Thinkers360
Interested in getting your own thought leader profile? Get Started Today.

Alex Sharpe

Principal at Sharpe Management Consulting LLC

Clinton, United States

Big 4 Trained Management Consulting with Real-World Operational Experience

Executive, Management Consultant, Advisor
Digital Transformation, Cybersecurity, Privacy, Strategy, Operations, M&A
Speaker, Author

Work History.
Sharpe Management Consulting LLC
eForce, VP East Coast and Global Operations
The Hackett Group, Co-Founder
KPMG, Practice Leader
Booz Allen & Hamilton, Practice Leader
National Security Agency (NSA)

Formal Education.
Columbia Business School, two awards of merit
Digital Transformation, Finance, Strategy, Globalization
Value Investing
Johns Hopkins University, Masters
Systems Engineering, Operations Management, Program/ Project Management
New Jersey Institute of Technology (NJIT), BSEE
Computer Science, Math

Executive Education.
George Washington University, Engineering Economics
Carnegie Mellon University (CMU), Information Networking Institute (INI)
MIT
First Finance Institute (FFI)

Certifications.
CMMC RP
ISACA CDPSE (Certified Data Privacy Solutions Engineer)
INFOSEC (Cybersecurity) Analyst (NSA)
Cryptologic Engineer (NSA)
Mergers & Acquisitions (M&A)
Blockchain Technologies: Business Innovation and Application
Intellectual Property (IP)
Business Analytics
Globalization

Available For: Advising, Authoring, Consulting, Influencing, Speaking
Travels From: Morristown, NJ
Speaking Topics: Cybersecurity, Value Creation, Digital Transformation, Governance Risk Management and Compliance (GRC),, Critical Infrastructure

Speaking Fee $1 (In-Person)

Alex Sharpe Points
Academic 160
Author 526
Influencer 143
Speaker 152
Entrepreneur 325
Total 1306

Points based upon Thinkers360 patent-pending algorithm.

Thought Leader Profile

Portfolio Mix

Featured Videos

Featured Topics

Sun Tzu and the Art of CyberSecurity (or Critical Infrastructure Protection)

This presentation is always well received especially when tailed to specific areas like Privacy, GRC, Risk Management, healthcare, Critical Infrastructure Protection, and the like.

Sun Tzu is traditionally credited as the author of The Art of War, an influential work on strategy that has affected both Western and East Asian philosophy. His works focus much more on alternatives such as stratagem, delay, the use of spies, the making and keeping of alliances, the uses of deceit.

Sun Tzu's work has been praised and employed in culture, politics, business, and sports, as well as modern warfare.

Technology Innovation While Mitigation Cyber Risk

Human productivity is driven by technical innovation. Whether it is the invention of the wheel or Artificial Intelligence (AI) the patterns are very consistent and the nature of the crucible that fuels the fire of innovation does not change. We explore these patterns, we look at current trends, and we talk through how to do this safely:

- cybersecurity
- privacy
- ethics
- IP protection
- Risk Management
- Creative Destruction
- Crossing the Chasm
- Accelerators

Cybersecurity Maturity Model Certification (CMMC)

CMMC brings together national standards, and international standards, with industry-accepted principles of Global Risk Management & Compliance (GRC) to improve cyber hygiene for companies and critical infrastructure (CI). Currently mandated for suppliers to the US Department of Defense (DoD) it is being looked at all of the US Government and its Allies. The recent Executive Order (EO) and extension of EU sanction only accelerate the adoption.

This presentation is often focused on specific topics like special consideration of the Cloud, coexistence with other mandates like HIPA or GDPR, or timely topics like SolarWinds and Operational Resilience (OR).

Company Information

Company Type: Service Provider
Theatre: Global
Media Experience: 20 years
Last Media Training: 07/16/2020
Last Media Interview: 07/03/2020

Areas of Expertise

AI 30.81
Analytics 32.17
AR/VR
Big Data 31.58
Blockchain 36.84
Business Continuity 45.47
Business Strategy 54.57
Change Management 30.23
Cloud 54.56
Cryptocurrency 39.33
Customer Experience
Cybersecurity 74.52
Design Thinking
Digital Disruption 34.49
Digital Transformation 37.86
Emerging Technology 31.49
ERP 30.30
FinTech
Future of Work 30.33
Health and Safety 30.80
Innovation 30.39
Leadership 30.22
Management 30.31
Marketing 30.73
Mobility 30.19
Open Innovation
Predictive Analytics 30.26
Privacy 33.44
Risk Management 100
Startups 30.28
Supply Chain 31.16
Legal and IP 33.74
Mergers and Acquisitions 32.92
Security 32.81
IoT 30.07
Metaverse 35.55
HealthTech 30.46
National Security 38.35

Industry Experience

Aerospace & Defense
Automotive
Consumer Products
Federal & Public Sector
Financial Services & Banking
Healthcare
High Tech & Electronics
Higher Education & Research
Insurance
Manufacturing
Media
Other
Pharmaceuticals
Professional Services
Retail
Telecommunications
Travel & Transportation
Utilities
Wholesale Distribution

Exclusive Content    Join Alex Sharpe's VIP Club

Publications

9 Academic Certifications
Digital Strategies for Business: Leading the Next Generation Enterprise
Emeritus
January 15, 2021

Credential ID 28084128

See publication

Tags: Business Strategy, Digital Transformation, Emerging Technology

Digital Strategy for Business
Emeritus and Columbia Business School
January 15, 2021

Credential ID 28084128

See credential

See publication

Tags: Business Strategy, Digital Disruption, Digital Transformation

Executive Access: Branding on a Shoe String
Columbia Business School Executive Education
January 15, 2021

Credential ID 28187447

See publication

Tags: Business Strategy, Digital Transformation, Marketing

Intellectual Property (IP) for Entrepeneurs
Columbia University - Columbia Technology Ventures SEAS
December 15, 2020

See publication

Tags: Emerging Technology, Legal and IP, Mergers and Acquisitions

Quantitative Intuition: Making Smarter Decisions with Imperfect Information
Columbia Business School Executive Education
September 18, 2020

See publication

Tags: Analytics, Business Strategy, Predictive Analytics

Mergers and Acquisitions (M&A)
Colummbia Business School and First Finance Institute
January 15, 2020

See publication

Tags: Business Strategy, Mergers and Acquisitions, Risk Management

Blockchain Technologies: Business Innovation and Application
Massachusettes Institute of Technology (MIT) Sloan School of Management
April 15, 2019

Credential ID 1519138336

See publication

Tags: Blockchain, Cryptocurrency, Emerging Technology

Globalization Strategies for Your Enterprise Globalization (Online): Strategies for Your Enterprise
Columbia Business School
May 15, 2017

See publication

Tags: Business Strategy, Digital Transformation, Risk Management

Business Analytics
Columbia Business School
April 15, 2017

See publication

Tags: Big Data, Business Strategy, Predictive Analytics

3 Adjunct Professors
“Sun Tzu and the Art of Cyberwar/ Cyber Governance”
San Diego Statue University (SDSU)
January 11, 2022

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

“Cloud Security, Audit, and Governance”
San Diego Statue University (SDSU)
January 11, 2022

See publication

Tags: Cloud, Cybersecurity, Risk Management

“Artificial Intelligence (AI) – unlocking the value while mitigating Cyber Risk”
San Diego Statue University (SDSU)
January 11, 2022

See publication

Tags: AI, Business Strategy, Risk Management

5 Advisory Board Memberships
BWG Strategy LLC
BWG Strategy
August 15, 2020
BWG is an invite-only network for senior executives across technology, media and telecom. BWG industry professionals participate in a series of roundtables discussions, which are a valuable resource for market intelligence, business development and personal / professional networking.

See publication

Tags: Cybersecurity, Digital Disruption, Digital Transformation

Advisor to Board of Directors
Toda Financial
August 02, 2020
TECHNOLOGY TO ENABLE A NEW ECONOMY

Digital assets with speed, mobility, security, privacy & clear ownership

TODA, a decentralized protocol for ownership management, enables the secure and efficient creation, ownership, and transfer of meaningful digital assets, providing a transformational digital foundation from the bottom up. TODA can represent assets in any business setting: identity, goods, services, and of course, currency. In addition to TODA, there is also the Adot Protocol, an internet application protocol that enables interoperable digital asset trade.

Our TODA-as-a-Service platform, TaaS, gives direct access to TODA and provides unprecedented trust, efficiency, and interoperability to enterprises, banks, and governments. We provide business solutions including commodity backed digital currencies, payments, remittances, loyalty, audit, regulatory supervision and supply chains.

See publication

Tags: Blockchain, Cybersecurity, Digital Transformation

2020 IT Budgets: Iteration 6 - July 2020
BWG Strategy
July 31, 2020
We directly compare results across six versions and have committed to running this report monthly through the summer of 2020. These latest results highlight trend updates and sentiment shifts across the enterprise software ecosystem.

We found more signs of stagnating budget growth in 2020. The median rate of budget growth remains at 0% YoY, in-line with our June survey.

See publication

Tags: Business Strategy, Cybersecurity, Digital Transformation

Chair, Advisory Board
Talon Companies
June 01, 2020
Working with Talon's senior leadership to expand their services and geographic coverage.

Our highly specialized team has been doing Cybersecurity long before it became popular and mainstream. Unlike many other firms, we understand the operational needs and complexities of modern business realities. We have successfully delivered our expertise to the largest corporations, government agencies, and small to medium-sized businesses, and are ready to connect with you.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

Columbia Technology Ventures
Columbia University
January 15, 2019
There has always been a special place in my heart for startups and innovative companies. As a Mentor for Columbia Technology Ventures and the IBM Blockchain Launch Accelerator, I work with startups in the areas of CyberSecurity, Artificial Intelligence (AI), and Blockchain to transform their ideas into sustainable businesses.

