Agility and Security
Imperatives in tension
Agility
Security
• The Network Age• Network Age Enterprise• Agility and Emergence• Some Thoughts on Risk
Meta Context
Industrial -> Information (Network) Age
From: http://www.industrialrevolutionresearch.com/images/factory.gif
From: http://www.nyc-architecture.com/LM/Ellis_island(1).jpg
From: http://www.mkbergman.com/date/2006/07/
$
From: http://theformofmoney.blogharbor.com/blog/_archives/2009/3/24/4131366.html
From http://www.humanthermodynamics.com/watt-engine.jpg
From: http://history.cultural-china.com/en/34History7223.html
From: http://www.goldenswamp.com/2009/08/22/educations-reductionist-flaw-is-like-the-digesting-duck/
http://www.lamag.com/featuredarticle.aspx?id=13526&page=2
http://www.computerhistory.org/internet_history/internet_history_70s.html http://www.livinginternet.com/i/ii_kahn.htm
http://www.velocityguide.com/internet-history/lawrence-roberts.html
http://www.let.leidenuniv.nl/history/ivh/chap2.htm
http://www.fmsasg.com/SocialNetworkAnalysis/
http://www.web-censorship.org/congratiolation-piratpartiet-pirate-party/
http://farm3.static.flickr.com/2027/2449663234_ea24706dc8_o.png
http://www.opensource.org/
http://itunes.apple.com/us/app/seeclickfix-plus/id348529764?mt=8
http://www.how-why.com/ph510/index.html
http://www.ukuleleman.net/uploaded_images/Bush%20Faces%20of%20the%20dead-795931.jpg
The Corporate Enterprise
In the Network Age
http://www.acsu.buffalo.edu/~jconte/Images/Sheeler_American_Landscape.jpg
http://swik.net/Technology-News+infrastructure
http://worldwidegoodnews.com/blog/?p=194
http://connect.in.com/gravitational-force/photos-gravitational-20force-13347ed2bc4673f6.html
http://www.calacirian.org/?p=725
Becoming Agile
(and Emergent)
Intentional Emergence
Surroundings
Generativity = “a system’s capacity to produce unanticipated change through unfiltered contributions from broad and
varied audiences.”
http://21gov.net/about/press-release/
Thoughts on Risk
Consumerization of IT Interconnected networks
Integrated suppliers
Outsourcing Identity
App prolilferation
Transactional relationships
Third party contractors
http://www.walyou.com/blog/2008/10/05/usb-security-gadget-lock-up-your-gadgets/
Work pushed here
http://complexity.orconhosting.net.nz/history.html
“…information is important as a stage in the continuous process by which we observe the outer world, and act effectively upon it.” … “There is no Maginot line of the
brain.”
“In anything like a normal situation, it is both far more difficult and far more important for us to ensure that we have an adequate knowledge than to ensure that some
enemy does not have it.”
“We need to emphasize our ability to observe and process the world, rather than protect what we know.”
Bias toward Safe Enablement
http://www.mxcsoft.com/Man_Securing%20Your%20Emails.htm
http://mapandcounters.blogspot.com/2010/05/tahgc-france-1940-1972.html
backups
http://ifisc.uib-csic.es/img/Bio.jpg
http://upflysoft.com/2010/05/29/yahoo-weather-3-0-freeware-2/
http://venturebeat.com/wp-content/uploads/2009/03/28811286_e1671e30a9.jpg
Further Reading
From: http://kl.zensci.dk/industrial-revolution
http://www.autolife.umd.umich.edu/Race/R_Overview/Rouge_Plant.htm