The Death of Risk Management

How the era of accelerated technologies shatter our ability to calculate the probability and magnitude of future loss events.

By Eh’den Biber

640px-Foster_Bible_Pictures_0062-1_The_Angel_of_Death_and_the_First_Passover
Prologue

We don’t listen to what we aren’t ready to listen to.

 

Dr. David Perlmutter is a neuroscientist. His latest book, “Brain Maker – the power of gut microbes to heal and protect your brain – for life” became an instant best-seller since it was publish last month, and frankly it deserve to be because it is brilliant. In the book, Dr. Perlmutter writes about how science is starting to discover the total dependency between the microbes that lives in our gut and our mental and physical state. Obesity, diabetes, Multiple Sclerosis (MS), autism, depression, cancer – all seems to have a direct correlation to the state of our intestine flora. Today I’ve shown a video-clip of an interview with the doctor on the subject to the 14 years old son of my partner. He watched it with unease and when it ended he poured a huge amount of condensed milk on his breakfast, which was in total contradiction to the advise of the doctor had during the clip to avoid if possible a consumption of sugar. I looked at him, amused, and after a few minutes I heard him saying to his mum that he found that the argument of the doctor to be not sufficient enough.

Continue reading

Advertisements

Amygdalala-land

Amygdalala-land

Why is our brain not wired for information security and what can we do to change it?

Written by Eh’den (Uri) Biber, CISA/CISM/CRISC/CISSP and a member of the NeuroLeadership Institute.

.

Romeo Romeo, where art thou Romeo?

In the last two and a half months I disappeared from the face of the earth (other than the obvious occasional participation in selected information security events). I’ve enabled a very strict filter on my mailbox, I barely saw my girlfriend (I hope I still got one) and from morning till very late at night I set down to try and understand the subject of education in the field of Information Security.  I was digging deep into academic research papers, reading books, watching documentaries and interviews – you name it. Even during the security events I’ve took the opportunity to talk and interview as many people as possible. I wanted to find out what lead to the current situation, one in which information security education is under-funded, neglected, wrongfully planned, ineffective, and most of the time practically non-existing. Continue reading