See publication

Tags: AI, Cybersecurity, Digital Disruption

6 Analyst Advisorys
Proposed Second Amendment to 23 NYCRR Part 500 - Comment
State of New York Cybersecurity Resource Center
January 09, 2023

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

"Money and Payments: The U.S. Dollar in the Age of Digital Transformation”
Global Digital Currency and Asset Association (Global DCA)
June 06, 2022
Response to Board of Governors of the Federal Reserve System, regarding Central Bank Digital Currency (CBDC).

See publication

Tags: Cryptocurrency, Digital Disruption, Risk Management

Review of Bank Secrecy Act Regulations and Guidance
Global Digital Currency and Asset Association (Global DCA)
February 14, 2022
The Financial Crimes Enforcement Network (FinCEN) is issuing this request for information (RFI) to solicit comment on ways to streamline, modernize, and update the anti-money laundering and countering the financing of terrorism (AML/CFT) regime of the United States. In particular, FinCEN seeks comment on ways to modernize risk-based AML/CFT regulations and guidance, issued pursuant to the Bank Secrecy Act (BSA), so that they, on a continuing basis, protect U.S. national security in a cost-effective and efficient manner. This RFI also supports FinCEN's ongoing formal review of BSA regulations and guidance required pursuant to Section 6216 of the Anti-Money Laundering Act of 2020 (the AML Act). Section 6216 requires the Secretary of the Treasury (the Secretary) to solicit public comment and submit a report, in consultation with specified stakeholders, to Congress by January 1, 2022, that contains the findings and determinations that result from the formal review, including administrative and legislative recommendations.

See publication

Tags: Cryptocurrency, Risk Management, National Security

USA: CMMC 2.0
Onetrust Data Guidance Magazine
January 11, 2022

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

Cloud Market Outlook (Update)
BWG Strategy Insight Reporrt
January 05, 2022

See publication

Tags: Business Strategy, Cloud, Digital Transformation

Letter of Support for GeneInfoSec
AFWERX, a Technology Directorate of the Air Force Research Laboratory (AFRL)
October 18, 2021

See publication

Tags: Cybersecurity, Digital Disruption, HealthTech

43 Analyst Reports
The SEC’s Cyber Disclosures
Harvard Law School forum on Corporate Governance
June 03, 2022
This post is based on a comment letter on the SEC’s cyber disclosures submitted jointly by me, Shiva Rajgopal, and my co-author, Alex Sharpe. I chair both the Cybersecurity and Board Director programs for Columbia Business School, entitled Leading Cybersecurity at Your Organization and Corporate Governance Program: Developing Exceptional Board Leaders respectively. Alex Sharpe is long-time cybersecurity and business strategy professional with real-world operational experience. He has over 30 years of experience working in these areas nationally and internationally for both the public and private sectors including the U.S. Intelligence Community and regulators.

See publication

Tags: Cybersecurity, Digital Disruption, Risk Management

Federal Reserve. Central Bank Digital Currency (CBDC) “Money and Payments: The U.S. Dollar in the Age of Digital Transformation”
Global Digital Currency and Asset Association (Global DCA)
May 20, 2022
The Federal Reserve sought feedback on the pros and cons of a potential U.S. central bank digital currency (CBDC) to determine whether and how a CBDC could improve the safe and efficient domestic payments system.

Our submission:
- suggested guardrails and regulatory environment to provide trust and stability to foster adoption
- talks about the need for the U.S. to move out on a CBDC to remain the world's fiat currency
- potentially becomes an additional tool for monetary policy
- the possible use of a wholesale token (almost all suggestions to date have been retail-based)
- talks about how a CBDC could bank the unbanked and could also be used to
- potential for financial inclusion.

See publication

Tags: Cryptocurrency, Cybersecurity, Risk Management

BWG Insights: Artifical Intelligence (AI) Industry Outlook
BWG Strategy
October 15, 2021

See publication

Tags: AI, Digital Transformation, Risk Management

End User Computing Securiy, Data Loss Detection (DLD), and Data Loss Prevention (DLP)
BWG Strategy
September 30, 2021

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

BWG Insights Report IT Budget Pulse: Sept 2021
BWG Strategy
September 15, 2021

See publication

Tags: Business Strategy, Cloud, Risk Management

BWG Insights Report IT Budget Pulse: Aug 2021
BWG Strategy
August 15, 2021

See publication

Tags: Business Continuity, Cloud, Risk Management

BWG Insights Report IT Budget Pulse: July 2021
https://bwgstrategy.com
July 23, 2021

See publication

Tags: Business Strategy, Cybersecurity, Digital Transformation

BWG IT Budget Insights Report June 2021
BWG Strategy
June 28, 2021

See publication

Tags: Business Strategy, Cloud, Cybersecurity

BWG IT Spend Insights Report April 2021
BWG Strategy
April 16, 2021

See publication

Tags: Business Strategy, Cloud, Cybersecurity

BWG Insights Report Palantir
BWG Strategy
April 16, 2021

See publication

Tags: AI, Analytics, Digital Transformation

BWG Cloud and Data Center Insights Report
BWG Strategy
April 15, 2021

See publication

Tags: Business Strategy, Cloud, Digital Transformation

BWG Strategy IT Budget Pulse
BWG Strategy
March 19, 2021

See publication

Tags: Business Strategy, Cloud, Risk Management

BWG Insights Report Enterprise Security Q1
BWG Strategy
March 19, 2021

See publication

Tags: Cloud, Cybersecurity, Risk Management

Insight Report China E-Commerce
BWG Strategy
March 15, 2021

See publication

Tags: Business Strategy, Cloud, Digital Transformation

BWG IT Budget Insights Report #11
BWG Strategy
February 19, 2021

See publication

Tags: Business Strategy, Cybersecurity, Digital Transformation

Amazon Insights Report
BWG Strategy
February 15, 2021

See publication

Tags: Business Strategy, Cloud, Risk Management

Data Platforms and Tools Released Q1 2021
BWG Strategy
January 15, 2021

See publication

Tags: Analytics, Big Data, Digital Transformation

BWG Insights Report IT Budget Pulse: 10th Edition
BWG Strategy
January 15, 2021

See publication

Tags: Business Strategy, Cloud, Digital Transformation

Slack Outage Repercussions
BWG Strategy
January 05, 2021
13% of respondents intend to cut back or churn from their paid Slack plans if a second multi-hour outage occurs in the months ahead.

See publication

Tags: Business Continuity, Business Strategy, Digital Transformation

SolarWinds Breach Insight Report and Executive Briefing
BWG Strategy
December 21, 2020
80% of Fortune 500 Companies are affected.

We conducted an Insight Report on the recently announced SolarWinds exploit. Dozens of vendors are covered in this report, with actionable content. Security executives clarify key changes as budgets reshuffle in response to this crisis.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

Solar Winds Breach - Insight Report and Executive Briefing
BWG Strategy
December 15, 2020
This 58 page report shows the impact of the breach on the software and cybersecurity industries. The report provides a nice analysis of winners, losers, and effects on IT budgets.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

BWG IT Budget Pulse Dec 2020
BWG Strategy
December 15, 2020
December showed a QoQ acceleration of IT spending by at least a margin of 2:1.

Each month, BWG surveys its IT decision-makers' network across several areas of spend to develop a time series of budget expectations for 2020 and beyond.

See publication

Tags: Business Strategy, Cybersecurity, Digital Transformation

BWG Insight Report IT Budget Nov 2020
BWG Strategy
November 20, 2020
The average budget in our survey is expected to expand by 2% for full-year 2020, vs expectations of a 1% contraction in our prior report.

This is BWG’s 8th IT spend report, which we developed at the onset of COVID-19 to track key spending trends. Each month, BWG surveys its network of IT decision makers across several areas of spend to develop a time series of budget expectations for 2020 and beyond.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

IT Budget Pulse Oct 2020
BWG Strategy
October 22, 2020

See publication

Tags: Business Strategy, Cybersecurity, Digital Transformation

Identitiy & Privileged Access Oct 2020
BWG Strategy
October 17, 2020
The report covers Okta, Ping, SailPoint, CyberArk, and Microsoft directly. Organizations in our sample are expecting a 1% YoY reduction in their enterprise security spend, compared to original expectations of 3%.

See publication

Tags: Cybersecurity, Digital Transformation, Privacy

2020 IT Budgets - Iteration 7
BWG Strategy
September 30, 2020
41% of respondents believe that 2021 spend will trend behind planned expectations, compared to 27% planning for next year to exceed planned spend targets.

This is BWG’s 7th IT spend report, which we developed at the onset of COVID-19 to track key spending trends. Each month, BWG surveys its network of IT decision makers across several areas of spend to develop a time series of budget expectations for 2020 and beyond.

See publication

Tags: Business Strategy, Cybersecurity, Digital Transformation

Social Media Insights Report Q3
BWG Strategy
September 18, 2020
41.03% of Respondents indicated that ROAS improved on Twitter over the past 3 months, 53.85% of Respondents indicated that ROAS stayed the same and 5.13% of Respondents saw ROAS worsen.

This report focuses on key questions related to Snapchat, Pinterest, Twitter and will capture 40+ responses from global brands, agencies & social media marketing partners.

See publication

Tags: Cybersecurity, Digital Disruption, Risk Management

BWG Next-Gen Endpoint Security
BWG Strategy
August 15, 2020
This report assesses the growth and direction of endpoint security spend in 2020;

• Measure how 2021 spend outlook has changed throughout 2020.
• Understand the pace of next-gen endpoint adoption.
• Discover whether endpoint spend is displacing other enterprise security priorities (or the other way around).
• What is gaining / losing priority vs endpoint spend?
• Updated sentiment analysis across key endpoint security vendors."

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

Identity & Privileged Access
BWG Strategy
August 15, 2020
Industry survey to determine what factors and initiatives are accelerating or delaying deployments.

Organizations in our sample are expecting a 1% YoY reduction in their enterprise security spend, compared to original expectations of 3%.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

Insight Report, 2020 IT Budgets, July 2020
BWG Strategy
July 28, 2020
Insights on: We directly compare results across six versions and have committed to running this report monthly through the summer of 2020. These latest results highlight trend updates and sentiment shifts across the enterprise software ecosystem.

