Musashi's Dokkodo (The Way of Walking Alone)


Download 1.13 Mb.
Pdf ko'rish
bet108/131
Sana29.01.2023
Hajmi1.13 Mb.
#1139843
1   ...   104   105   106   107   108   109   110   111   ...   131
Bog'liq
dokkodo

Businessman:
This is a perfect admonishment. It reminds us that while providence
may smile down upon our endeavors there’s no guarantee of
success. Consequently, we need to become proactive in protecting
ourselves and our operations. In business parlance this is called risk
management. It is the process of identifying, analyzing, and then
either mitigating or accepting sources of uncertainty that might affect
our people, products, or organizations.
Why should we care about risk management? Think about the
Target, Home Depot, Sony, Nationwide Insurance, and United States
Office of Personnel Management data breaches for starters. They
made the headlines worldwide, but they were not alone. In fact, a
2015 study by insurance company HSB discovered that 69 percent
of businesses had experienced a hacking event during the previous
year. Cyber criminals routinely steal sensitive corporate information,
financial data, and millions of people’s personal information, placing
their identities, their credit, and their life-savings in peril. Whenever
this happens folks tend to lose their jobs over the breach, either
because they let it happen, tried to cover it up, succumbed to
blackmail, or because unpalatable actions they took or things they
wrote that were never meant to see the light of day were publicized
afterward. In some cases their reputations were destroyed to the
point where they may never find a decent job again. And, their


companies were irreparably harmed as a result of the breach too,
spending millions upon millions of dollars to repair the damage.
With ever increasing cyber security risks it is incumbent upon us to
understand the value of our data to ourselves as well as to bad guys
who might covet or wish to adulterate it, and then put the right
technologies, processes, and training plans in place to mitigate the
threats to the extent feasible. Since virtually everything is connected
to the internet these days it doesn’t matter what type of business we
are in. Everyone is at risk; even something as mundane as our
refrigerators can be the vector that lets the bad guys into our network
and from there into our mission critical data. It’s not just an IT
problem however, we need to safeguard against social engineering
scams that can trick folks into voluntarily giving up sensitive
information as well as disgruntled employees, customers, or
suppliers who might have access to our systems or resources and a
desire to do bad things too. As you can see, it’s a people, process,
and technology threat. And, we must continuously assess and
defend against new and ever evolving risks.
Hackers are ubiquitous, but they are by no means the only danger
that must be taken seriously. The term force majeure is French for
“superior force,” but in practical application it really means “acts of
God.” It’s a legal term that lets parties off the hook for their
contractual commitments in the event of catastrophic disruptions
such as wars, nuclear accidents, earthquakes, hurricanes, meteor
strikes, or other natural disasters. In legalese it’s a protection against
the unforeseen, but it also a risk that while oftentimes small in
likelihood can have catastrophic consequences on our businesses if
it comes to fruition. There’s no guarantee of perfect safety, it’s
economically unfeasible, but we can build redundancy into our
supply chain, operations, employee base, and IT infrastructure so
that if really bad things do happen we will not be shut down and
unable to produce the products or services that pay our bills and
keep the business afloat every month.


It is incumbent upon all prudent businessmen and women to identify
possible risks to our enterprises, evaluate their impact, determine
which may be accepted and which must be mitigated to the extent
possible, and then figure out how to monitor whether or not they
have happened. It’s a four-step process that must be repeated
continuously: (1) identify the risks, (2) quantify the risks, (3) mitigate
the risks, and (4) monitor the risks. In this fashion we evaluate things
like strategic, operational, transactional, financial, technology,
regulatory, and geopolitical risks, determine our tolerance for
uncertainty, and then put plans in place to protect ourselves.
Sometimes mitigations are as simple as having an alternate supplier
of commodity parts available in case we need them, but other times
they are highly complex such as hardening our systems against
cyber-attack via network segmentation, enclaves, encryption, and
the like which can take millions of dollars and multiple years to put
into place. The challenge is to know for certain where we stand and
chart a sensible and thoughtful course forward.
There are no guarantees in life or in business, but we can stack the
deck in our favor with prudent planning and thoughtful execution of a
risk management plan.



Download 1.13 Mb.

Do'stlaringiz bilan baham:
1   ...   104   105   106   107   108   109   110   111   ...   131




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling