What About Methane?
Curt Hall
Current interest around sustainability and net-zero initiatives mostly focuses on efforts to reduce carbon emissions associated with various products and services. But, as we explore in this Advisor, methane is another emission that wreaks havoc on the environment and deserves our attention.
The Role of Business Architecture in Software Design: A Q&A
William Ulrich
In this Advisor, we share a Q&A session from Cutter Fellow William Ulrich's recent webinar on the role of business architecture in software design.
Effective Conflict Management Can Improve Project Success
Shasheela Devi Karuppiah, Ezuria Nadzri, Govindan Marthandan
A successful project relies on good relationships among team members. To achieve this, managers must be prepared to address three types of communication-related issues: project conflict, relationship conflict, and task conflict.
Drone Delivery: Enabling Sustainability with a Smaller Environmental Footprint
Helen Pukszta
Drones will have a future positive impact on advanced air mobility, particularly in the area of package delivery. As we explore in this Advisor, drones can be used in this manner to enable sustainability while at the same time leaving a relatively small footprint.
Is IT Project Failure as Lucrative as IT Project Success?
Robert Charette
Of all the IT projects underway during the past 15 years, only a small proportion can be classified as “bleeding edge.” The vast majority have been modernizations of existing operational IT systems using proven computing technologies. Thus, it is hard to understand why the level of IT failure has remained relatively constant. This Advisor examines the factors underlying these failures.
When Should You Kill a Project? Avoiding the Trap of Sunk-Cost Fallacy
Scott Stribrny
Experienced project managers with strong project management acumen still occasionally take part in a project that seems to take on a life of its own, devouring organizational resources. This Executive Update examines a few failure scenarios that could have been avoided with better decision-making processes and offers a set of key questions project managers should continue to ask along the project’s journey.
Building Cyber Resilience in a Post-COVID-19 World
Yassine Maleh
Yassine Maleh argues that, during the pandemic, companies made hasty infrastructure changes and deviated from their security policies and controls. As businesses recover, he recommends a review of risk management processes in light of pandemic-related changes. He shares practices designed to ensure infrastructure security and resilience and suggests five ways to incorporate risk management into cybersecurity initiatives.
Holistic Fortification: Machine-Human Collaboration for Cybersecurity
Pradipta Chakraborty, Sivakumar S
In addition to zero trust and privacy by design, the authors discuss strategies for reducing human-related risk when enterprises are no longer confined to physical spaces. They also call into question some cybersecurity myths that can lead to poor decisions and business practices. The authors argue that while cyber threats are continuously changing and emerging and should remain an area of focus, the ever-expanding attack surface is also a challenge. Another concern to consider is improving security skills, so the authors suggest a decision framework that includes vulnerabilities around social and human elements in addition to physical and information systems.
Back to Basics: Defending Against Cyberattacks
Michael Papadopoulos, Richard Phillips, David Woodlock, Foivos Christoulakis
While the pandemic and enhanced digitalization have introduced more types of cyber threats, the authors assert that most recent high-profile attacks are not very sophisticated. Rather, they happen when basic cybersecurity practices are ignored or overlooked. It is likely that organizations are overestimating certain types of cyber risk, leading to overspending to secure gaps. There is also a danger that overly restrictive practices will reduce employee productivity and stifle innovation. Therefore, a realistic risk assessment after implementation of basic security practices and commensurate controls is important.
Passwordless Authentication & FIDO: The Future of Security?
Sibi Chakkaravarthy Sethuraman, Aswani Kumar Cherukuri, Nandeesh Kumar Kumaravelu, Aditya Mitra
This first article of the issue is from a team of cybersecurity researchers from a leading engineering institute in India. They explain how the ubiquitous problem of password authentication can be resolved using Fast Identity Online Alliance’s (FIDO) mechanism.
Cyber Resilience & Countermeasures — Opening Statement
Anjali Kaushik
This inaugural issue of Amplify was carefully organized to encourage dialogue on cyber-resilience strategies and countermeasures. This discussion is extremely relevant, since there is more disruption than ever before, and the truth is that no device is secure! A solid understanding of both risk and resilience is a critical element in every organization’s cybersecurity plan.
Tech Leaders Benefit from a Cyber-Savvy Boardroom
Bob Zukis, Noah Barsky
CISOs, CIOs, and other technology leaders are well-served with a strong digital- and cyber-savvy corporate board, as are shareholders and other corporate stakeholders. In a world increasingly dependent on complex digital systems for growth and resiliency, ensuring the boardroom is a critical digital and cyber-control point is a necessary and overdue step.