We found more signs of stagnating budget growth in 2020. The median rate of budget growth remains at 0% YoY, in-line with our June survey.

See publication

Tags: Cloud, Cybersecurity, Digital Transformation

Amazon Insights Report
BWG Strategy
July 15, 2020
This report captured over $5B in GMV from 50 Global Merchants & Amazon focused agencies/rep firms across 10 product categories.

41.67% of Respondents indicated that Q2 Y/Y GMV growth significantly exceed beginning of the quarter expectations.

See publication

Tags: Cloud, Cybersecurity, Digital Transformation

APM Tools July 2020
BWG Strategy
July 15, 2020
This report tracks the most relevant and timely names in APM, including New Relic, Dynatrace, Datadog, AppDynamics, and Splunk, as an update to our Q1 report.

Spend growth across customers is holding stable across small, medium, and large organizations (all growing spend within 1% of original expectations.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

2020 IT Budgets: Iteration 5 - June 2020
BWG Strategy
June 30, 2020
Insights on: We directly compare results across all five versions and have committed to running this report monthly through the summer of 2020. These latest results highlight trend updates and sentiment shifts across the enterprise software ecosystem.

More than half of respondents are reporting lower growth outlook than the start of the year, and an additional 34% expect no change.

See publication

Tags: Cloud, Cybersecurity, Digital Transformation

2020 IT Budgets: Iteration 4 - May 2020
BWG Strategy
May 31, 2020
BWG conducted the fourth iteration of its IT budget survey from 5/11 to 5/15, covering the impact of COVID-19 on IT budgets. This survey is our latest addition to the series and we are beginning to see time series trends forming in the data.

Budgets continue to decelerate over time. Only 10% of respondents are expecting any sort of improvement in expectations for 2020, while 63% are reporting a slowdown (vs 18% in early March).

See publication

Tags: Business Strategy, Cybersecurity, Digital Transformation

2020 IT Budgets - April 2020
BWG Strategy
April 30, 2020
BWG conducted the third iteration of its IT budget survey from 4/10 to 4/15, covering the impact of COVID-19 on spend for the balance of the year. We’ve already seen a rapid change in tone between version #1 and version #2, and found further changes in budget decision making in this run of the data.

Respondents have continued to reign in 2020 IT budget growth expectations since our second iteration of this survey on 3/27. The median expected growth rate of budgets dropped 700 basis points, from 10% YoY at the start of the year, to 3% today.

See publication

Tags: Business Strategy, Cybersecurity, Digital Transformation

Enterprise Security COVID-19 and Work-from-Home Implications
BWG Strategy
April 15, 2020
This is BWG’s first enterprise security report since the onset of COVID-19 and we are tightly monitoring how budgets and vendor selection have evolved. This is a close look at which vendors are benefiting most from the demand for secure working from home.

IT Security Budgets are accelerating as a result of the COVID-19 crisis and the rise of working from home. The median budget is expected to grow by 18% in 2020.

See publication

Tags: Cybersecurity, Business Strategy, Security

2020 IT Budgets: Iteration 2 - March 2020
BWG Strategy
March 31, 2020
The situation around COVID-19 is rapidly evolving, prompting new budget decisions. We capture new information from two weeks ago, when the first iteration of our report launched. We heard from more than 60 enterprises, resellers, and consultants in this version of the survey.

At the beginning of the year, decision makers were planning 8% median budget growth in 2020. Today, budgets are expected to tighten to 5% growth, compared to 9% (an increase) in our prior iteration.

See publication

Tags: Business Strategy, Cybersecurity, Digital Transformation

IT Spending and Supply Chain
BWG Strategy
March 15, 2020
Supply chain availability out of China. We are seeing an average of 69% product availability.

BWG released an Insight Report on the quickly-evolving coronavirus situation. Over 50 BWG technology executives weighed in on supply chain conditions and IT planning/budgets for 2020. We’ve included the list of questions below. The report is a combination of two surveys released to our executive community.

See publication

Tags: Cybersecurity, Digital Transformation, Supply Chain

Applications Monitoring Q1 2020
BWG Strategy
February 29, 2020

See publication

Tags: Cloud, Cybersecurity, Digital Transformation

Slack Q1 2020
BWG Strategy
February 03, 2020
Spend is expected to increase by 55% this year across the panel and could more than double over the following five years (113% additional growth).

See publication

Tags: Cybersecurity, Digital Transformation, Future of Work

Smartsheet Insight Report Q4 2019
BWG Strategy
November 15, 2019
Smartsheet is a fast growing collaboration tool that's heading towards direct confrontations with Microsoft and niche collaboration tools.

See publication

Tags: Cloud, Cybersecurity, Digital Transformation

Vulnerability Management
BWG Strategy
October 31, 2019
This is a close look at the market for scanning activity and spend heading into 2020 with inputs from 30 security professionals.

Growth of total spend on VM tools is an estimated 35% for 2019, expected to grow by an additional 24% next year.

See publication

Tags: Cybersecurity, Digital Transformation, Privacy

SailPoint Insight Report
BWG Strategy
September 30, 2019
Respondents to share their candid thoughts on SailPoint and their direct competition.

SailPoint customers are “definitely” or “likely to” renew with SailPoint at the end their current agreements.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

14 Article/Blogs
Steganography: the ability to hide secret messages
National Cryptologic Museum
January 19, 2023
An excellent video from the National Cryptologic Museum. We talk about things like #cybersecurity #criticalinfrastructureprotection #nationalsecurity and the like, but we forget the truly scary #threats are from the #APTs and their tradecraft.

#Steganography is the craft of hiding messages like invisible ink. It is gaining renewed interest, most recently from #AI.

https://lnkd.in/e_Q9vsDv

The National Cryptologic Museum sponsors many wonderful programs. You can email them here to find more. cchevents@nsa.gov

See publication

Tags: Cybersecurity, National Security, Risk Management

Featured Article: The Board's Role in Advancing Digital Trust
Information Systems Audit and Control AssociationInformation Systems Audit and Control Association (ISACA)
November 23, 2022

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

Digital Trust Takes a Village
Information Systems Audit and Control AssociationInformation Systems Audit and Control Association (ISACA)
August 17, 2022
The World Economic Forum (WEF) estimates about 60% of the Global Economy comes from digital and that is only going to grow. Fostering Digital Trust is necessary as it becomes increasingly demanded by shareholders, customers, business partners, and regulators. Historically, digital has been the domain of I.T. That is no longer the case especially when it comes to building trust. Trust begins with the tone from the top and requires a concerted effort from the entire organization.

See publication

Tags: Business Strategy, Digital Transformation, Risk Management

DNA Is Also Data - The bad guys want it. How do we protect it?
Linkedin
July 18, 2022
The cyber industry has a long history of dealing with data and information in both paper and in digital formats. The information in our DNA is different. DNA is who we are. When compromised, it is not something we can change like a lost password or username or even a Social Security Number (SSN). We cannot even conceive of its value. There is no practical way of quantifying the financial impact of its loss.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

USA: Are employers liable for breaches resulting from employee actions and what should they do about it?
https://www.dataguidance.com/
June 29, 2022
Now that 'cybersecurity' is a board-level conversation, the question of whether employers are liable for breaches resulting from employee actions is frequently discussed. While the answer is straightforward, what to do about it is much more nuanced. Alex Sharpe, Principal at Sharpe Management Consulting LLC, discusses a framework and the key questions to ask to protect, detect, and recover, resulting in five steps that may make a real difference.

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

USA: Executive Order on Improving the Nation's Cybersecurity: What's different this time?
DataGuidance
May 18, 2021
"The art of [cyber] war is of vital importance to the State. It is a matter of life and death, a road either to safety or to ruin. Hence it is a subject of inquiry which can on no account be neglected."
- Sun Tzu.

On Wednesday, 12 May 2021, the Biden Administration issued an Executive Order on Improving the Nation's Cybersecurity. The fact sheet lists '...SolarWinds, Microsoft Exchange, and the Colonial Pipeline...' as recent motivations. Alex Sharpe, Principal at Sharpe Consulting LLC, takes a look at the historical context behind the Executive Order and analyzes what's different, and how to implement.

See publication

Tags: Cloud, Cybersecurity, Risk Management

USA: Is CMMC enough to protect my business? Three things to consider today
DataGuidance
January 06, 2021
In the first two articles in the series Alex Sharpe, Principal at Sharpe Management Consulting LLC discussed low-cost things you can do today and what is not readily apparent until you start moving through your assessment. In this article, Alex addresses what the Cybersecurity Maturity Model Certification ('CMMC') does not cover that you will want to consider for your business.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

USA: CMMC - what lies beneath
Data Protection Leader
November 02, 2020
In the first article in the series, USA: CMMC as competitive advantage and five things you can do today, Alex Sharpe, Principal at Sharpe Management Consulting LLC discussed why one shouldn't wait and the low-cost things you can do today to make your lives easier. In this article, Alex discusses what is not readily apparent until you start moving through your assessment. Think of it as an iceberg without the luxury liner. In the next article of the series, Alex will address what the Cybersecurity Maturity Model Certification ('CMMC') does not cover that may be critical to keeping your business, your customers and your partners secure. As always, your mileage may vary.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

"Iran and Russia Interfering with our election – What You Can Do to Protect Your Vote.”
Talon Cyber Tec
October 23, 2020
US Intelligence Officials warned, state actors from Iran and Russia are using email to “intimidate voters, incite social unrest, and damage [the election]”. Apparently, they have obtained voter registration data and are sending threatening emails.

What can we as individuals and business units do to not be a victim?

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

"Is Social Media Critical Infrastructure?"​
LinkedIN
October 22, 2020
Social Media is getting lots of attention especially with the upcoming election. Given the way it has woven its way into the way we work and live is it time to declare it Critical Infrastructure?

