“
A robust cybersecurity framework is essential to protect a company's digital assets, sensitive data, and critical infrastructure.
”
”
Hendrith Vanlon Smith Jr. (Board Room Blitz: Mastering the Art of Corporate Governance)
“
There is a fine line between free speech and hate speech. Free speech encourages debate whereas hate speech incites violence.
”
”
Newton Lee (Counterterrorism and Cybersecurity: Total Information Awareness)
“
Risk management and cybersecurity have transcended their traditional roles as mere compliance functions and have become fundamental pillars of good corporate governance.
”
”
Hendrith Vanlon Smith Jr. (Board Room Blitz: Mastering the Art of Corporate Governance)
“
By actively overseeing and providing guidance on risk management and cybersecurity, the board demonstrates its commitment to protecting the company's assets, reputation, and long-term success.
”
”
Hendrith Vanlon Smith Jr. (Board Room Blitz: Mastering the Art of Corporate Governance)
“
In today's volatile business landscape, characterized by rapid technological advancements, geopolitical uncertainties, and evolving regulatory frameworks, companies must adopt a proactive and holistic approach to risk management and cybersecurity.
”
”
Hendrith Vanlon Smith Jr. (Board Room Blitz: Mastering the Art of Corporate Governance)
“
The importance of epistemic security and cybersecurity is now comparable to that of national security.
”
”
Roger Spitz (The Definitive Guide to Thriving on Disruption: Volume I - Reframing and Navigating Disruption)
“
As the world is increasingly interconnected, everyone shares the responsibility of securing cyberspace.
”
”
Newton Lee (Counterterrorism and Cybersecurity: Total Information Awareness)
“
When manipulated, personalized information becomes even more convincing, and truth evades objectivity, morphing into a subjective reality for every individual.
”
”
Roger Spitz (Disrupt With Impact: Achieve Business Success in an Unpredictable World)
“
If you spend more on coffee than on IT security, you will be hacked. What's more, you deserve to be hacked
”
”
Richard Clarke
“
Technology trust is a good thing, but control is a better one.
”
”
Stephane Nappo
“
In the underworld, reality itself has elastic properties and is capable of being stretched into different definitions
of the truth.
”
”
Roderick Vincent (The Cause (The Minutemen Series, #1))
“
Journalists should be watchdogs, not lapdogs.
”
”
Newton Lee (Counterterrorism and Cybersecurity: Total Information Awareness)
“
The two-way street of Total Information Awareness is the road that leads to a more transparent and complete picture of ourselves, our governments, and our world.
”
”
Newton Lee (Counterterrorism and Cybersecurity: Total Information Awareness)
“
While information is the oxygen of the modern age, disinformation is the carbon monoxide that can poison generations.
”
”
Newton Lee (Counterterrorism and Cybersecurity: Total Information Awareness)
“
To competently perform rectifying security service, two critical incident response elements are necessary: information and organization.
”
”
Robert E. Davis
“
The five most efficient cyber defenders are: Anticipation, Education, Detection, Reaction and Resilience. Do remember: "Cybersecurity is much more than an IT topic.
”
”
Stephane Nappo
“
War is legitimized state-sponsored terrorism in a grand scale.
”
”
Newton Lee (Counterterrorism and Cybersecurity: Total Information Awareness)
“
The U.S. government needs to learn from successful private businesses that run an effective and efficient operation in serving their customers and outwitting their competitors.
”
”
Newton Lee (Counterterrorism and Cybersecurity: Total Information Awareness)
“
If we take a small step in extolling peacemakers as much as honoring war heroes, we will be making a giant leap towards peace.
”
”
Newton Lee (Counterterrorism and Cybersecurity: Total Information Awareness)
“
It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it.
”
”
Stephane Nappo
“
Li, a willowy manboy with a shock of black hair atop a mouthful of bad teeth was the brother-in-law he had introduced to industrial espionage several years back. Rong often regretted that.
