Cartoon, Quote, and Data (Beta testing postings) JDM v20220816UTV1705

Today: cybersecurity VC Deals Activity shows $740 million in capital invested in the space for July 2022 based on 59 deals. Contact via LinkedIn H. Mesfin to request more data.

GOAL: To find people that like to share ideas and are active investors. Plus know how to laugh (see cartoon as attempt to make you laugh).

Now Data, Cartoon, and Quotes

1. “You are an essential ingredient in our ongoing effort to reduce Security Risk.”
― Kirsten Manthorne

2. “Two things about the NSA stunned me right off the bat: how technologically sophisticated it was compared with the CIA, and how much less vigilant it was about security in its every iteration, from the compartmentalization of information to data encryption.”
― Edward Snowden

3. “The Internet of Things (IoT) devoid of comprehensive security management is tantamount to the Internet of Threats. Apply open collaborative innovation, systems thinking & zero-trust security models to design IoT ecosystems that generate and capture value in value chains of the Internet of Things.”
― Stephane Nappo

4. “The five most efficient cyber defenders are: Anticipation, Education, Detection, Reaction and Resilience. Do remember: “Cybersecurity is much more than an IT topic.”
― Stephane Nappo

5. “Education has always been a profit-enabler for individuals and the corporation. Education, both conception and delivery, must evolve quickly and radically to keep pace with digital transition. Education is a part of the digital equation.”
― Stephane Nappo

7. “Technology trust is a good thing, but control is a better one.”
― Stephane Nappo

8. “Digital freedom stops where that of users begins… Nowadays, digital evolution must no longer be offered to a customer in trade-off between privacy and security. Privacy is not for sale, it’s a valuable asset to protect.”
― Stephane Nappo

9. “If security were all that mattered, computers would never be turned on, let alone hooked into a network with literally millions of potential intruders”
― Dan Farmer

10. “The health sector continuously get’s pummeled by malicious actors and hackers because their cyber-kinetic security is being managed by “Participation Trophy” winning wimps!”
― James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

11. “If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked”
― Richard Clarke

12. “Information is a significant component of most organizations’ competitive strategy either by the direct collection, management, and interpretation of business information or the retention of information for day-to-day business processing. Some of the more obvious results of IS failures include reputational damage, placing the organization at a competitive disadvantage, and contractual noncompliance. These impacts should not be underestimated.”
― The IIA Research Foundation

Author: JDM

Simi Private

Leave a Reply

%d