See publication

Tags: Business Continuity, Cybersecurity, Digital Transformation

USA: CMMC as competitive advantage and five things you can do today
OneTrust Data Guidance Insights
September 02, 2020
In this insight, Alex Sharpe, Principal at Sharpe Management Consulting LLC, who consults on cybersecurity, privacy, digital transformation, disruption, and other areas, draws on his experiences and provides a look into the Cybersecurity Maturity Model Certification, its advantages for organizations, and the key steps businesses can be taking to prepare. | Read more http://ow.ly/6jMQ50BfzRH

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

Digital Transformation – Adoption Requires a Catalyst - COVID the Ultimate Digital Disruptor
LinkedIN
August 20, 2020
COVID may prove to be the ultimate digital disruptor. In weeks we experienced between 5 and 10 years of digital adoption. It also accelerated Creative Destruction by the same amount and made the Cloud, Video and Collaboration the new mission critical applications.

See publication

Tags: Business Strategy, Digital Disruption, Digital Transformation

Disruption - What a Great Time to Pivot
LinkedIN
April 22, 2020
The CORONA Virus is rocking our worlds – no doubt. It is a scary time with lots of uncertainty. History tells us times like this cause a disruption which also means opportunity. Digital Adoption and Creative Destruction are both accelerated. Sir Isaac Newton created many of his foundational works while self-isolating from the plague. Many notable and highly successful companies have been started in the midst of
disruption. Apple, 3M, Microsoft, Burger King, Disney, and CNN just to name a few. Warren Buffet started what would become Berkshire Hathaway just before a market down turn. These scary times present opportunities for those willing to ask the right questions.

See publication

Tags: Business Strategy, Digital Disruption, Digital Transformation

When Blue Skies Meet Thin Air
LinkedIN
February 18, 2020
It’s a common scenario: The strategy gurus create a brilliant strategy – bold, forward-looking, expertly presented – but it completely fails when implemented. Why? Was it all thin air? Why do brilliant strategies fail? A successful implementation means that 1) Your organization is completely aligned with the new products, services or the new way of doing business, 2) Suppliers, re-sellers, analysts, distributors, analysts and customers think of you in terms of the new strategy, and 3) The business earns more money. This article talks about what happens when execution is not addressed in the planning phases.

See publication

Tags: Business Strategy, Digital Transformation, Leadership

1 Board Membership
Member, Public Policy & Regulation Committee
Global Digital Currency & Cryptocurrency Association
January 15, 2021

See publication

Tags: Blockchain, Cryptocurrency, Cybersecurity

1 Book Chapter
Building the Corporate Intranet
Wiley
November 26, 1996
Building a corporate intranet requires integrating two very different technologies; web development tools and enterprise-wide legacy systems. Few people possess enough experience in both areas to successfully make these technologies work together. The authors, leading consultants at BSG, explain the tools and techniques necessary for building an Intranet system. This book show how to plan, design and build a corporate intranet system, including how to modify the business model, automate the business processes and the content.

See publication

Tags: Business Strategy, Cybersecurity, Digital Transformation

2 Coursewares
Zero Trust Architecture (ZTA) and Software Designed Perimiter (SDP)
Cloud Security Alliance (CSA)
April 15, 2022

See publication

Tags: Business Strategy, Cloud, Risk Management

Courseware Reviewer for Certified Data Privacy Solutions Engineer (CDPSE) review manuel
ISACA
March 31, 2022

See publication

Tags: Business Strategy, Privacy, Risk Management

4 Industry Awards
Most Trusted Risk Management Solution Company
Enterprise World
February 15, 2022

See publication

Tags: Risk Management

Annual listing of 10 companies that are at the forefront of providing Cyber Security Service and transforming businesses
CIO Review Magazine
December 06, 2021

See publication

Tags: Cybersecurity

Top Risk Management Consulting Company
Enterprise Security Magazine
August 15, 2021

See publication

Tags: Risk Management

CIO Magazine Web Businenss 50/50 Award
CIO Magazine
July 01, 1999
Each year CIO magazine recognizes 50 Internet and 50 intranet/extranet sites that go beyond customary Web commerce practices to deliver outstanding business value. The Hackett Group's intranet-based knowledge management system called Mind~Share was awarded for its sophisticated knowledge engine and expansive knowledge base which seamlessly integrates structured and unstructured information to provide vital support to everyone in the company.

See publication

Tags: Digital Transformation

1 Industry Badge
Zero Trust Training (ZTT) Contributor
Cloud Security Alliance (CSA)
December 20, 2022
Earners of the Zero Trust Training (ZTT) Contributor badge have contributed to the content creation of the Cloud Security Alliance's ZTT courseware. They have demonstrated expertise in Zero Trust principles and pillars and collaborated with CSA to provide a comprehensive education course. With their contribution, they prioritized student understanding, accessibility, and vendor neutrality to ensure student success.

See publication

Tags: Cloud, Cybersecurity, Risk Management

6 Industry Certifications
Certification in Risk and Information Systems Controls
ISACA
August 19, 2021

Credential ID 2131568

See credential

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

Certified Data Privacy Solutions Engineer (CDPSE)
ISACA
April 15, 2021

Credential ID 2117254

See credential

See publication

Tags: Cloud, Cybersecurity, Privacy

Cybersecurity Maturity Model Certification (CMMC) Registered Professional (RP)
CMMC AB
January 15, 2021

See credential

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

Building a Cloud Adoption Business Case
Amazon Web Services (AWS)
November 15, 2017

See publication

Tags: Business Strategy, Cloud, Cybersecurity

NSA Certified Cryptologic Engineer
National Security Agency (NSA)
February 15, 1992

See publication

Tags: Blockchain, Cybersecurity, Risk Management

Information Security (INFOSEC) Analyst
National Security Agency (NSA)
January 15, 1990

See publication

Tags: Business Continuity, Cybersecurity, Risk Management

2 Industry Council Chairs
Zero Trust Working Group, CoChair, Zero Trust as a Philosophy & Guiding Principles
Cloud Security Alliance (CSA)
September 15, 2022

See publication

Tags: Business Strategy, Cloud, Cybersecurity

Zero Trust Organizational Strategy & Governance
Cloud Security Alliance (CSA)
September 15, 2022

See publication

Tags: Business Strategy, Cloud, Cybersecurity

6 Industry Council Members
CSA Cloud Key Management Working Group
Cloud Security Alliance (CSA)
May 13, 2022

See publication

Tags: Cloud, Cybersecurity, Digital Transformation

The Operational Resilience Framework (ORF), Global Resilience Federation, Business Resilience Council
Global Resilience Federation
April 21, 2022
The Operational Resilience Framework (ORF) working group is inviting security and resilience professionals to provide public comment on the project.

Traditional disaster recovery and business continuity efforts, often insufficient in the face of ransomware and other emerging threats, have focused on data recovery with little attention to providing services during an impaired state.

In 2021, the Global Resilience Federation’s Business Resilience Council (BRC) launched a multi-sector working group to develop the Operational Resilience Framework. The framework provides rules and implementation aids that support a company’s recovery of immutable data, while also – and uniquely- allowing it to minimize service disruptions in the face of destructive attacks and events.

Download a copy of the framework https://www.grf.org/orf and send your comments to orf@grf.org.

This multi-sector project was designed to be broadly applicable and is aligned with existing controls like those from NIST and ISO. This draft of the rules will be publicly available through June 30, 2022 and then tested in several corporate environments before being finalized.

Special thanks to ORF working group Chairman Trey Maust, as well as members Bob Blakley, Jon Washburn, Alex Sharpe, Dr. George S., Charles Blauner, and Simon Chard.

See publication

Tags: Business Continuity, Business Strategy, Risk Management

Cloud Security Alliance (CSA) Zero Trust Architecture (ZTA) Expert Group
Cloud Security Alliance (CSA)
February 18, 2022

See publication

Tags: Business Strategy, Cloud, Cybersecurity

FDIC Selects Operational Resiliency (OR) Framework to Measure Effectiveness and Impact
Federal Deposit Insurance Corporation (FDIC)
October 25, 2021

See publication

Tags: Business Continuity, Business Strategy, Risk Management

Business Resilience Council (BRC), Operational Resilience (OR) Task Force
Global Resilience Federation (GRF) Business Resilience Council
February 15, 2021
The Business Resilience Council (BRC) is a member-driven, analyst-supported, multi-sector community created to foster sharing and cooperation regarding significant incidents, threats and vulnerabilities that impact business operations of critical infrastructure and supporting sectors. The BRC provides members with business continuity, disaster response, and resilience information and best practices on physical security issues such as major weather events, pandemics and other natural disasters, as well as geopolitical threats, civil unrest and terrorism. The BRC also focuses on destructive malware attacks that can result in the major disruption of integrated IT or OT systems.

The BRC is designed for businesses with regional, national and international footprints that must manage significant crises and navigate response scenarios in order to maintain business operations.

The BRC fosters a broad, holistic community. Resilience professionals from critical infrastructure (CI) sectors are invited to join the community, as well as practitioners from organizations that provide significant support to Critical Infrastructure (CI) sectors.

See publication

Tags: Business Continuity, Business Strategy, Cybersecurity

Zero Trust Architecture, Implementation, and Maturity Model
Cloud Security Alliance (CSA)
August 01, 2020

See publication

Tags: Business Strategy, Cloud, Risk Management

2 Influencer Awards
Top 33 Cybersecurity Experts to Follow in 2021
DR. Jeff Daniels
December 28, 2020

See publication

Tags: Cybersecurity

Case Study - Pinkerton. Monitoring Global Growth with Budgeting and Forecasting
Thomson Reuters
June 30, 2016
Pinkerton was able to reduce global financial reporting from days to minutes. They also created operational dashboards so the field could manage day-to-day operations.

For more than a century, Pinkerton has been a leader in helping keep companies and their assets safe and secure. With offices on almost every continent, Pinkerton prides itself in offering innovative services, such as executive protection, corporate risk management, investigation, and employee screening.

