As a PMP and CAPM Certification holder - here are three areas where I anticipate cyber hazards influencing our companies, project management infrastructures, and the actual projects we're managing today and, in the future, be prepared and proactive or be sorry.
1. Fingerprint Security And Hacking
There hasn't been much discussion about what happens if a big, national, or important database including fingerprints is compromised. It's one thing to have our identities compromised as customers of a large retail shop that has been hacked. It's inconvenient, so we buy a new credit card and wait for our FDIC-insured funds or our credit records to be repaired. But what about our fingerprints? We won't be able to obtain any more of those. In the next 12 to 24 months, I expect a massive fingerprint database attack. It might have an impact on workplace environments and computer equipment that require fingerprints for security, as well as court proceedings and forensic evidence. The bad guys will then put those hacked fingerprints on special gloves to frame innocent individuals when they breach into businesses, houses, and offices, or even commit murders. That's terrifying!
2. C-Level Cyber Security
As a PMP and CAPM Certification holder - I'm aware that this is already taking place. CSOs, or Chief Security Officers, are the highest-ranking security officers. Is it, however, genuinely cybercrime and cyber security that they are associated with? Is it more about catastrophe recovery and security in general? Cybercrime is on the rise every day, and no matter what you try to stop it, hackers are always one step ahead of the rest of the population. They might be fine-tuning their strategy, which is why you haven't heard from them yet. Isn't it soothing? To assist prepare for preventing and combatting it, we need the proper leadership at the top of our businesses.
3. Customer Insistence On Cyber Security Proof Of Concept
On government projects, this type of security or disaster recovery proof of concept is frequent. Particularly when data sensitivity is high and downtime is vital to the project's success. If a flood or significant data breach occurs, you may need to demonstrate that you can be up and operating someplace else in 24 hours or somewhere secure. Private-sector initiatives, on the other hand, are frequently immune to this form of demonstration of service. Not any longer. Expect any tech project of moderate scale, complexity, or data sensitivity to include this as part of the project criteria in 2018 and beyond. We live in a world that is very different from the one we grew up in. I used to run government programs worth millions of dollars that handled millions of sensitive financial information, and no one worried about security — only disaster recovery and project continuity. With cloud-based storage and processing, as well as the perseverance and talents of hackers, expect hacker attacks to become more common and do more harm in the future.
Want to learn more about the same? Enroll in project management or business analysis professional certification courses today!
コメント