”
”
Michael Ben Zehabe
“
Dora Flores was one of the few people Tom confided in. She reported to him as Cyber Division’s Inner-Office Field Support. She still had a slight Mexican flavor in her pronunciations, and he liked it.
”
”
Michael Ben Zehabe
“
Every conceivable layer of the election process is completely riddled with vulnerabilities, so yes, hacking elections is easy!
”
”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“
An open internet is an open platform for debating opposing views. It allows unpopular voices to be heard.
”
”
Newton Lee (Counterterrorism and Cybersecurity: Total Information Awareness)
“
If you think you know-it-all about cybersecurity, this discipline was probably ill-explained to you.
”
”
Stephane Nappo
“
Cybersecurity is a new area where equality will exist to allow intelligence to succeed.
Cybersecurity needs women to be successful and without them it will not as the best talent a must.
”
”
Ian R. McAndrew, PhD
“
Your ideas are bound to forces of which you have no control due to the fact that you've voluntarily submitted your freedom of though to the perception steering censorship of Google, Facebook and other dragnet surveillance capitalists.
”
”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“
Quantum Encryption is essential to protect our digital assets and infrastructure from attackers.
”
”
Kevin Coleman
“
Consider all tabulation systems infected by bad actors until a third party, not affiliated with the manufacturer or election officials, proves they are secure.
”
”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“
Cities require connectivity rather than territory in order to drive their economic stability and growth.
”
”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“
The enormous amount of financial resources and creative energy that nations have spent on wars and weapons could have been redirected to curing deadly diseases, feeding the hungry, eliminating poverty, promoting art and culture, investing in renewable clean energy, and solving a host of other important challenges facing humanity.
”
”
Newton Lee (Counterterrorism and Cybersecurity: Total Information Awareness)
“
Dean Rolfe squirmed, coughed, and looked everywhere except in Frank’s eyes. To do what was fraught with legal ramifications. These were the words he had carefully avoided, the hidden croutons in his carefully prepared word salad. “To give you the reach to keep tabs on certain people, no matter where they go. You know . . . a surveillance system.
”
”
Michael Ben Zehabe
“
Cybersecurity is a support industry, and a lot of professionals in the industry tend to forget that. These professionals think that cybersecurity is an industry unto itself, but it wouldn’t exist without other industries (like manufacturing, healthcare, and financial services).
”
”
Christian Espinosa (The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity)
“
Navigating a complex system of cloud computing with an enterprise cybersecurity strategy is not an easy feat. A complex technological system works when designed correctly. However, adding the human factor as an element to this system is an ever-escalating paradox and a potential cyberthreat.
”
”
Ludmila Morozova-Buss
“
Zoe returned by rail to Claremont Village. After the train pulled away, she stood alone, beneath a security camera affixed to a lamppost. She looked up, and its lifeless eye looked straight back. In some uncontrollable fancy she turned and curtseyed, imagining someone wonderful on the other side of the lens would be captivated by her new American dress.
”
”
Michael Ben Zehabe
“
Information is a significant component of most organizations’ competitive strategy either by the direct collection, management, and interpretation of business information or the retention of information for day-to-day business processing. Some of the more obvious results of IS failures include reputational damage, placing the organization at a competitive disadvantage, and contractual noncompliance. These impacts should not be underestimated.
”
”
Institute of Internal Auditors
“
The status-quo habits for 'grandfathered' vulnerabilities do not legitimize them.
”
”
Stephane Nappo
“
The only way to maintain privacy on the internet is to not be on the internet.
”
”
Abhijit Naskar (Vatican Virus: The Forbidden Fiction)
“
Unequivocally, this proves not only have cats taken over the internet but now the offshore tax haven market too!
”
”
Chris Kubecka (Down the Rabbit Hole: An Osint Journey Open Source Intelligence Gathering for Penetration Testing)
“
Ransomware is more about manipulating vulnerabilities in human psychology than the adversary's technological sophistication
”
”
James Scott
“
I’d been an outcast my entire life. Growing up with technophobe parents in the dawn of a Cyborg Age did that to a person.
