Episode 12

full
Published on:

21st Sep 2021

#12 The World is in Flux, Are You Ready to Adapt?

The last two years have seen changes that few were prepared for. In the aftermath we can argue whether it was a black swan, grey rhino, or octarine unicorn event but ultimately once the overture is done what matters is your ability to adapt to the new world order. Even if you had a specific plan in place, as such events unfold the situation will likely evolve in unpredictable directions.

Over time, change external to your sphere of control is inevitable. Some changes are large shocks that affect nations, regions or the entire world. Some only affect certain industries or a subset of business in an industry. While mitigating and planning response to known, but uncertain, events is important it is also important to avoid assumptions about future states and to build organisational structures and processes that can adapt no matter what comes over the horizon.

In this episode, we discuss being Adaptable and Adaptive. Listen to our conversation to hear our thoughts on the maybe subtle but important differences between these very similar terms.

Show artwork for Attributive Security

About the Podcast

Attributive Security
The podcast anchored in the expression “security is a property of something else”.
There is often a lot happening in the world of cyber security: new threats, new exploits and new products. Don’t get us wrong, there is a lot of cool technology, and we appreciate that. But, at least on the surface, a lot of the defensive advances look to be very bottom up and technology focused. It is easy to lose sight of the context, what matters to us that we want to protect, and yes even enable.

Join us as we get together for unscripted conversations about a broad range of topics and relate them to cyber security. We’ll draw on various disciplines, and our own experiences, as we discuss ideas and practical approaches to tailored information security. We won’t be afraid to challenge one size fits all and best practice norms, or the misapprehension that bespoke security frameworks are infeasible for all but the biggest of enterprises. Be prepared to reimagine what an effective cyber security program can look like when it is engaged with and aligned to the business.

About your hosts

Martin Hopkins

Profile picture for Martin Hopkins
Martin is a cyber security leader and an experienced consultant most recently specialising in technical and business security advisory, and enterprise and technical security architecture. A regular speaker on cyber security topics, he is a strong advocate of business driven security, balanced risk management, and enterprise security architecture.

With over 25 years' experience in technology, primarily in security related fields, Martin has extensive experience in financial services having been engaged by leading global institutions.

Prior to his current focus on security architecture and risk he was a security testing consultant working on everything from mainframe systems to IoT devices and has a background in system software development for information security and virtualisation.

Maurice Smit

Profile picture for Maurice Smit
A Principal Security Consultant and SABSA Instructor, with over 20 years of experience in IT Security operations, management, governance and architecture, in a variety of industries including finance, healthcare, OT and pharmaceuticals. Maurice delivers accredited SABSA training in Europe, India, Africa and the Middle East

He is a founding member of the SABSA Institute Board of Trustees and was one of the first people in Europe to achieve SABSA Master Certification.

Maurice has contributed significantly to the development of the SABSA methodology, including co-authoring the “SABSA for Enterprise Risk Management” training course and leads the volunteer effort “SABSA World” with the aim of establishing regional SABSA communities of interest.