I am fascinated with the story behind cybersecurity attacks and events. It feels a bit like cops and robbers. Or, maybe more like explorers discovering new worlds … except that new world is America, we are the Native American Indians, and the explorers are the Europeans. 

What are the circumstances, the actual events, and what does all this mean?

 That is what I naturally seek to understand in every technology innovation and cybersecurity attack. I believe there is a massive amount advantage that can be gained, and wish to share that to see how you would improve this line of thinking.

What can we gain from cyberattacks

Knowledge — that is what we get and it is so valuable. I have predicted trends in technology by analyzing these attacks, and have become a better practitioner too. Let’s breakdown these takeaways and who can benefit:

Learn what is effective and ineffective at stopping attacks — a basic lesson, but valuable to those charged with sustaining healthy and robust technology products.

New technology — One of my favorite lessons is what these attackers have developed, and then working with industry and product teams to build upon. 

Operations and management — To attack and breach defenses it requires smarts and an innovative use of technology in many cases. The largest botnet and such environments deliver HUGE lessons in operational security and management. The fact is, some of the largest botnet-type cyber groups today manage magnitudes more systems (10x millions) than the largest businesses in the world.

Post event legal action — after any large cyberattack there can be legal action, court reports, FTC, and other edicts and analysis published. These can be gold from two angles, the first you get a fresh review of what worked and what truly didn’t. Another benefit is clarity on ‘due care’ and reasonable as deemed by industry groups and legal authorities, as this can be a constantly moving target for managing risk tolerance programs.

How not to be hacked

Seeking to understand how to create the best products that deliver the best experience must be supported by quality. A pillar of quality for business is security and resiliency. The better we can practice an adaptive cybersecurity mental model and learn from our peers the better. Sharing and distilling what matters in a practical sense is the first step in building such a flexible program.

Please like and share if this provided you any value!

As usual, if you liked this article, please support me by clicking LIKE and share it with your own feed! This is the best possible way that you can support me and my pursuit to share my insights, ideas, and research. If anyone has anything to add or comment on in this article, please feel free to share it with everyone below in the comments section! Learn more about me at my homepage at www.jamesdeluccia.com, LinkedIn, follow me on Twitter @jdeluccia, and soon listen on my podcast and Alexa skill briefings in the coming weeks!

About Me

I am a father, study of human behavior, strategist, cybersecurity veteran, and a coach and mentor on a journey to give more than I receive everyday. I lead teams globally, build products, and daily an executive for a leading company where I serve the largest companies in the world using the largest cloud deployments in the world impacting the financial services, healthcare, and fintech industries. I provide these publications and content through my media agency to deliver insights and advantages. Mindset, mental strength, mentorship, personal improvement, health, fitness, and humanist ideas are drawn from personal research and practice. Everything read and heard is my original works and my own perspective. All rights reserved for noted authors and sources. I produce research and strategy, as well as provide advisory services that include inquiries, briefings, consulting projects, and presentations on published findings as well as bespoke speaking engagements where I often keynote at conferences, seminars, and roundtables annually.

Leave a Reply

Your email address will not be published. Required fields are marked *