”
”
Anna L. Davis (Open Source)
“
You think an Air Gap is a defense? Sofacy, Stuxnet, Uroburos, AirHopper, BitWhisperer and ProjectSauron…enough said!
”
”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“
Never post family pictures online,
There's no such thing as privacy settings.
It is a total jungle out there,
In every corner predators are lurking.
”
”
Abhijit Naskar (Himalayan Sonneteer: 100 Sonnets of Unsubmission)
“
The Internet is the first thing that humanity has built that humanity doesn’t understand, the largest experiment in anarchy that we have ever had.
”
”
P.W. Singer (Cybersecurity and Cyberwar: What Everyone Needs to Know®)
“
In 2010, McAfee thought it impressive that it was discovering a new specimen of malware every fifteen minutes. In 2013, it was discovering one every single second!
”
”
P.W. Singer (Cybersecurity and Cyberwar: What Everyone Needs to Know®)
“
Threat is a mirror of security gaps. Cyber-threat is mainly a reflection of our weaknesses. An accurate vision of digital and behavioral gaps is crucial for a consistent cyber-resilience.
”
”
Stephane Nappo
“
In this business, I find more value in working with hackers who abstract new realities from cast aside code and concepts than academics who regurgitate other people’s work and try to pawn it off as their own.
”
”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“
Hackers find more success with organizations where employees are under appreciated, over worked and under paid. Why would anyone in an organization like that care enough to think twice before clicking on a phishing email?
”
”
James Scott
“
Digital freedom stops where that of users begins... Nowadays, digital evolution must no longer be offered to a customer in trade-off between privacy and security. Privacy is not for sale, it's a valuable asset to protect.
”
”
Stephane Nappo
“
One of the main cyber-risks is to think they don’t exist. The other is to try to treat all potential risks.
Fix the basics, protect first what matters for your business and be ready to react properly to pertinent threats. Think data, but also business services integrity, awareness, customer experience, compliance, and reputation.
”
”
Stephane Nappo
“
Richard Clarke, former cybersecurity czar under the Bush administration and a member of the panel, later explained the rationale for highlighting the use of zero days in their report. “If the US government finds a zero-day vulnerability, its first obligation is to tell the American people so that they can patch it, not to run off [and use it] to break into the Beijing telephone system,” he said at a security conference. “The first obligation of government is to defend.”40
”
”
Kim Zetter (Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon)
“
The security theater we are witnessing in our election system boasting the illusion of security via ‘clunky as heck’ and air gap defense will do nothing against the real and sophisticated adversarial landscape that is zeroing in on our democracy
”
”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“
A Nation State or Cyber-Mercenary won’t hack e-voting machines one by one. This takes too long and will have minimal impact. Instead, they’ll take an easier approach like spear phishing the manufacturer with malware and poison the voting machine update pre-election and allow the manufacturer to update each individual machine with a self-deleting payload that will target the tabulation process.
”
”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“
This next president is going to inherit the most sophisticated and persistent cyber espionage cultures the world has ever seen, He needs to surround himself with experts that can expedite the allocation of potent layers of next generation defenses around our targeted critical infrastructure silos.
”
”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“
The Internet of Things (IoT) devoid of comprehensive security management is tantamount to the Internet of Threats.
Apply open collaborative innovation, systems thinking & zero-trust security models to design IoT ecosystems that generate and capture value in value chains of the Internet of Things.
”
”
Stephane Nappo
“
We’re talking about the fate of our economy and the questionable resiliency of our Nation’s critical infrastructure. Why are experts so polite, patient, and forgiving when talking about cybersecurity and National Security? The drama of each script kiddie botnet attack and Nation State pilfering of our IP has been turned into a soap opera through press releases, sound bites and enforced absurdity of mainstream media. It’s time for a cybersecurity zeitgeist in the West where cyber hygiene is a meme that is aggressively distributed by those who have mastered it and encouraged to be imitated by those who have experienced it.
