
Strategic Efficiency Consortium
@stratefficiency
Followers
481
Following
767
Media
525
Statuses
4K
#Advisory #Consulting #PublicPrivatePartnerships #Security #Infrastructure #OperationalEfficiencies #Strategy #ThinkTank #Advisor
Canada
Joined April 2016
The 4 tiers of #DigitalTransformation. đź’ˇ Many companies make ad-hoc business decisions about the use of digital tech without defining their #digital #strategy first and end up struggling to be competitive despite substantial investments. @4enterprisers .
0
0
0
In this #podcast, @tcstvns speaks to @geomill about the ways in which citizens in democracies can get involved in mapping out our #CyberSecurity future.
0
0
0
Putting sensor-packed Chinese cars on Western roads could be a privacy issue. Just ask Tesla. #CyberSecurity #automobiles $China #Tesla.
0
0
1
#OTcybersecurity #operationaltechnology #otsecurity #icssecurity #criticalinfrastructure #IIoT #IoT #SCADA #ics #cyberthreats #industrialcybersecurity #cybersecurity #infosecurity #industrialcontrols #OTsecurity #OTsystems #industrialcyber.
Industrial orgs are increasingly leveraging external resources to support their #OTcybersecurity journey due to lack of skilled resources, more OT vulnerabilities, targeted attacks & insurance requirements. Find out what OT managed services entail:
0
0
0
About 400 higher-ed institutions are designated as centers of excellence by the @NSAgov. Together, these schools graduated 50 percent of all cyber and cyber-related bachelor’s degrees in 2020. Explore the data in our newest report 👇
0
0
0
Read our analysis on which parts systems will be declining and which are expected to grow as battery-powered electric vehicles become more prevalent in the market. #automotiveaftermarket #electricvehicles #automotiveindustry
0
0
0
🚨 New Article 🚨. "Ecosystems and Ordering: Exploring the Extent and Diversity of Ecosystem Governance" by @crismaglia & @ElanaWilsonRowe . Read OPEN ACCESS here: .
0
0
0
#OTcybersecurity #operationaltechnology #otsecurity #icssecurity #criticalinfrastructure #IIoT #IoT #SCADA #ics #cyberthreats #industrialcybersecurity #cybersecurity #infosecurity #industrialcontrols #OTsecurity #OTsystems #industrialcyber.
No matter how much experience you have or how good your business case is, gaining buy-in for #OTcybersecurity can still present challenges. Internal lobbying for an industrial security program is important for early education.
0
0
0
According to @spia_uc’s @RichardHarknett, the biggest misconception surrounding cyber conflict in international relations is “that the most salient impact of cyber operations should be in conflict; that is, the equivalent of armed attack and warfighting.”
0
0
0
📢 #CyCon proceedings are now out!. This includes a paper I wrote with @josephdevanny on UK cyber policy. Many thanks to the (packed!) room yesterday for coming along to our panel - it was a great discussion!. #CyCon2023 #CCDCOE.
0
0
0
". being precise in wording and being brief and to the point are appreciated by both audiences.". @sh3rryhuang on the similarities and differences of writing in cyber threat intelligence vs. cyber policy positions:
0
0
0
Congratulations to Professor Khatharya UM for being selected to receive the @FukuokaPrize Academic prize 2023! 🏆 . Professor Um's latest Routledge publication, 'Globalization and Civil Society in East Asian Space,' can be found on our website 👉
0
0
0
Our experts unpack how GCs and CISOs can work together to hone a #cybersecurity strategy that aligns with their organization’s risk appetite and priorities. More via @WSJCustom: #TheModernGC #LeadTheWay.
0
0
0
#OTcybersecurity #operationaltechnology #otsecurity #icssecurity #criticalinfrastructure #IIoT #IoT #SCADA #ics #cyberthreats #industrialcybersecurity #cybersecurity #infosecurity #industrialcontrols #OTsecurity #OTsystems #industrialcyber.
Success in #OTcybersecurity and reliability requires a new foundation in OT systems management, which is critical to ensuring connected systems are protected and managed appropriately. OT must deploy similar processes, tools and training as IT.
0
1
0
Suggested actions for the #NIS2 cybersecurity directive:.• Review your compliance.• Close gaps.• Prepare for expected security controls.• Be aware of what's coming.
0
0
0