Tech Leaders Benefit from a Cyber-Savvy Boardroom
Bob Zukis, Noah Barsky
CISOs, CIOs, and other technology leaders are well-served with a strong digital- and cyber-savvy corporate board, as are shareholders and other corporate stakeholders. In a world increasingly dependent on complex digital systems for growth and resiliency, ensuring the boardroom is a critical digital and cyber-control point is a necessary and overdue step.
Digital Twins for Sustainability: Current Status & Applications
Curt Hall
Digital twins provide an advanced form of simulation and modeling for building virtual digital versions of real-world entities and processes. How are organizations using digital twins to implement sustainability projects? This Advisor considers the use of digital twins in sustainability scenarios — including some real-world applications involving smart cities, smart buildings, and clean energy production.
The Role of Business Architecture in Software Design
William Ulrich
In this on-demand webinar with Cutter Fellow William Ulrich, you'll discover why holistic, formally defined, and highly rationalized business abstractions are vital to the success of software design and related IT deliverables.
Quantum Computing Will Drive Parallel Innovation
Joseph Byrum
This Advisor explores how the power behind quantum computing can enable today’s most difficult algorithms to be solved in a matter of seconds, enabling real-time processing, analysis, and modeling of data unthinkable with current methods. Parallel processing will accelerate the effectiveness of teams using data analytics to boost efficiency.
Leading Successful Tech Projects Requires Courage
Ralph Menzano
Why do technology projects succeed? The most vital ingredient is organizational and personal courage.
Leading Successful Tech Projects Requires Courage
Ralph Menzano
Why do technology projects succeed? The most vital ingredient is organizational and personal courage.
Green, Secure IoT for Enhanced Sustainability Strategies
San Murugesan
The Internet of Things (IoT) is being used — and can be used — in key business and industry sectors, buildings, and households to improve energy and operational efficiency, thereby minimizing environmental impact. In this Advisor, we take an inward-looking approach to examine how we can reduce IoT’s own environmental impact and explore its cybersecurity risks. We also discuss how we can leverage and benefit from IoT’s full climate-action potential and help create a sustainable environment.
Practical Use Cases of IoT Solutions in Healthcare
Ulrica Sehlstedt, Rebecka Axelsson Wadman, Sean McDevitt, Agron Lasku
Today’s Internet of Things (IoT) solutions have tremendous potential to enhance healthcare operations and generate overall improvements to care outcomes, cost, and efficiency. New IoT solutions for healthcare are smarter and, more importantly, tailored to the needs and requirements of healthcare organizations. In this Advisor, we explore two practical use cases of IoT solutions in healthcare.
Balancing Growth & Sustainability: Technology-Led Business Model Transformations
Pradipta Chakraborty
Companies can’t choose between growth and sustainability — they must have both. This Executive Update explores this issue and proposes ways to identify the right technology portfolio to support new business models that lead to growth while ensuring sustainability goals.
Promoting Gender Equality at the Leadership Level
Keren Joseph Browning
The increases of women in senior or executive roles over the past two decades have been less than inspiring. It would seem, therefore, that although leadership literature has played a significant role in raising the profile of women in management, much needs to happen in actual board rooms and management suites in order to advance the careers of women in leadership positions.
Cyber AI: Leveraging the AI-Cybersecurity Nexus for Heightened Protection
San Murugesan
San Murugesan looks at how artificial intelligence (AI) strategies can enhance information systems security. He calls this “cyber AI” and discusses how activities such as monitoring, threat hunting, and incident response can benefit from AI/machine learning solutions. The article covers the use of AI in behavioral analytics, threat intelligence, ransomware attack detection, smart identity governance, online fraud detection, deepfakes, and risk assessment. Finally, the author points out the potential for malicious use of AI in the increasing occurrence of cyber threats. His thoughtful piece provides a deep exploration of the nexus between AI and cybersecurity from an expert viewpoint.
Intensifying Attacks Demand New Strategies
Abhijit Dasgupta
Abhijit Dasgupta, an accomplished security risk leader with extensive experience in building and leading security risk and digital governance practices globally, comments on the changing threat landscape and highlights the enhanced risk from both new remote work practices across businesses as a result of COVID as well as from cryptocurrencies. He suggests strategies such as zero trust, perimeter-less, and multi-cloud.
Intensifying Attacks Demand New Strategies
Abhijit Dasgupta
Abhijit Dasgupta, an accomplished security risk leader with extensive experience in building and leading security risk and digital governance practices globally, comments on the changing threat landscape and highlights the enhanced risk from both new remote work practices across businesses as a result of COVID as well as from cryptocurrencies. He suggests strategies such as zero trust, perimeter-less, and multi-cloud.