”
”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“
Anyone starting out to research for a doctorate degree should remember that hours of self centered work has the ability to be the spark for others to progress. All research is potentially useful to open doors or show others that door does not lead anywhere useful. Advancements happen by building on others research.
”
”
Ian R. McAndrew, PhD
“
Anything that says ‘smart’ in front of its name, is a potential magnet for trojans. The same goes for anything that is endorsed as ‘open source’.
”
”
Abhijit Naskar (Vatican Virus: The Forbidden Fiction)
“
Internet privacy is fiction.
”
”
Abhijit Naskar (Vatican Virus: The Forbidden Fiction)
“
In our online world there is no way for a regular civilian to keep their phone uninfected. And that includes everybody except skilled and resourceful programmers.
”
”
Abhijit Naskar (Vatican Virus: The Forbidden Fiction)
“
The true danger lies less in AI thinking like human, than human adopting an AI way of thinking.
”
”
Stephane Nappo
“
Communication is key to success in relationship and knowledge sharing. When it comes to AI, communication is key to demystify fears, address risks, and create positive value.
”
”
Stephane Nappo
“
One of the main AI challenges lies in conjugating safety and efficiency. Equilibrium between AI ethics and performance will forge our future.
”
”
Stephane Nappo
“
If you use social media,
don't ask for privacy.
If you want privacy,
don't use social media.
”
”
Abhijit Naskar (Dervis Vadisi: 100 Promissory Sonnets)
“
Even one unhandled misconfiguration can dwindle the whole organization's security level.
”
”
Stephane Nappo
“
Considering artificial intelligence can checkmate human intelligence, make AI an ally, not an enemy.
”
”
Stephane Nappo
“
Human vs AI competition is delusion. It is like a farmer rivalling a combine-harvester. The question is: who drives, and what we reap.
”
”
Stephane Nappo
“
The health sector continuously get’s pummeled by malicious actors and hackers because their cyber-kinetic security is being managed by “Participation Trophy” winning wimps!
”
”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“
Security is a Blackhole
”
”
Sunanda Mani
“
Knowledge in our heads is useless. Its power is unleashed only when it is shared.
”
”
Mansur Hasib (Cybersecurity Leadership: Powering the Modern Organization)
“
In modern Russia, Putin vote for you
”
”
Chris Kubecka (Down the Rabbit Hole: An Osint Journey Open Source Intelligence Gathering for Penetration Testing)
“
Real healthcare occurs outside of the doctor's office and hospitals, not when the patient shows up to make a complaint once their symptoms have developed.
”
”
Emmanuel Fombu (The Future of Healthcare: Humans and Machines Partnering for Better Outcomes)
“
Creating back doors to hack in to secure devices will not only undermine consumer confidence in technology but most importantly empower cyber criminals and totalitarian regimes.
”
”
Arzak Khan
“
Do I want to know why you're so informed about spyware?" she asked.
Nikolaos gave her a charming, dazzling smile. "No, my dear. You do not.
”
”
Molly Ringle (Persephone's Orchard (The Chrysomelia Stories, #1))
“
Creating and Empowering Global Tech Industry Leaders
”
”
Softwarica
“
Cyber resilience is much more than a matter of technology. Agility, balance and high level view are indispensable...
”
”
Stephane Nappo
“
The hacker didn't succeed through sophistication. Rather he poked at obvious places, trying to enter through unlock doors. Persistence, not wizardry, let him through.
”
”
Clifford Stoll (The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage)
“
Rather than fearing or ignoring cyber attacks, do ensure your cyber resilience to them.
”
”
Stephane Nappo
“
Even the bravest cyber defense will experience defeat when weaknesses are neglected.
”
”
Stephane Nappo
“
The main element you cannot delegate to your cloud service provider is your responsibility for security, compliance and customer trust.
