Commintment III. Ensure that social cohesion is considered in devising governance structures, policy formulation and policy implementation and establish procedures and mechanisms to ensure this is achieved and t
- Public sector branches at all levels demand the capabilities to empower access to private data and openly allows spoofing the devices in their own systems.
- Less than 2% of the graduating college students have learned the skills to meet traditional security and privacy requirements.
![]() |
| Picture 1. ISACA Infographic on security |
- The skills to meet the demand of advanced threats - does not exist, while we had limited coverage of traditional threat defenses.
- Our checklist mentality was ineffective and accepted by the masses
- Those leading the masses use motto's like
- "The truth doesn't matter"
| Picture 2 Its this simple and we ignore the features for back doors and fuzzy tactics |
- We criminalized or discredited the experts who tried to bring attention to the issues.
- The skills to meet the demand of today's technology advances - do not exist and have not been identified by the experts
- Private sector stakeholders demand the capabilities to empower them and their users the ability to break the law, for lawless purposes and are not held accountable.
- While using a bottoms up decision making model - each decision is limited to a persons own mental models
- Diversity challenges us to accept the differences in others, yet we discount those who don't speak, write or have the same life experiences.
- an intelligent and proven expert can be isolated from the discussions
- and limited in their ability to influence others
- Without the skills and capabilities with feedback loops to manage the exceptions
- Without the appropriate rewards systems and monitoring to identify changes in the environment
- Without the natural and human emotions to balance their own desires or rewards after they've met the needs of many.

No comments:
Post a Comment