[ad_1]
We are all familiar with the art and science of toppling dominoes since childhood. Set dominoes on the tail and knock down the first domino to create a chain reaction. A successful “run” is an uninterrupted (and satisfying) flow of flipping tiles all the way to the last tile.
The biggest stage features the most spectacular domino run with thousands of tiles, intricate patterns and 3D stacking. Successful engineering at that scale requires a stack of perseverance, vision, foresight, and the creativity to support it.
Developed through his passion for toppling dominoes, Greg Berkin brings these virtues to his role as Senior Advisor to FTI Cybersecurity. Berkin has over 30 years of experience as a software developer and his program manager for his applications, which includes engineering complex platforms to protect organizations from cyberattacks. The beginning of his “exercise” dates back to his 1984. At that time, he founded an educational software company for his start-up called Apple.
Earlier this year, Birkin’s unique skill set was invited to appear in “Domino Masters,” an unscripted reality show airing on Fox TV (Disney). Teams of three competed to find the most elaborate and artistic way to topple the dominoes. Birkin’s team, the ‘OG Topplers’, has nearly a century of experience and advanced to the semi-finals of the competition.1
The incident reinforced Birkin’s idea of how closely related his hobby was to his profession. “Dominoes often find himself applying the lessons he learned from the viral sensation of building cybersecurity to his consulting work.”
ready for success
You don’t need to be a domino master or chief information security officer to see how important and costly cybersecurity has become. projected to exceed $1.75 trillion in 2019.2
The FTI Journal asked Birkin to further elaborate on the relationship between the digital world of cybersecurity and the analog science of toppling dominoes. Here are three of his theories.
Theory 1: Setting the tiles before investigating the room is silly
An experienced domino-flipper will take a good look at the venue at work before removing the tiles. Every space has its own nook and there are different tools and tricks to pull off for a spectacular run.
The same applies to setting an effective cybersecurity strategy. To prepare for a cyberattack, you must consider the nature of your business, the amount and type of information it holds, and local regulatory requirements.
Just as each venue has its own set of toppling dominoes, organizations face unique challenges based on the extent of their overall digital footprint. Understand what makes your needs unique and choose a customized approach over a cookie-cutter solution.
Theory 2: Everything. single. Domino. count.
One tile out of place. That alone can wreak havoc on your collapse. Her one vulnerability in the security system sabotages operations and even damages the company’s reputation. In either case, mitigating risk begins with understanding the hyperconnected nature of assets.
Whether you create a demolition plan or a cybersecurity plan, you need to realize that your setup is only as strong as the weakest link or link. It’s also important to know that focusing on one domino may not set you up perfectly. Similarly, identifying potential weaknesses in the system and performing day-to-day operations can lead to missed deadlines. Or on a budget.
Theory 3: Always Have an Alternate Route to the Final Tile (Be Prepared for the Unexpected)
In the digital world, mission-critical functions cannot be compromised. should always be run. A successful domino run requires constant movement, knocking down the next piece in the correct order.
In both areas, you should always be running and making sure you’re running in case of any kind of contingency. It means you know what to do.
In domino toppling, an alternate path to the finish must be set up with additional dominoes split so that if one path fails, the other succeeds. Cybersecurity doesn’t just mean building digital backups into your systems, it also means simulating real-life scenarios to test resilience and improve your response to potential attacks.
big picture
Berkin is a firm believer in working together. Much like creating a cybersecurity plan, setting up a large domino run yourself can be cumbersome and even inefficient, he says. Working with other experts is the key to better engineering,” he says. Domino his master adds that in cybersecurity it’s easy to get caught up in the trivialities and anxieties of the moment. “You can lose sight of the forest for the trees,” he says. “Or maybe I should say ‘overturning the tiles.'”
[ad_2]
Source link