texas dir security 18 2018...the dark ages. connected people web 2.0 connected devices web 3.0...

Post on 22-May-2020

6 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Scott Klososky

Digital Darwinism:Disruption, Transformation & Opportunity

Digital Darwinism

is when the pace

of digital innovation is faster

than the speed organizations are willing to adapt.

(survival of the fittest)

Cycle of Disruption

1.NewcomerImplements betterdigital tools

2.Incumbentsignorenewcomer

3.Marketsatisfactiongrows

4.Incumbentsbully or buynewcomer

5.Marketadapts andimproves

6.Marketreapsbenefits

Innovation Risk - The Danger of Disruption

Being disrupted, or innovating proactively, with is a choice.

When you are repeatedly disrupted and slow to adapt, you will suffer from Digital Darwinism and cease to become relevant and productive

Seven Disruptive Catalysts

Wider Reach

Rapid Scaling

Automation

Wiser Decisions

Quality & Speed

Amplified Connections

User CapabilitiesCognitiveComputing

RPA/Robotics

SocialTechnologies

3D Printing

DataIntelligence

Cloud

UniversalInternet

Digital Transformation 2000 to 2050

A historically significant change in humanity…

Using Digital

Wearing Digital

Implanting Digital

The Hive Mind

Disconnected The Dark Ages

Connected PeopleWeb 2.0

Connected DevicesWeb 3.0

Connected Data PlatformsWeb 4.0

Augmented HumanityWeb 5.0

Connected OrganizationsWeb 1.0

IoT & M2MAmbient

Computing

AmbientIntelligence

Transhumanism

SocialTechnologies

Digital MarketingeCommerce

The Transformation of Connection

2000

2010

2020

2028

2045

Yearof

Traction

Connected PeopleWeb 2.0

Connected DevicesWeb 3.0

Connected Data PlatformsWeb 4.0

Augmented HumanityWeb 5.0

Connected OrganizationsWeb 1.0

IoT & M2MAmbient

Computing

AmbientIntelligence

Transhumanism

SocialTechnologies

Digital MarketingeCommerce

The Transformation of Connection

Cybersecurity Risk Grows

Viruses

Social Engineering

Device Takeover

Data Extortion/Corruption

Augmentation Extortion/Control

2000

2010

2020

2028

2045

Yearof

Traction

HUMALOGY

The integration of humans and technology to accomplish processes

HUMAN INVOLVMENT

0

TECHNOLOGY INVOLVMENT

H5 H4 H3 H2 H1 T1 T2 T3 T4 T5

HUMALOGY SCALE

HUMAN INVOLVMENT

0

TECHNOLOGY INVOLVMENT

H5 H4 H3 H2 H1 T1 T2 T3 T4 T5

HUMALOGY SCALE

H5 H2 T2 T50

TODAY

Digging a HoleDigging a Hole

We are now shifting from the Information Age to:

The Age of Entanglement

As technology and humanity continue to converge the repercussions on our future are staggering…

Rate

of

Ch

an

ge

Time

People & Organizations Change Logarithmically

Technology Changes Exponentially

Strategy Risk Gap

The Transformation Dilemma

Rate

of

Ch

an

ge

Time

People & Organizations Change Logarithmically

Technology Changes Exponentially

The High Beam Zone

The Transformation Dilemma

PRACTICE

Not on your radar

You first hear of it

Clearly a trend

Common Practice

FuturePast

What you are actively working on

}

Present 1YR 5YR

ORGANIZATION & LEADERS

REACTION TIME

Becomes a practice

-1YR-5YR

Learning to be High Beam

PRACTICE

Not on your radar

You first hear of it

Clearly a trend

Common Practice

FuturePast

What you are actively working on

}

Present 1YR 5YR

ORGANIZATION & LEADERS

REACTION TIME

Becomes a practice

-1YR-5YR

Learning to be High Beam

The Growing Digital Skills gap

Hyper Personalization(Individualizing Tech)

Relentless Automation

Growing EA complexity(Enterprise architecture)

The Maturation of Data Services

Integrated Security

Machine Intelligence

The High Beam 2018 List

David Ferrucci, the developer of IBM Watson, was asked if the system can think…

He answered, “Watson can think like a submarine can swim”

Machine Intelligence

Machine Intelligence EcosystemRoboticsRPA (Robotic Process Automation)

Artificial IntelligenceNatural Language ProcessingRecommendation EnginesMachine LearningDeep LearningPredictive AnalysisCognitive Computing

Machine Intelligence RoadmapStep

One

Step Four

Systems have the ability to review data and learn for themselves

Self Learning

Step Three

Systems go through a human led training process in order to refine algorithms

Trained

Step Five

Systems have decision making flexibility with a desire to improve

Intelligent

Systems are connected to the Internet with the ability to “talk” to other systems

Smart (connected)

Step TwoSystem is hard coded

with rules that mimic human thought process

Programmed

Step Six

Systems understand their mission and have ethics to guide them

Enlightened

PEOPLE

ELECTRONICPHYSICAL

AN INTEGRATED SECURITY MODEL

FACILITIES

ORGANIZATIONAL ASSETS

CYBER

Hacker Internal Threat

3rd Party Co-conspirator

The ability to join and manage

as a single unified platform the three pillars

of security to mitigate risks

PEOPLE

PHYSICAL

AN INTEGRATED SECURITY MODEL

FACILITIES

ORGANIZATIONAL ASSETS

CYBER

Hacker Internal Threat

3rd Party Co-conspirator

The ability to join and manage

as a single unified platform the three pillars

of security to mitigate risks

ACCESS CONTROLMONITORINGELECTRONICS

ACCOUNTABILITYTESTING

TRAINING

SECURITY AI’SAPPLICATIONS

DEVICES

The Three Security Firewalls

DIGITAL FIREWALL

HUMAN FIREWALL

PHYSICAL FIREWALL

CON

STA

NT

STRA

TEG

Y EV

OLU

TIO

N

GO

VERN

AN

CE (

P&P)

AU

DIT

S &

ASS

ESSM

ENTS

SECU

RITY

TEA

M S

KILL

S

RISK

TO

LERA

NCE

(ES

RM)

FOUNDATIONS

Like it or not, technology has become the jugular vein of the organization  

Mike Foster

Where you tell them the strategy needs to go….

When they reject the leaders vision….

The Importance of Cultural Transformation

Where you tell them the strategy needs to go….

When they reject the leaders vision….

The Importance of Cultural Transformation

.

Capacity for

Change

Adaptive Entrenched

Excellent Performance

Innovative Processes & Solutions

A Stagnant Culture

Success

Failure

.

Capacity for

Change

Adaptive Entrenched

Excellent

Performance

Innovative

Processes &

Solutions

A Stagnant Culture

Success

Failure

.

Capacity for

Change

Adaptive Entrenched

Excellent Performance

Innovative Processes &

Systems

An Innovation Culture

Success

Failure

.

Capacity for

Change

Adaptive Entrenched

Excellent Performance

Innovative Processes & Systems

An Innovation Culture

Success

Failure

What will be the digital footprints you leave on the

organization?

Someone once told me not to bite off more than I can chew. I said I would rather choke on greatness than nibble on mediocrity

NEXT STEPS

DOWNLOAD THIS PRESENTATION

WWW.FPOV.COM/SK

BUILD YOUR RIVER OF INFORMATION THE DOWNLOAD

FROM MIT

GET OUT AND LOOK AT BEST PRACTICES

IN YOUR FIELD

top related