New Global Research from Accenture Interactive Urges CMOs to Put People Before Data Collection

New Global Research from Accenture Interactive Urges CMOs to Put People Before Data Collection

Nearly 69% of consumers would stop doing business with a brand if data usage became too invasive NEW YORK; Oct. 16, 2019 – New global research released by Accenture Interactive offers guidance to chief marketing officers (CMOs) on strategies to use data respectfully and responsibly
Reuters news

Huawei to develop radars for self-driving cars, top executive says

BEIJING (Reuters) - Huawei Technologies Co Ltd will utilize its 5G technologies to develop radar for self-driving cars, its deputy chairman told a conference, as the Chinese manufacturer looks to play a bigger role in the auto industry. Huawei will build an “ecosystem” of car-equipped
John Pientka

Directive 20 Repealed – Beat the Cyber War Drums?

Exposed by Snowden in his 2013 document dump, Presidential Directive 20 limits the U.S. in attacking/counter attacking with cyber weapons. Now it has been rescinded. Does that mean the gloves are off?

We’ve been under attack for a long time. You see signs of it in the headlines – email hacks, records stolen, malware and social media weaponized. Increasingly, the government brings very specific but token indictments against Russians, Chinese and North Koreans.

Critics have lamented for years that we have got to do more than just name and shame the assailants. It turns out that an Obama era directive hamstrung our responses and required presidential permission to launch any cyber action that might have “significant consequences”.

Looks that is all changing. National Security Advisor, John Bolton confirmed that the Presidential Directive 20 has been dumped and a new, more aggressive Cyber Strategy is now in its place. In a call with reporters Bolton cited a number of high-profile cyber attacks such as the 2017 WannaCry and NotPetya malwares, as well as the recent attack on my city of Atlanta, as examples of how the U.S. and other governments are under siege from both nation-states and criminal hackers.

It’s clear that the U.S. cyber capability is very robust. The phenomenal detail in the DNC hacking indictment of twelve Russian GRU officers indicates we know who is doing what, down to their very keystrokes. Now, Bolton is clearly signaling that “any nation that is taking cyber activity against the United States … should expect … that we will respond offensively as well as defensively”.

On a gut level the concept of hitting back at these state and non-state bad actors feels pretty good. At last we are doing something instead of just sitting there like a cyber punching bag and taking it. But what are the implications of going on the offense?


First, A focus on offense increases international tensions and states’ readiness to launch a counter-offensive after a cyber attack, and it often heightens cyber vulnerabilities. Would this lead to a vicious spiral of increasing deadly capabilities as happened with nuclear weapons until we reach the policy madness of Mutually Assured Destruction?

Unfortunately, no – Cyber weapons require nowhere near the money and physical infrastructure needed to maintain and deploy those that traditional physical weapons do. Almost any actor can acquire them. This means an offensive counter attack may hurt the original attacker but it won’t necessarily inhibit them from further attacks.

Second point to consider: The U.S. is much more vulnerable to cyber attack than many other players. Much of our infrastructure (electric, gas, water, etc.) is mostly unprotected from cyber. Surprisingly (or luckily), Russia and China are also pretty vulnerable to cyber attacks as shown by the WannaCry virus last year. So we do have a bit of a Mexican standoff with these major powers but can we take any comfort from this – once again, no. There are lots of smaller states, e.g. North Korea, and non-state actors (criminals and terrorists) that have their hands on these cyber weapons.

So, what are we left to do? It’s time to recognize the new normal. Cyber security challenges are here to stay and we need to up our security hygiene. We need to deploy new tools and disciplines to protect our infrastructure. And, we need some new laws and penalties for organizations that don’t do it. Look at Equifax. A year after losing the coveted details of 140 Million Americans, nothing has happened to them. (Unless you want to count that you can now freeze your credit record for free.)

You are responsible, too. The weakest links in all our systems are the people. Do you know to be careful opening emails that look legitimate but might be a phishing attack? How about not going to some web sites? Or, are you sure you want to download that “free” software? Do your peers know the same disciplines?

Yep, get ready for the new normal.

By John Pientka

  • Articles
John Pientka Contributor
Principal of Pientka and Associates
John is currently the principal of Pientka and Associates which specializes in IT and Cloud Computing. Over the years John has been vice president at CGI Federal, where he lead their cloud computing division. He founded and served as CEO of GigEpath, which provided communication solutions to major corporations. He has also served as president of British Telecom’s outsourcing arm Syncordia, vice president and general manager of a division at Motorola. John has earned his M.B.A. from Harvard University as well as a bachelor’s degree from the State University in Buffalo, New York.
How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove ...
Aaron Continelli

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP ...
How Can We Use Artificial Intelligence When We Can't Handle Real Intelligence?

How Can We Use Artificial Intelligence When We Can’t Handle Real Intelligence?

Artificial Versus Real Intelligence In this article we will be discussing the pitfalls of societal disillusionment with facts, and how this trend may become troubling ...
Michela Menting

Protecting Devices From Data Breach: Identity of Things (IDoT)

IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create ...
Ankur Laroia

Why ‘Data Hoarding’ Increases Cybersecurity Risk

Data Hoarding The proliferation of data and constant growth of content saved on premise, in cloud storage, or a non-integrated solution, poses a challenge to ...
It Programs Compressor