”
”
Stephane Nappo
“
Real cybersecurity means that your Security Operations team is consistently pen testing your network with the same stealth and sophistication as the Russian nation state, the same desperation as China’s 13th Five Year Plan, the same inexhaustible energy of the Cyber Caliphate and the same greed and ambition for monetary payoff as a seasoned cyber-criminal gang.
”
”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“
Homo Sapiens are Exploitable. Large Corporations Base the Mass with Least Recognition. It does NOT have to be the Employee Himself that would Deteriorate the Corporations Intranet but Surely since his Least Recognized, He is Most Definitely Vulnerable, Its a Starting Point to Open a Door for a Lovely Challenging Maze filled with Seed of Corruption that in Stages the Artists Shall Paint their Mark.
”
”
Emmanuel Abou-chabke
“
If you don’t feel ordained by the Universe to do this job, do something else. The intelligence community has to shut down the gaping wound that is the insider threat epidemic we are experiencing right now.
”
”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“
If the DNC was a small business, it was like no small business I’ve ever seen. We change bosses and objectives with each election cycle and our goal is to spend every dime we raise to get people elected. Long-term planning for things like investment in cybersecurity is hard to do in this environment. And in this cycle it sometimes seemed like Brooklyn wanted to strip it of its functionality nearly as much as the Russians had.
”
”
Donna Brazile (Hacks: The Inside Story of the Break-ins and Breakdowns That Put Donald Trump in the White House)
“
As state-sanctioned measures evolve to erode fundamental rights, so too does the arsenal of defensive tools the security community relies on to protect them, and this provocation ignites the residue of our defiance.
”
”
Jacob Riggs
“
This cyberwar will be a continuous marathon war that will only compound and hyper-evolve in stealth, sophistication and easy entry due to the accelerated evolution of “as a service” attack strategies for sale on the dark web.
”
”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“
The methods that will most effectively minimize the ability of intruders to compromise information security are comprehensive user training and education. Enacting policies and procedures simply won't suffice. Even with oversight the policies and procedures may not be effective: my access to Motorola, Nokia, ATT, Sun depended upon the willingness of people to bypass policies and procedures that were in place for years before I compromised them successfully
”
”
Kevin D. Mitnick
“
You'll have the right to be angry about Vault 7 only after you boycott dragnet surveillance data providers like Google, Microsoft, Skype, Facebook and LinkedIn. The true threat is coming from the private sector surveillance profiteers.
”
”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“
What do you mean “Should we worry about cyber adversaries getting into state voter registration databases?” They’re already in and selling exfiltrated voter registration data on the dark web! Next election cycle black hats will be selling ‘access as service’.
”
”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“
Whenever they spoke, most of us would just keep quiet, nod our heads, and put on what author Mark Bowden calls “the glaze.” This is the “unmistakable look of profound confusion and disinterest that takes hold whenever conversation turns to workings of a computer.
”
”
P.W. Singer (Cybersecurity and Cyberwar: What Everyone Needs to Know®)
“
The collaboration between secretaries of state, election officials and the voting system manufacturers on the matter of enforcing this black box proprietary code secrecy with election systems, is nothing less than the commoditization and monetization of American Democracy
”
”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“
Exact figures are impossible to obtain, since the state never releases them, but today there are over three hundred multinational companies and six thousand start-ups that employ hundreds of thousands of people. Sales are booming, with defense exports reaching an all-time high in 2021 of US$11.3 billion, having risen 55 percent in two years. Israel’s cybersecurity firms are also soaring, with US$8.8 billion raised in one hundred deals in 2021. In the same year, Israeli cyber companies took in 40 percent of the world’s funding in the sector.
