This is the final of three posts for improving front end capacity to prevent and detect predatory physical access and programs access attacks to critical infrastructure facilitated by bogus documents. The potential of security and front line employees face-to-face with would-be attackers is often underutilized. Hereafter this article refers to security and front line employees …
Deception: Nonverbal Behaviour
Risk appetite at Critical Infrastructure depends on the the level of threat and anticipated outcome of a security compromise. The outcome was catastrophic from terrorist boarding airplanes in Boston [2001] and crashing them into the World Trade Center, the Pentagon and a field in Pennsylvania. There was a lot of political noise post-911. What to …
Affective Realism
“We do not passively detect information in the world and then react to it — we construct perceptions of the world as the architects of our own experience.” Researchers on affective realism are arriving at a consensus that, at any given moment, emotional state influences perception of information received through sensory channels, with the exception …
Heath Care: Outside-the-System Fraud Controls
This is the last in this three part series on the financial harms posed by misuse, abuse and fraud. The last post addressed inside-the-system threats.This post concentrates on outside-the-system threats. Predation is a different cup of tea than reducing threats posed by trusted billing agents cheating a little bit. Although outside-the-system attacks may involve corrupting …
Health Care Systems: Inside-the-System Billing Abuse Controls
The current experience with COVID-19, reinforces public health and health care as an integral part of our nation’s critical infrastructure. Public and private health care insurance organizations are complex systems. These organizations are vulnerable to financial harms. This post reviews “inside-the-system” harms. Outside-the-system threats will be separately posted. There are times when these threats inter-relate. …
Health Care Systems: Misuse, Abuse & Predatory Fraud Controls
Health care is part of a nation’s critical infrastructure (CI). It is the largest public cash dispensing sector of the United States and Canadian economies. Ten times that of defense. Health care services delivery is an extraordinarily complex system. Within this context, conversation on misuse, abuse and predatory fraud controls must be broken down into …
The Complexity of Uniform Policing
Risk assessment for critical infrastructure assumes uniform police will run at catastrophic and violence events everyone else is running away from. Often they must make time-sensitive judgments on personal and public safety in high anxiety environments. At the same time, the public and the courts expect uniform police , as primary sensory and verbal information …
About Tranzform-security
This inaugural post introduces tranzform-security. We believe in a dynamic approach to security practice at critical infrastructure (CI). We draws from science in order to extend the boundaries on how we mostly think about security. Critical infrastructures are ‘complex systems’. The human threats posed to CI manifest in two subcategories. Exogenous [outside the system] threats include acts …
Design Thinking: a foundation for Business Innovation
Submitted by PBenedicto on Wed, 02/13/2013 – 22:09 “Innovate or Die” is a popular expression among thought leaders to describe the economic and cultural climate we now do business in. Technology’s impact on people and business continues to evolve the way we communicate, work and live at a disruptive pace. Businesses need to respond by …
Organizational Design from the Industrial Age to the Digital Age
Submitted by rroyer on Sun, 01/13/2013 – 22:59 As the Information Age continues to evolve at a rapid rate, businesses are finding it challenging to compete in their marketplace. New technologies, global markets, demanding customers, disengaged employees and aggressive competitors are placing unprecedented pressure on many companies, who must now rethink the way they do …
Can the Enterprise Strike Back?
Submitted by Martin Sumner-Smith on Fri, 10/12/2012 – 16:17 Most people have written-off Research in Motion (RIM) and their Blackberry platform. But then most people take a consumer’s perspective in making that assessment. RIM is making a play to its traditional strength – security. But it is considering security for both enterprises and consumers. Security …
Not all users are bad, but they may not be paying attention
Submitted by Martin Sumner-Smith on Fri, 02/10/2012 – 09:34 Yesterday, in the As the pendulum swings – Users vs. the Enterprise, I discussed how the balance between the needs of staff users and those of the enterprise that employs them has recently swung strongly to favor users as a result of consumerization.My perspective was that …
As the pendulum swings – Users vs. the Enterprise
Submitted by Martin Sumner-Smith on Wed, 02/08/2012 – 14:07 There have been two traditional enemies of Enterprise Content Management (ECM) adoption: Email Shared network folders/drives For most users in an enterprise (i.e. staff), it is simply easier to send a file to a colleague through email than it is to first deposit the file and …
Engaging Content. Whether to Embed or Link?
Submitted by Martin Sumner-Smith on Mon, 11/21/2011 – 14:44 Showing a collection of PowerPoint slides pulled from an OpenText Content Server was the subject of a recent post. At that time, I used presentations from our Content World Users’ conference of a year ago to show how a collection of related materials from a secure …
Video at Work – Video Services for Content Server
Submitted by Martin Sumner-Smith on Tue, 11/15/2011 – 12:33 I’m a big fan of video for work applications. It’s the best way to get information to staff quickly. As such I’ve been using the OpenText Video Service (OTVS) for some time. In fact, we recently developed a ‘Success Story’ about our own use of the …