See publication

Tags: Digital Disruption, Digital Transformation, ERP

2 IP Assets
Anti-Money Laundering Guidance
Global Digital Currency and Asset Association (Global DCA)
July 22, 2022
Overview of Anit Money Laundering/ Know Your Customer (AML/ KYC) Requirements Applicable to Digital Assets Businesses
July 2022

See publication

Tags: Cryptocurrency, Digital Transformation, Metaverse

DARPA End User Security Manager
Defense Advance Research Projects Administration (DARPA)
April 17, 1995
Some of the original research and Intellectual Property (IP) in the area of:
- Data Loss Prevention (DLP)
- Data Loss Detection (DLT)
- Software Policy Enforcement

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

1 Journal Publication
Comments on the SEC’s Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure, File Number S7-09-22
Columbia Business School, Corporate Governance and Cybersecurity Leadership Program
May 09, 2022
The Securities and Exchange Commission (“Commission”) is proposing rules to enhance and standardize disclosures regarding cybersecurity risk management, strategy, governance, and cybersecurity incident reporting by public companies that are subject to the reporting requirements of the Securities Exchange Act of 1934. Specifically, we are proposing amendments to require current reporting about material cybersecurity incidents. We are also proposing to require periodic disclosures about a registrant's policies and procedures to identify and manage cybersecurity risks, management's role in implementing cybersecurity policies and procedures, the board of directors' cybersecurity expertise if any, and its oversight of cybersecurity risk. Additionally, the proposed rules would require registrants to provide updates about previously reported cybersecurity incidents in their periodic reports.

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

4 Keynotes
Fireside Chat: Mathew Travis, CEO CMMCAB
CTG Intelligence
October 15, 2021

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

By Invitation Only - MSS Cybersecurity Maturity Model Certification (CMMC)
CTG Intelligence
August 27, 2021

See publication

Tags: Business Strategy, Cloud, Cybersecurity

"Protecting the fuel driving innovation in Life Sciences - data, IP, DNA"
Wall Street Journal
July 27, 2021

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

Sun Tzu and the Art of Cyber War – the Global Supply Chain
Infragard National Sector Security & Resiliency Program (NSSRP)
March 18, 2021
Cybersecurity in the supply chain is no longer just an IT problem. Maritime, intermodal, rail and port security must work as an integrated whole. Those who want to do us harm range from nation states and terrorists to criminal elements and activists. The unfortunate reality is the gains in productivity from technology have left us more exposed than ever. Those who want to do us harm have integrated cyber, kinetic, physical, and reputational threats into orchestrated attacks. Our defenses must be as deliberate as well.

See publication

Tags: Business Strategy, Cybersecurity, Supply Chain

28 Media Interviews
Cover Story/ Feature - Top Five significant Business Leaders, Ruling the Modern Industry 2022
CIO Times
August 01, 2022
A leader, whether in society or business plays a crucial role in giving direction to the society or organization. It is the leader who is responsible to make every person aware of where they stand and where they want to go as a team.

The modern industry is fraught with challenges. A dynamic environment, inflation at the peak, civic unrest in parts of the world, a pandemic, and evolving technology are some key issues that often evoke fear and restlessness in teams. Such situations need leaders of high caliber and proven expertise to motivate the team and keep them working towards the common company goal. Only then can they succeed as a team and as a business.

To steer the team through, leaders must communicate effectively and clearly. Nothing works like words of assurance followed by action that reinforces a positive outlook and attitude. Clear communication about what is expected of them helps employees to work better and focus on meeting or even exceeding the expectation.

Leaders must also be ready to make some tough decisions. Right action must be taken at the right time and not delayed on the pretext of being under analysis. Decisions, however tough they may be, are important to give direction to the team and instill confidence that they are on the path to progress.

In this edition of Top Five significant Business Leaders, Ruling the Modern Industry 2022, we bring you some business leaders who understand the risks but are not avert to taking them and grow with each challenge. The edition features Alex Sharpe on the cover. Also featured here are Asokan Ashok, Paul Guenther, Normanie McKenzie Ricks, and Arthi S Rabikrisson. These significant leaders inspire their workforce with their thoughts and actions t achieve the common goal of growth and success.

See publication

Tags: Business Strategy, Cybersecurity, Startups

Value Creation While Mitigating Cyber Risk
https://www.ceocfointerviews.com/
June 28, 2022

See publication

Tags: Business Strategy, Cybersecurity, Digital Transformation

Thrive Radio Podcast
Thrive Radio
April 05, 2022

See publication

Tags: Business Strategy, Change Management, Risk Management

News, Views And Stories From The Cyber Front Line
Cybersecurity Chronicles Podcast
February 02, 2022

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

Workshop Synopsis: SMBs seeking CMMC Certification and the MSS/ MSPs who support them
CTG Intelligence
October 15, 2021

See publication

Tags: Business Strategy, Cloud, Risk Management

Managed Security Services (MSS) for Small and Medium Sized Business (SMBs)
CTG Intelligence
August 27, 2021

See publication

Tags: Business Strategy, Cybersecurity, Digital Transformation

Device Innovation in Healthcare Without Compromising Patient Safety
Wall Street Journal (WSJ) and InfraGard
July 29, 2021

See publication

Tags: Cybersecurity, Innovation, Risk Management

"Managing technological Change in Healthcare While Mitigating Cyber Risks"
Wall Street Journal
July 29, 2021

See publication

Tags: Business Strategy, Cybersecurity, Innovation

Data Driven Healthcare Innovation while Mitigating Cyber Risk
Wall Street Journal (WSJ)
July 27, 2021

See publication

Tags: Big Data, Cybersecurity

"Protecting the fuel fostering innovation in Life Sciences - data, IP, DNA"
Wall Street Journal (WSJ) and InfraGard
July 27, 2021

See publication

Tags: Business Strategy, Cybersecurity, Innovation

CISO insiders - Apple Podcast - Special Edition
GRSEE
June 28, 2021

See publication

Tags: Cloud, Cybersecurity, Risk Management

As Ransomware Soars, Insurers Mull Changes
Secure Disruptions
June 23, 2021

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

Disclosure Controls and Regulatory Disincentives
Risk Insights Media
June 23, 2021

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

Reaping the rewards of the Cloud while mitigating cyber risk
123 CMMC
June 07, 2021

See publication

Tags: Cloud, Digital Transformation, Risk Management

EU Extends Sanctions to Hackers—Banks, Cyber Insurers Face Dilemma
Secure Disruptions: Bringing clarity to the complex.
May 26, 2021
The European Council extended a framework that penalizes cyber-attacks against EU or member countries for another year. The framework, part of the EU cyber diplomacy toolbox, aims to strengthen Europe's resilience against cyber threats.

See publication

Tags: Business Continuity, Cybersecurity, Digital Transformation

Fireside Chat: CMMC and Its Implications Across Borders
CTG Intelligence
May 19, 2021
MANAGED SECURITY SERIES (MSS) combines the CISO, Architect, MSS, MSP, and Corporate Security Community to address third party security, the managed security service of the future, and ways to simultaneously secure the channel whilst enabling them to bundle innovative solutions which will make a real difference to end-users.

The Cybersecurity Maturity Model Certification (CMMC) framework combines National and International Standards with industry-accepted Governance, Risk Management, and Compliance best practices to take cyber hygiene and Critical Infrastructure Protection to the next level. With recent international events, it is being looked at as an eyeball to be leveraged globally.

See publication

Tags: Business Strategy, Cloud, Cybersecurity

Sustainability of Remote Work Culture: Experts’ Advice
CX Buzz
April 14, 2021

See publication

Tags: Cloud, Cybersecurity, Digital Transformation

The Ultimate Digital Transformation Strategy Checklist: Monthly Expert Knowledge
CX Buzz
March 25, 2021

See publication

Tags: Cloud, Cybersecurity, Digital Transformation

CXBuzz Interview With Alex Sharpe Sharpe Management Consulting Founder
CX Buzz
March 07, 2021

See publication

Tags: Business Strategy, Cybersecurity, Digital Transformation

Our Own Worst Enemy? Threats in the Mirror May Be Larger Than They Appear
https://losspreventionmedia.com/
November 23, 2020
Loss prevention executives are keenly aware of the threat from insiders. After all, we’re many decades removed from when industry data revealed that employees—not shoplifters—were a greater cause of shrink. We’ve set up delivery controls, auditing systems, and background check protocols. We create exception reports to bubble-up workers associated with anomalous transactions. We zoom in on cashiers who issue an inordinate number of discounts to see if they’re pocketing proceeds. We do trust, but we are big on verify.

See publication

Tags: Cloud, Digital Transformation, Risk Management

Are Our Elections Secure? Is Social Media Critical Infrastructure?
TechStory
November 18, 2020
What do Steve Jobs, Richard Branson, Paul Harvey, & JK Rowling all have in common? They are outstanding storytellers. TechStory shines the light on other great storytellers. In this episode we speak with Alex Sharpe. An influencer who makes complex subjects feel simple and helps us see around corners. In this episode we ask the question "Are our elections secure?" and end up pondering "Is Social Media Critical Infrastrucure?"

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

Credibility Nation
THiNKaha
October 08, 2020
Interviewed by Mitchell Levy for his new book Credibility Nation. THiNKaha works with amazing thought leaders and experts to produce a compelling show for everyone. Credibility Nation is composed of humans who go about life and their business with credibility and servant leadership.

See publication

Tags: Cybersecurity, Digital Transformation, Leadership

Unlocking business value
Credibility Nation
September 02, 2020

See publication

Tags: Business Strategy, Change Management, Digital Transformation

YOU Are Even More Exposed in a Post COVID Cyber World
Talon Cyber Tec
July 28, 2020
Looking at the numbers, Small Businesses and Family Offices are the most at risk in the post Covid world. Awareness and Training remains the most cost effective form of protection.

See publication

Tags: Cybersecurity, Digital Disruption, Digital Transformation

7 techniques to build supply chain resilience
SearchERP TechTarget
May 29, 2020
In the wake of the COVID-19 pandemic, business and supply chain leaders have realized how important supply chain resiliency is. Here are seven ways to boost it.

See publication

Tags: Cybersecurity, Digital Transformation, Supply Chain

6 ways to address COVID-19 food supply chain disruptions
TechTarget SearchERP
May 07, 2020
The food supply chain may be broken, but there are initial steps companies must take in the near term. Learn how to bring order to the chaos COVID-19 has brought.

