Security Circle


Security Circle

.fusion-button.button-10 .fusion-button-text, .fusion-button.button-10 i {color:#ffffff;}.fusion-button.button-10 .fusion-button-icon-divider{border-color:#ffffff;}.fusion-button.button-10:hover .fusion-button-text, .fusion-button.button-10:hover i,.fusion-button.button-10:focus .fusion-button-text, .fusion-button.button-10:focus i,.fusion-button.button-10:active .fusion-button-text, .fusion-button.button-10:active{color:rgba(255,255,255,0.66);}.fusion-button.button-10:hover .fusion-button-icon-divider, .fusion-button.button-10:hover .fusion-button-icon-divider, .fusion-button.button-10:active .fusion-button-icon-divider{border-color:rgba(255,255,255,0.66);}.fusion-button.button-10:hover, .fusion-button.button-10:focus, .fusion-button.button-10:active{border-color:rgba(255,255,255,0.66);}.fusion-button.button-10 {border-color:#ffffff;border-radius:2px;}.fusion-button.button-10{background: rgba(144,201,232,0); background-image: -webkit-gradient( linear, left bottom, left top, from( rgba(90,171,214,0) ), to( rgba(144,201,232,0) ) ); background-image: -webkit-linear-gradient( bottom, rgba(90,171,214,0), rgba(144,201,232,0) ); background-image: -moz-linear-gradient( bottom, rgba(90,171,214,0), rgba(144,201,232,0) ); background-image: -o-linear-gradient( bottom, rgba(90,171,214,0), rgba(144,201,232,0) ); background-image: linear-gradient( to top, rgba(90,171,214,0), rgba(144,201,232,0) );}.fusion-button.button-10:hover,.button-10:focus,.fusion-button.button-10:active{background: rgba(255,255,255,0);}About




i.fb-icon-element.fontawesome-icon.fb-icon-element-9{ color: #e9b35d;}i.fb-icon-element.fontawesome-icon.fb-icon-element-9:hover { color: #ffffff;}

Discussion


Join the discussion on security systems innovation in our Slack workspace.fusion-builder-column-43 .hover-type-liftup:before{border-radius:4px 4px 4px 4px;;}



i.fb-icon-element.fontawesome-icon.fb-icon-element-10{ color: #e9b35d;}i.fb-icon-element.fontawesome-icon.fb-icon-element-10:hover { color: #ffffff;}

Members


See all individual and organizational members of this circle.fusion-builder-column-44 .hover-type-liftup:before{border-radius:4px 4px 4px 4px;;}



i.fb-icon-element.fontawesome-icon.fb-icon-element-11{ color: #e9b35d;}i.fb-icon-element.fontawesome-icon.fb-icon-element-11:hover { color: #ffffff;}

Organizors


Contact us if you would like to be part of organizing this Circle.fusion-builder-column-45 .hover-type-liftup:before{border-radius:4px 4px 4px 4px;;}



i.fb-icon-element.fontawesome-icon.fb-icon-element-12{ color: #e9b35d;}i.fb-icon-element.fontawesome-icon.fb-icon-element-12:hover { color: #ffffff;}

Newsletter


Join the mailing list and we will keep you posted on updates.fusion-builder-column-46 .hover-type-liftup:before{border-radius:4px 4px 4px 4px;;}

.modal-4 .modal-header, .modal-4 .modal-footer{border-color:#ebebeb;}

×



Security Today

The security challenges of the 21st century are mounting in complexity as they move up from the national to the global level. In an interconnected global economy the threats are systemic, they are interconnected and interdependent across geographies, domains, and activities; a pandemic that starts in one place can be anywhere in the world within 48 hours; a cloud computing data center in Houston that is hacked can bring down critical services for enterprises around the world; a war in the middle east can be a migration crisis in Europe with political disruption that affects the world. The security threats are shifting from parts to whole systems and networks, you pull on one part and you find you can only go so far with it before you see how interconnected it is with all the other issues, in this context the traditional analytical approach that is focused on securing specific high-value centralized components is limited in its capacities.

Resilience Approach

The locus of our security efforts has to shift from parts to whole networks; from fortification of centralized systems to decentralized capacity building, a fundamental paradigm shift from resistance to resilience. From a narrow technocratic vision of security as a technical issue to a wholistic approach which accounts for all relevant factors. Systemic environmental, technological, economic and social risks are what present the greatest threats to individuals and societies around the world today and combating them requires a new systemic approach to risk and security, one that is designed to channel resources in insurance, finance, and the security industry into the building distributed capacities.

0 views

Systems Innovation

  • LinkedIn
  • YouTube
  • Twitter
  • Facebook