explores outside-the-system threats. Predation is a different cup of tea than reducing threats posed by trusted billing agents being careless with resources or cheating a little bit. Although …
Health Care Systems: Inside-the-System Billing Abuse Controls (2 of 3)
This is the second of a three part series of articles addressing misuse, abuse and predatory practices causing financial harms to health care systems. This post explores “inside-the-system“ financial harms. The third in this series will review “outside-the-system” harms. The reference to “systems” is important. Becoming effective and controlling financial harms will require a system …
Health Care Systems: Misuse, Abuse & Predatory Fraud Controls (1 of 3)
Health care is an integral part of a nation’s critical infrastructure (CI). It is the largest public cash dispensing sector in the United States and Canadian economies. Ten times that of defense. Health care services delivery is an extraordinarily complex system. Within this context, conversation on misuse, abuse and predation (fraud) controls must be broken …
The Complexity of Uniform Policing
Risk assessment for critical infrastructure assumes uniform police will run at catastrophic and violence events everyone else is running away from. Often they must make time-sensitive judgments on personal and public safety in high anxiety environments. At the same time, the public and the courts expect uniform police , as primary sensory and verbal information …
About Tranzform-security
This inaugural post introduces tranzform-security. We believe in a dynamic approach to security practice at critical infrastructure (CI). We draws from science in order to extend the boundaries on how we mostly think about security. Critical infrastructures are ‘complex systems’. The human threats posed to CI manifest in two subcategories. Exogenous [outside the system] threats include acts …
Design Thinking: a foundation for Business Innovation
Submitted by PBenedicto on Wed, 02/13/2013 – 22:09 “Innovate or Die” is a popular expression among thought leaders to describe the economic and cultural climate we now do business in. Technology’s impact on people and business continues to evolve the way we communicate, work and live at a disruptive pace. Businesses need to respond by …
Organizational Design from the Industrial Age to the Digital Age
Submitted by rroyer on Sun, 01/13/2013 – 22:59 As the Information Age continues to evolve at a rapid rate, businesses are finding it challenging to compete in their marketplace. New technologies, global markets, demanding customers, disengaged employees and aggressive competitors are placing unprecedented pressure on many companies, who must now rethink the way they do …
Can the Enterprise Strike Back?
Submitted by Martin Sumner-Smith on Fri, 10/12/2012 – 16:17 Most people have written-off Research in Motion (RIM) and their Blackberry platform. But then most people take a consumer’s perspective in making that assessment. RIM is making a play to its traditional strength – security. But it is considering security for both enterprises and consumers. Security …
Not all users are bad, but they may not be paying attention
Submitted by Martin Sumner-Smith on Fri, 02/10/2012 – 09:34 Yesterday, in the As the pendulum swings – Users vs. the Enterprise, I discussed how the balance between the needs of staff users and those of the enterprise that employs them has recently swung strongly to favor users as a result of consumerization.My perspective was that …
As the pendulum swings – Users vs. the Enterprise
Submitted by Martin Sumner-Smith on Wed, 02/08/2012 – 14:07 There have been two traditional enemies of Enterprise Content Management (ECM) adoption: Email Shared network folders/drives For most users in an enterprise (i.e. staff), it is simply easier to send a file to a colleague through email than it is to first deposit the file and …
Engaging Content. Whether to Embed or Link?
Submitted by Martin Sumner-Smith on Mon, 11/21/2011 – 14:44 Showing a collection of PowerPoint slides pulled from an OpenText Content Server was the subject of a recent post. At that time, I used presentations from our Content World Users’ conference of a year ago to show how a collection of related materials from a secure …
Video at Work – Video Services for Content Server
Submitted by Martin Sumner-Smith on Tue, 11/15/2011 – 12:33 I’m a big fan of video for work applications. It’s the best way to get information to staff quickly. As such I’ve been using the OpenText Video Service (OTVS) for some time. In fact, we recently developed a ‘Success Story’ about our own use of the …