”
”
Antony Loewenstein (The Palestine Laboratory: How Israel Exports the Technology of Occupation Around the World)
“
मैं नहीं चाहता कि मेरा मन खंगाला जाए
चाहे उसमें इस्तेमाल लायक कुछ भी न हो
MAIN NAHIN CHAHTA KI MERA MANN KHANGALA JAYE
CHAHE USMEIN ISTEMAL LAYAK KUCHH BHI NA HO
I DON'T WANT THAT MY MIND BE SCRUTINIZED
EVEN IF THERE WAS NO THING OF VALUE INSIDE
24 Dec National Mathematics Day
”
”
Vineet Raj Kapoor
“
One day in September 2015, FBI agent Adrian Hawkins placed a call to the Democratic National Committee headquarters in Washington, D.C., and asked to speak to the person in charge of technology. He was routed to the DNC help desk, which transferred the call to Yared Tamene, a young IT specialist with The MIS Department, a consulting firm hired by the DNC. After identifying himself, Hawkins told Tamene that he had reason to believe that at least one computer on the DNC’s network was compromised. He asked if the DNC was aware of this and what it was doing. Tamene had nothing to do with cybersecurity and knew little about the subject. He was a mid-level network administrator; his basic IT duties for the DNC were to set up computer accounts for employees and be on call to deal with any problems. When he got the call, Tamene was wary. Was this a joke or, worse, a dirty trick? He asked Hawkins if he could prove he was an FBI agent, and, as Tamene later wrote in a memo, “he did not provide me with an adequate response.… At this point, I had no way of differentiating the call I received from a prank call.” Hawkins, though, was real. He was a well-regarded agent in the FBI’s cyber squad. And he was following a legitimate lead in a case that would come to affect a presidential election. Earlier in the year, U.S. cyber warriors intercepted a target list of about thirty U.S. government agencies, think tanks, and several political organizations designated for cyberattacks by a group of hackers known as APT 29. APT stood for Advanced Persistent Threat—technojargon for a sophisticated set of actors who penetrate networks, insert viruses, and extract data over prolonged periods of time.
”
”
Michael Isikoff (Russian Roulette: The Inside Story of Putin's War on America and the Election of Donald Trump)
“
A single spear-phishing email carrying a slightly altered malware can bypass multi-million dollar enterprise security solutions if an adversary deceives a cyber-hygienically apathetic employee into opening the attachment or clicking a malicious link and thereby compromising the entire network.
”
”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“
Spend time with your AI candidate/s before using it/them in real mode. "Your future AI tools have to pass an interview for the job". This important step must be based on clear use cases, with the involvement of relevant business representatives.
'Technology trust is a good thing, however control is a better one...
”
”
Stephane Nappo
“
... they were just one part of a vast dark web of unseen players ... And yes, they could be fought, maybe some individuals might even be arrested, but you might as well try to prosecute cancer. They would always exist. Slippery, shadowy, forcing their way through the cracks in our online security and the doors we left open for them in our digital lives.
”
”
Ruth Ware (Zero Days)
“
Finding a zero day is a little like entering God mode in a video game. Once hackers have figured out the commands or written the code to exploit it, they can scamper through the world's computer networks undetected until the day the underlying flaw is discovered. Zero day exploitation is the most direct application of the cliche 'knowledge is power if you know how to use it.
”
”
Nicole Perlroth (This Is How They Tell Me the World Ends: The Cyberweapons Arms Race)
“
You are a product to dragnet surveillance capitalists like Google, Facebook, Comcast and Verizon. Your ideas are rarely your own, rather you are little more than a pawn to their perception steering initiatives to get you to read, believe and buy what they put in front of you. The first step to breaking out of this faux reality matrix is to stop using Google, Bing, Yahoo, Comcast and Facebook.
”
”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“
For me, I will take freedom over security and I will take security over convenience, and I will do so because I know that a world without failure is a world without freedom. A world without the possibility of sin is a world
without the possibility of righteousness. A world without the possibility of crime is a world where you cannot prove you are not a criminal. A technology that can give you everything you want is a technology that can take away everything that you have. At some point, in the near future, one of us security geeks will have to say that there comes a point at which safety is not safe.
”
”
Dan Geer