COVID-19 pandemic has highlighted a number of vulnerabilities in the food supply chain. Now, food retailers and manufacturers must act quickly to address some of these issues.

See publication

Tags: Business Continuity, Cybersecurity, Supply Chain

Classic Books on Investing and the Markets
John Kador, Wealth Management Magazine
April 03, 2020
WealthManagement.com surveyed the top investment books. In principal, investing and running a business are both about capital allocation. Given these classics a read during your self-quartantine, if you have not already.

See publication

Tags: Business Strategy, Leadership, Management

7 reasons for ERP implementation failure
SearchERP TechTarget
March 03, 2020
ERP consultants shared their analysis and takeaways from such spectacular ERP failures as National Grid, Revlon and Waste Management and gave advice on avoiding the same pitfalls.

See publication

Tags: Business Strategy, ERP, Management

10 Panels
Ask the Experts: Life, The Universe and Everything about Zero Trust
Cloud Security Alliance (CSA)
November 17, 2022

See publication

Tags: Cloud, Cybersecurity, Risk Management

Enterprise Risk Management (ERM)
Private Directors Association
September 22, 2022

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

Looking Back at the Secure Data Network System (SDNS)
Nationall Cryptologic Foundation
May 12, 2022
SDNS is a little-known effort driven by the National Security Agency (NSA) in the 80s that made the Internet safe and laid the foundation for secure online commerce. It envisioned the world we live in today with the Cloud, Zero Trust, End Point Security, and the like. SDNS took a revolutionary approach of forming public/ private partnerships and working with standards bodies like NIST and ISO to foster adoption.

See publication

Tags: Cybersecurity, Risk Management, National Security

America, apps, and attacks; protecting US apps from mobile fraud threats
Ortus Club and Shield
January 27, 2022
Panel Moderator

See publication

Tags: Cryptocurrency, IoT, Mobility

CMMC and Its Implications For MSPs and MSS Players
CTG Intelligence
November 11, 2021

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

Developing the Skills for Tomorrow’s Cyber Security Professional
CTG Intelligence
October 21, 2021

See publication

Tags: Cloud, Cybersecurity, Leadership

CMMC - What it is, what it is not and dates to watch.
FBI Infragard Houston Chapter
November 17, 2020
The Department of Defense (DoD) in an effort to increase the cybersecurity posture of the US and its Allies have created the Cybersecurity Maturity Model Certification (CMMC). Anyone doing business with the DoD must be certified at a level based on the risk they present to our Critical Infrastructure (CI). This panel is part of a series sponsored by the Federal Bureau of Investigation (FBI) outreach (Infragard) to help defense contractors navigate and prepare.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

Managed Security Services Forum Miami
CTG INtelligence
November 10, 2020

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

2020 CMMC PREPAREDNESS: AN ESSENTIAL GUIDE FOR CLEARED DEFENSE CONTRACTORS
Infragard
September 29, 2020
This panel discussion will focus on CMMC for small and medium sized businesses. We will provide an overview of CMMC and what it means for you. We will discuss how to prepare for the audit and certification process, avoiding the appeals process by getting it right the first time, etc. There will be a specific focus on the top five things you can do now to prepare and the top three business drivers that will reward those who start preparing now instead of waiting for the CMMC to be finalized. We will talk through the ins and outs of the CMMC criteria developed from years of street knowledge by working with the base standards. Speakers will include Alex Sharpe, a 30 year veteran Cybersecurity and Digital Transformation expert, Bob Ashcraft, CEO of CMMC-Solutions and currently working on CMMC readiness with a Prime CDC, John Callahan, Co-Director of the San Diego State University Cyber Tech Academy and Chief Technology Officer for Partnership Solutions International (PSI), Rusty Sailors, CEO of Protecting Tomorrow, etc.

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

The Dangers Of A Remote Work Revolution - Cybersecurity Round-Table
Hosted by Donald Allen, DA Cybersecurity
April 02, 2020
Curated discussion between CISOs, practitioners and industry analysts about the future of cybersecurity with the rise of the remote worker.

See publication

Tags: Cybersecurity, Digital Disruption, Future of Work

2 Podcasts
TechStory Election Security - Is Social Media Critical Infrastructure?
TechStory
November 17, 2020
What do Steve Jobs, Richard Branson, Paul Harvey, & JK Rowling all have in common? They are outstanding storytellers. With this podcast, we shine the light on other great storytellers, pulling their secrets out of them and having a good time. Listening to great stories is the first step to becoming a better storyteller, yourself, so subscribe today.

See publication

Tags: Cybersecurity, Risk Management, Security

What Digital Transformation Means for Content, Automation, Privacy and Trust
Marketing Results Club
April 15, 2020
Street knowledge gained from helping CMO's realize their visions. As the world becomes more digital and more interconnected, the CMO is poised more than ever to drive value and improve the quality of life globally. Advances in technology continue to provide new opportunities. With that comes some rather thorny issues of privacy, trust, reputational risk and digital emissions.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

1 Profile
OneTrust Data Guidance Author Spotlight
OneTrust Data Guidance
January 11, 2023

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

5 Quotes
Your Digital Transformation Checklist for Success
Softura
September 16, 2022
"The cultural aspect of a business is one of the most fundamental yet hardest parts that need the flexibility to transform. It's not about technology; technology provides an opportunity. The key is to unlock the value by penetrating new markets, creating new offerings, and increasing productivity." - Alex Sharpe, Sharpe Management Consulting

See publication

Tags: Digital Transformation

Your Digital Transformation Checklist For Success
Spry Publishing
August 16, 2022
“The cultural aspect of a business is one of the most fundamental and yet hardest part that needs the flexibility to transform. It’s not about technology; technology provides an opportunity. The key is to unlock the value by penetrating new markets, creating new offerings, and increasing productivity.” - Alex Sharpe, Sharpe Management Consulting

See publication

Tags: Digital Transformation

"Advancing Trust in a Digital World"
ISACA
April 29, 2022
“Digital trust is the natural next step in the evolution. With cyber now a board discussion and being integrated with traditional GRC programs, there is an ever-increasing need to build trust throughout the ecosystem. As a profession, we need to not only do the right things but we also
need to instill confidence, so people know we are doing the right things.”

See publication

Tags: Business Strategy

Is CMMC enough to protect my business? Three things to consider today.
Onetrust Data Guidance Magazine
January 15, 2021
"Let's not forget - CMMC is not a bureaucratic exercise. It is a concerted effort to improve your business' security posture, the nation, and the allies. Making it a maturity model makes it easy for a third party to have a readily identifiable sense of your security posture, enabling them to make informed business decisions. Leaving us with a simple question: "Is CMMC sufficient to protect my business, my customers, and my business partners?"

See publication

Tags: Business Strategy

USA: Is CMMC enough to protect my business? Three things to consider today.
DataGuidance Magazine
January 06, 2021
"Let's not forget - the CMMC is not a bureaucratic exercise. It is a concerted effort to improve your business' security posture, the nation, and our allies. Making it a maturity model makes it easy for a third party to have a readily identifiable sense of your security posture, enabling them to make informed business decisions. Leaving us with a simple question: Is CMMC sufficient to protect my business, my customers, and my business partners?"

See publication

Tags: Risk Management

17 Speaking Engagements
Sun Tzu and the Art of Cyber Governance – Integrating Cyber into Corporate Governance/ Driving Digital Trust
ISACA
June 21, 2023
Cyber is now a board conversation. So is Digital Trust. Using the teachings of the noted military strategist and philosopher Sun Tzu as a guide, we will explore how integrating cyber governance into corporate governance will drive digital trust and help combat the cyber concerns of most enterprise. The presentation will begin with a review of the historical relationships between technology, human productivity, and business models, exploring trends like Creative Destruction as well as the ebb and flow between attack and defense. We will discuss the global, multidimensional environment of cyber, kinetic, economic, and diplomatic threats, including nation states, organized crime, cyber kiddies, and more, defining their motives, assets and capabilities so you can organize your defense and response. Using real world case studies (like SolarWinds, Colonial Pipeline and some you may not have heard of ), we will discuss the modern environment, including the broader scope of data, like intellectual property and DNA. Unlike many programs, we will be looking past technical controls, defining how to develop a multi-layer defense integrating cyber into your governance, risk management, and compliance programs, including often-forgotten high-value/high-risk items like the human threat, training, and awareness, and we will touch on contemporary topics like the role of government, ISACs/ ISAOs, third-party risk management, and operational resilience. Attendees will also learn about frameworks and standards on both a national and international level.

See publication

Tags: Cloud, Cybersecurity, Risk Management

Aligning Zero Trust with Organizational Governance and Compliance Practices
Cloud Security Alliance (CSA)
November 17, 2022

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

Second Annual Corporate Security Modernization Forum Great Lakes - Fireside Chat
CTG Intelligence
October 21, 2022

See publication

Tags: Business Strategy, Cloud, Cybersecurity

Sun Tzu and the Art of Cyberwar/ Cyber Governance
Global Security Exchange (GSX)
September 13, 2022
Cyberwar and Cyber Governance are two sides of the same coin — attack and defense. Using the teachings of the noted military strategist, Sun Tzu, we will talk through the new global multidimensional threat environment of cyber, kinetic, economic, and diplomatic. Everything from nation-states to cyber kiddies. Using real-world case studies like SolarWinds, Colonial Pipeline, and some you haven’t heard of, we will walk through the modern environment including the broader scope of data like intellectual property (IP) and DNA. We will look past historic safeguards to integrate cyber into your corporate governance programs. Often forgotten items like the human threat, training, and awareness will be discussed. Contemporary topics like public/private partnerships, ISACs/ ISAOs, Third-Party Risk Management (TPRM), and Operational Resilience (OR) will also be addressed.

➢ Participants will be able to articulate the different classes of adversaries, their methods, and their goals

➢ Participants will gain a working knowledge of the role cyber plays in a coordinated multi-dimensional strategy of attack and defense.

