May 20, 2016

10 steps to becoming cyber resilient

Just like risk management generally, many of the steps needed to minimise risk have to be applied widely across the practice, requiring personal compliance with rules and collaboration across internal departments. This is not just an issue for the IT team, although they have a significant role to play. Resilience is not just about preventing cyber crime, but encompasses cyber security on many fronts. A cyber-resilient law firm should “have the capacity across the business to maintain their core purpose, operations and integrity in the face of cyber attacks and cyber security breaches. A cyber-resilient practice is one that can prevent, detect, contain and recover from a plethora of serious threats against data, applications and IT infrastructure. It successfully aligns continuity management and disaster recovery with security operations in a holistic fashion.”


Leadership Relevancy in the Digital Age

Are you ready for digital age leadership relevancy? For full digital transformation? Are you ready for the tsunami of change coming? Is your business? If not, or if you want to get ready, you’ll enjoy this week’s episode of The Rebel Leader with Vijay Gurbaxani, founding director of Road to Reinvention: Leadership in the Digital Age — a signature conference hosted by The Center for Digital Transformation (CDT) at the UC Irvine Paul Merage School of Business. Vijay is also Professor of Business and Computer Science at the Merage School, but don’t expect an “academic” perspective to social leadership and organizational transformation. He is neck-deep into this pressing issue and comes at it from a unique and insightful perspective.


Inside Sundar Pichai's Plan To Put AI Everywhere

It’s Pichai’s first I/O since he became CEO last year when Larry Page reorganized the company into Alphabet. And it’s the first that will be held at Shoreline Amphitheater, an arena for rock concerts within a stone’s throw from Pichai’s office, rather than in the more staid San Francisco venue of years past. (“I wanted to create a sense of community, make it more informal, make it more like how Google works every day,” Pichai says.) Speaking softly in his lilting South-Indian accent, Pichai parries questions with his trademark calm and poise. He’s not a sound bite man. So his excitement at what Google will show off – at what the company is becoming – is masked by his long, meandering and thoughtful answers, always rich with context about the evolution of computing, the history of Google and what users expect.


Big data projects shake up the storage status quo

Cloud and virtual storage also have a potential role in the data marts that many company departments now use to run batch queries for different departments and business units. The data used in most of these data marts is batch created and is traditional data that departments have run for queries in the past. What is different is that users now have more analytics report creation tools and options for queries than they had in the past, and there is more ability for data administrators to generate data that is aggregated from different sources. In this batch environment, disk storage solutions work as effectively as they have in the past. As storage administrators react to the changes brought on by big data, the most significant change impact is accommodating the sheer size of extremely large big data files.


Cyber resilience: a board level issue for the legal profession

To start to address the challenge the broader legal profession needs to transform the way it thinks about cyber security and resilience. While privacy and confidentiality have always been foundation qualities for law firms, they must increasingly be able to demonstrate to their clients and regulators that they have adequate defences and associated controls and governance whilst remaining competitive and able to conduct business securely. Legal firms that do not take the time to train their staff, secure their systems and supply chain whilst advising their clients to do the same will increasingly find themselves losing high-profile contracts. Gone are the days when attackers focused solely on attempting to subvert a firm’s intrusion detection system or firewall defences with the goal of stealing sensitive information and then leaving.


The Average App Loses More Than 75% Of Its Users After One Day

“Using Day N retention rates, brands can determine how many new users return on a particular day following their first session,” said Appboys’s senior content producer Todd Grennan, in a blog post. “For instance, if 100 customers first use your app on a certain day (Day 0) and 30 of those original 100 return seven days later, that translates to a 30% Day 7 retention rate; similarly, if 20 of the original customers return 30 days later, that’s a 20% Day 30 retention rate.” According to the report, overall app retention drops to around 11% within a week of install. After 45 days, that number is less than 5% before hitting 4.1% after 90 days. Mobile operating systems play a role, Appboy said. Retention rates are higher on Android devices with a high of 27% on day one of install that declines to 13% by day seven. In comparison, iOS apps show a 23% session use on the first day and an 11% usage rate by the end of the week.


What’s Driving (and Inhibiting) DCIM Software Adoption?

One of the biggest drivers for DCIM software adoption in the near future, however, will be the transition to software-defined infrastructure. “Data centers will increasingly be viewed not as physical business but as pools of resources that can be drawn on when needed,” Cooke said. ... Many DCIM tools on the market today, however, are lacking key functionality that enables them to connect to and enable the digital transformation of data centers, and this is one of the factors that inhibit the market’s growth, Cooke said. The shift of more resources to outsourced IT infrastructure from on-prem facilities is another growth inhibitor, working both for and against the overall DCIM market. While use of DCIM tools by colocation providers and their users is on the rise, there will be fewer and fewer end user-operated facilities that need these management tools.


Google is bringing Android apps to Chromebooks

While Chromebooks have already been successful in the enterprise, they were lacking app compatibility, said Rajen Sheth, the director of product management for Android and Chrome for Business and Education. This update will better equip businesses and schools with apps they want, without requiring the developers of those apps to build a separate Chrome app, Sheth said. Chromebook shipments overtook Macs in the U.S. during the first quarter of this year, according to IDC. Building on that success by making Android apps available to those users should make the platform more appealing to buyers. Chrome OS users will now be able to write term papers on their Chromebook while also checking Snapchat, Kan Liu, Google's senior director of product management, said at the company's I/O developer conference in Mountain View, California.


Bringing resiliency to software acquisition

Thought leaders from government, industry and academia discussed the opportunities and challenges of IT resiliency at the Cyber Resilience Summit hosted earlier this year by CISQ. “Resilience is about risk,” said Paul Nielsen, director and CEO of the Carnegie Mellon Software Engineering Institute. “And one of the things about risk is, you can’t eliminate it.” Basic cyber hygiene can help eliminate low-hanging vulnerabilities, but increasingly persistent and sophisticated attacks against complex systems will continue to pose threats. Those risks that cannot be eliminated must be managed. Resilient software working as a coherent system can mitigate the impact of intrusions when they occur, continuing to operate while avoiding or minimizing damage.


Machine learning: Demystifying linear regression and feature selection

Linear regression is a powerful technique for predicting numbers from other data. Imagine you have an imperative to predict basketball scores from game statistics, and you miraculously know absolutely nothing about basketball. The fact that a hoop is involved is news to you. You’ve found a dataset on stats.nba.com that has a bunch of statistics (free throws made, assists, blocks, three pointers), including the final score, and now you want to predict future scores given those stats. Those of us who are not in your miraculous situation know that the answer is going to look a lot like points = free throws made + 2 * two pointers made + 3 * three pointers made.



Quote for the day:


"Unless you try to do something beyond what you have already mastered, you will never grow." -- Ronald Osborn