➢ Participants will be able to map out cyber’s role in an integrated enterprise governance, risk management and compliance (GRC) program.

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

Cyber Governance - CMMC as a Model
CTG Intelligence
May 05, 2022

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

Ransomware: Are You Prepared for a Breach?
Risk World 2022 - The Risk Management Society (RIMS) Annual Conference
April 04, 2022
How will you convince executives that ransomware and cyber security readiness lies within your purview as well as with IT? Prepare to equip all levels of organizational leadership with the necessary risk management education and training to counter the widespread disruption and financial uncertainty caused by ransomware attacks. Play an online game via your mobile device to test your knowledge of cyber security best practices and privacy laws. Take part in a war-game simulation to envision the hours and days after a company becomes aware of an attack. Focus on policies and compliance with international and state breach notification laws. And choose your own adventure through group polls that decide what direction the company should take next.
Learning Objectives.

Identify best practices for cyber risk management.
Detail the elements of a complete data assessment for the executive level.
Demonstrate why your organization needs to have a plan for cyber incident response and mitigation to protect its reputation and bottom line.

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

Value Creation While Mitigating Cyber Risk
CTG Intelligence
February 24, 2022

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

Fireside Chat: CMMC and Its Implications Across Borders
CTG Intelligence
October 21, 2021

See publication

Tags: Business Strategy, Cloud, Cybersecurity

Threats to Intellectual Property (IP) and Government resources designed to help protect your rights
CTG Intelligence
October 15, 2021

See publication

Tags: Business Strategy, Cybersecurity, Legal and IP

Panel Discussion: Special Needs of the SMBs and the MSPs that support them
CTG Intelligence
October 15, 2021

See publication

Tags: Business Strategy, Cloud, Cybersecurity

Cybersecurity Maturity Model Certification (CMMC) Global Impact
CTG Intelligence
August 27, 2021
The Cybersecurity Maturity Model Certification (CMMC) framework combines National and International Standards with industry-accepted Governance, Risk Management, and Compliance best practices to take cyber hygiene and Critical Infrastructure Protection to the next level. With recent international events, it is being looked at as an eyeball to be leveraged globally.

Managed Security Series (MSS) combines the CISO, Architect, MSS, MSP, and Corporate Security Community to address third party security, the managed security service of the future, and ways to simultaneously secure the channel whilst enabling them to bundle innovative solutions which will make a real difference to end-users.

See publication

Tags: Business Strategy, Cloud, Cybersecurity

Managed Security Services Forum Tri-State
CTG Intelligence
July 08, 2021
MANAGED SECURITY SERIES (MSS) brings together the CISO, Architect, MSS, MSP, and Corporate Security Communities to address Third Party Risk Management (TPRM), Cloud security, the managed security service of the future, and ways to simultaneously secure the channel whilst enabling them to bundle innovative solutions which will make a real difference to end-users.

See publication

Tags: Business Strategy, Cloud, Cybersecurity

Cybersecurity Maturity Model Certification (CMMC) – the DFAR Mandate
Infragard National Sector Security & Resiliency Program (NSSRP)
March 18, 2021
Cybersecurity in the supply chain is no longer just an IT problem. Maritime, intermodal, rail, and port security must work as an integrated whole. Those who want to do us harm range from nation states and terrorists to criminal elements and activists. The unfortunate reality is the gains in productivity from technology have left us more exposed than ever. Those who want to do us harm have integrated cyber, kinetic, physical, and reputational threats into orchestrated attacks. Our defenses must be as deliberate as well.

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

Adapting to Technological Change while Mitigating Cyber Threats
Infragard National Sector Security & Resiliency Program (NSSRP)
March 17, 2021
Cybersecurity in the supply chain is no longer just an IT problem. Maritime, intermodal, rail, and port security must work as an integrated whole. Those who want to do us harm range from nation states and terrorists to criminal elements and activists. The unfortunate reality is the gains in productivity from technology have left us more exposed than ever. Those who want to do us harm have integrated cyber, kinetic, physical, and reputational threats into orchestrated attacks. Our defenses must be as deliberate as well.

See publication

Tags: Business Strategy, Cybersecurity, Supply Chain

World Economic Forum, Critical Infrastructure Security and Safety
World Economic Forum, Good City Foundation
October 14, 2020
Good City Foundation is a multilateral development organization dedicated to optimizing cities as a living place for humanity. Safety and security are of paramount important to critical infrastructure, privacy and digital safety.

This forum has been rescheduled and is going virtual due to COVID-19

See publication

Tags: Cybersecurity, Health and Safety, Security

Securing the Remote Worker in a Post COVID World
Global Security Exchange Plus (GSX) - Infragard and ASIS
September 24, 2020
The COVID19 pandemic and the rise of the remote worker has forced businesses to transform operations and rethink their cyber security practices globally. Historically, business leaders, IT professionals and security professionals have relied on a strong physical barrier. Sometimes referred to as "securing the castle." Post COVID the castle walls are more porous than even. This sessions will explore those changes and what you can do about them. We will delve into the full life cycle from risk management, protection, monitoring and incident response along with the roles played by different parts of the organization from operations to IT to HR.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

Cyber Warfare in the Age of COVID-19
Global Security Exchange Plus (GSX) - Infragard and ASIS
September 24, 2020
The number of cyber attacks on a nation-state level, on US business, and on individuals has dramatically increased since the onset of the COVID19 pandemic. The cost of this could well be in the trillions of dollars, and more importantly lead to destabilization and potentially physical war in areas of the world. Explore what the dramatic and dangerous increase in cyber attacks means for US Critical Infrastructure, and how CI stakeholders can ready themselves for cyberwar in a period of restructured business models and reduced budgets.

See publication

Tags: Cybersecurity, Digital Disruption, Digital Transformation

6 Trainings
Artificial Intelligence (AI) – unlocking the value while mitigating Cyber Risk
GSX 2022
September 13, 2022
The National Security Commission on Artificial Intelligence published its final report in March 2021. It declared “America is not prepared to defend or compete in the AI era.” The report went on to discuss the power and dangers presented by AI. The report talked about the uses of AI in cyberr attacks and in cyber defense. The Economic Report of the President in 2019 came to similar conclusions. Enterprises and security professionals alike are struggling to create guardrails that unlock the value of AI while mitigating cyber risk. Much of the struggle lies in a lack of understanding of the different types of AI, how they work, the limitations and the use by attackers.

➢ Participants will be able to article what AI is, what it is not, and its history.

➢ Participants will be able to articulate the different types of AI and the importance of data

➢ Participants will be able to put controls in place to protect you, your enterprise and your staff from AI-based attacks like Deep Fakes, BOTS and Steganography.

See publication

Tags: AI, Business Strategy, Risk Management

How to manage technological change while mitigating cyber risks
Infosec World and the CyberRisk Alliance
October 28, 2021

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

How to harden your cybersecurity and critical infrastructure protection
Infosec World and the CyberRisk Alliance
October 28, 2021

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

Understand CMMC, a powerful framework for organizations across industries
Infosec World and the CyberRisk Alliance
October 28, 2021

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

Define and implement effective operational resiliency and incident response programs
Infosec World and the CyberRisk Alliance
October 28, 2021

See publication

Tags: Business Continuity, Business Strategy, Risk Management

Sun Tzu and the Art of Critical Infrastructure Protection
Infosec World
October 28, 2021

See publication

Tags: Business Continuity, Cybersecurity, Risk Management

1 Visiting Lecturer
Adapting to Technological Change while Mitigating Cyber Risk - CryptoCurrencies, Digital Assets, the Cloud and AI"
Vietnam National University (VNU) of Economics and Business
August 16, 2021

See publication

Tags: Business Strategy, Digital Transformation, Risk Management

1 Webinar
Securing the Cloud and the Remote Workforce
Security Management Magazine ASIS International
October 25, 2022
The Cloud has changed the way we work and live. It has created new business models, provided new opportunities, and has set the stage for innovations yet to be imagined. With all those benefits come new risks and a fundamental rethinking of how we operate. More mission-critical assets and data exist outside of our secure perimeter than ever before - much of which is now in people's homes. Security professionals are left with a series of questions to be answered. How do I choose a Cloud provider? How do I update my current practices like Pen Testing, Audit, and Incident Response (IR)? What about eDiscovery and eForensics?

Learning Objectives

Upon completion, participants will be able to:

* Understand how the Cloud is different than traditional outsourced models.
* Be able to articulate the unique advantages, risks, and threats in the Cloud and with a Remote Workforce
* Understand the unique security challenges, what tools exist, and mitigation strategies for both the Cloud and a Remote Workforce.

See publication

Tags: Business Strategy, Cloud, Cybersecurity

5 Webinars
The (digital) Well-Being of Families
https://www.familyoffice.com/
December 06, 2022
Family Offices and High Net worth Individuals are in a unique position as they can be large targets and unfortunately, often do not have the internal expertise to manage these kinds of cyber risk. In addition, they also have physical concerns not seen in other sectors. In this 30-minute session, "The Well-Being of Families", Alex Sharpe, will leverage decades of street knowledge to guide you on how to select the most appropriate platforms, products, and providers for your unique situation. Alex will also walk through the broad strokes of the unique risks associated with Social Media.

See publication

Tags: Cybersecurity, National Security, Risk Management

Data Breach Response: Before and After the Breach
Financial Poise
November 09, 2022

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

How to Build and Implement your Company's Information Security Program
Financial Poise
October 12, 2022

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

CYBER SECURITY & DATA PRIVACY 2022; Introduction to EU General Data Protection Regulation: Planning, Implementation, and Compliance
Financial Poise
September 07, 2022

See publication

Tags: Cybersecurity, Privacy, Risk Management

What Is The Cloud? How Does It Work? Welcome To 123 CMMC
Identity Protection Planning
June 24, 2021

See publication

Tags: Cloud, Cybersecurity, Risk Management

9 Whitepapers
Country Profile: USA Navigating the concophony of privacy laws in and out of the US
OneTrust Data Guidance
January 31, 2023
The myriad of Privacy Laws in the US, combined with the various specialty laws, regulations, and international laws, can be confusing and sometimes in conflict. This article will map out the landscape, look into the future, and share street knowledge on how to navigate the landscape.

See publication

Tags: Cybersecurity, National Security, Privacy

Are employers liable for breaches resulting from employees actions?
OneTrust Data Guidance
August 18, 2022

See publication

Tags: Business Strategy, Cybersecurity, Digital Transformation

Anti-Money Laundering Guidance
Global Digital Currency and Asset Association (Global DCA)
July 28, 2022
The following overview of U.S. anti-money laundering regulation intends to provide an overview of the key AML requirements for a Global DCA member for educational purposes and is not intended as legal advice. While it is based on, and reflects, U.S. law, this overview can serve as a good basis to assess and review your AML policies and procedures since the U.S. has one of the strictest AML regimes in the world. The terminology used in this document is the U.S. Treasury’s Financial Crimes Enforcement Network (“FinCEN”) terminology, which is the bureau that administers the Bank Secrecy Act and other anti-money laundering (“AML”) laws in the U.S. Please CLICK below to read the full overview! CLICK HERE for the Full Overview

See publication

Tags: Cryptocurrency, Digital Transformation, Risk Management

USA: CMMC 2.0
Onetrust Data Guidance Magazine
January 28, 2022
The DoD used a risk-based approach to allocate the finite resources of the defense industrial base ('DIB'), where they will do the most good. At the same time, the streamlined approach shortens the time to value while also reducing the barriers to rolling out the program to other parts of the U.S. Government and its allies. The DoD used a risk-based approach to allocate the finite resources of the defense industrial base ('DIB'), where they will do the most good. At the same time, the streamlined approach shortens the time to value while also reducing the barriers to rolling out the program to other parts of the U.S. Government and its allies.

See publication

Tags: Cloud, Cybersecurity, Risk Management

"Municipalities, Why Such a Target and What Can I do Today?"
Talon Cyber Tec
January 28, 2022

See publication

Tags: Cloud, Cybersecurity, Risk Management

Municipalities, Why Such a Cyber Target and What Can I do Today?
Talon Cyber Tec
January 12, 2022

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

USA: Is CMMC enough to protect my business? Three things to consider today
Data Protection Leader
February 15, 2021
In the first two articles in the series12 Alex Sharpe, Principal at Sharpe Management
Consulting LLC, discussed low-cost things you can do today and what is
not readily apparent until you start moving through your assessment. In this
article, Alex addresses what the Cybersecurity Maturity Model Certification
('CMMC') does not cover that you will want to consider for your business.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

Closing the CMO / Agency Gap: How Agencies Can Win Business and Build Stronger Client Relationships
Gerson Lehrman Group
April 12, 2010
The report, Closing the CMO / Agency Gap: How Agencies Can Win Business and Build Stronger Client
Relationships, is based on a survey of more than 80 senior marketing executives from a range of
industries who are members of Gerson Lehrman Group’s (GLG) expert network. The survey examines the
knowledge that marketing professionals expect from their agencies during both the pitch process and
after agencies are hired.

See publication

Tags: Digital Disruption, Digital Transformation, Marketing

Defense Message System (DMS) Messaging, Directory Services, and Security Services
Defense Information Systems Agency (DISA)
August 15, 1995
The Defense Messaging System (DMS) was an effort for the US and its Allies to modernize (Digitall Transformation) communications. It incorporated new processes, procedures, security architecture and the like. I was one of the systems architects and the primary contact for cybersecurity including Identity Access and Management (IDAM). This paper was subsequently presented at industry conferences.

See publication

Tags: Business Strategy, Cybersecurity, Digital Transformation

6 Workshops
Fraud in gaming: enhancing risk mitigation with technology
https://www.ortusclub.com/
April 14, 2022
The expert moderator, Alex Sharpe, will guide the knowledge-sharing event, stimulating discussion between participants in a closed, confidential environment. Attendance is by invitation only and complimentary. Registration is limited to a select number of guests per event.



Fraud in gaming: enhancing risk mitigation with technology

Consumer digital behavior in gaming has drastically changed over the past few years, with online vide o game marketplaces, subscription services, and in-game microtransactions now the norm. Not to be outdone, businesses are becoming more digitally savvy themselves. As a result, opportunities for growth and their subsequent risks are greater than ever before.

While companies are busy fighting fraud, revenue lost to cybercrime is still at an all-time high, and constant disruptions threaten to add up to debilitating losses. Now, tools like analytics, artificial intelligence, and mobile device fingerprinting are at the forefront of data protection measures. Only with the help of innovative technology can leaders hope to stop fraudulent accounts, suspicious attempts, and friendly fraud scams in their tracks.

* How have online fraud and cyber threats evolved in recent years?
* How do companies enable loss prevention and decreased fraud costs?
* What technologies can help futureproof systems and digital platforms?

See publication

Tags: Business Strategy, Metaverse, Risk Management

Sun Tzu and the Art of Information Security (INFOSEC)
Infosec World and the CyberRisk Alliance
October 28, 2021
The threat from Nation States and cybercriminals will only increase. Advances in new technology like the Cloud, AI, iOT, and Blockchain are creating new business opportunities. These same advances inject new risks. Cybersecurity personnel and risk managers often struggle to reap these rewards. This four-part program takes a pragmatic approach, full of street knowledge, to navigate the nuances. You will walk away ready to start implementing these learnings the very next day.

Four Parts.

1. Managing technological change while Mitigating Cyber Risks
2. Cybersecurity and Critical Infrastructure Protection - hardening the enterprise
3. CMMC: A Framework for Any Industry, Any Organization
4. Operational Resiliency and Incident Response.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

Operational Resiliency (OR) and Business Continuity (BC) – The ability to operate amidst adversity (cyber attack)
InfraGard
June 02, 2021
DESCRIPTION: If Ransomware attacks, SolarWinds, and the Colonial Pipeline disruption have taught us anything, the bad guys are not backing down any time soon, and we need to operate even while under attack. The key is proper planning, practice, and post-mortems. Cyber-attacks remain focused on stealing our data and our intellectual property (IP). But, more and more, we are experiencing disruption to the underlying infrastructure - oil, gas, electricity, water - that cannot be offline while we deal with a hacker. Real-world practitioners will cover; the threat using real-world case studies to provide five practical things you can do today that could save your organization tomorrow and review initiatives like the Cybersecurity and Critical Infrastructure Executive Order issued on May 12th. As always, you will leave with street knowledge along with a list of real-world resources.

LEARNING OBJECTIVES:
1. Be able to articulate the difference between and the value of business continuity (BC), Operational Resilience (OR), and disaster recovery (DR).
2. Be able to list the top five most common mistakes that cause the most headaches along with the top five things you can do to stay above the fray.
3. Gain working knowledge of government and industry efforts in fostering Operational Resilience (OR) along with a list of resources.

INSTRUCTOR: Alex Sharpe - Mr. Sharpe is a long time (+30 years) Cybersecurity, Privacy, and Digital Transformation expert with real-world operational experience. Unlike many people in this space, Mr. Sharpe has real-world operational experience and has influenced national policy. He has spent much of his career helping large corporations and government agencies reap the rewards afforded by advances in technology (Digital Transformation) while mitigating cyber threats.

See publication

Tags: Business Continuity, Cybersecurity, Digital Transformation

Solar Winds. Attacking the Digital Supply Chain
Infragard
February 24, 2021
Penetration of the Digital Supply Chain turned Solar Winds into a backdoor into major corporations and Government Agencies. The nature of the attack allowed the attackers to ignore many of the common defenses and highlighted weaknesses that exist in many enterprises today. Unfortunately, Digital Supply Chain attacks are nothing new. They have been written about and practiced for many years. This is just the latest escalation in the Cyber Arms Race. But why now? Come learn the history of attacks on the digital supply chain, its impact, and probably most importantly, what you can do to prevent future attacks. Come learn how complying why the plethora of laws, regulations, guidelines, and frameworks is not sufficient, and overreliance can actually cause the very problem you are trying to prevent.

See publication

Tags: Cybersecurity, Risk Management, Supply Chain

Electronic Commerrce and Information Security (INFOSEC)
ISACA
April 22, 1997

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

Internet and eCommerce Business Models
Wiley & Sons Publisherr
October 18, 1995

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

Thinkers360 Credentials

23 Badges

Radar

4 Predictions
2023 Predictions For Cybersecurity

Date : December 16, 2022

In retrospect, my 2022 predictions went pretty well. For 2023, I predict three things. First, the U.S. Cyber Czar will publish the U.S. Cyber Policy. This Cyber Policy will facilitate greater cooperation between the public and private sectors while weaving cyber throughout the U.S. Government and its Allies. The Cyber Policy will address not only protection but detection and response as well, thereby facilitating a multipronged response to incidents (e.g., diplomatic, economic, cyber, and kinetic). Second, the world will recognize the real threat is from Advanced Persistent Threats (APT), especially Nation States. The ecosystem will place greater emphasis on detection and response. Combining this with the U.S. Cyber Policy will lead to greater cooperation between private companies, Federal Law Enforcement, and national assets like Cyber Command and the Department of State. Third, the recognition that cyber is more than just technology will continue to grow. There is a general recognition that people and processes are essential. I predict that will morph into a greater emphasis on fostering a cyber-aware culture and organizational structures. My stretch prediction has to do with the decreased focus on technology. Technologists will resist or at least struggle as the cyber domain gets folded into other areas especially less technical areas.

See Radar

2023 Predictions for Metaverse

Date : November 28, 2022

The Metaverse will continue to evolve, grow, and become more mainstream. In 2023, we will see a more distinct separation between business and personal applications, much like we saw with its predecessors – the Internet and the Web. Both are looking at the Metaverse, like the Holodeck on Star Trek, forming a near-realistic global simulation where participants can freely interact. The adoption rate will largely depend on 3D technology, especially the headsets. Businesses are approaching the Metaverse like what we saw with Digital Transformation. They are looking at new markets, revenue streams, and operational efficiencies. I suspect the early applications will focus on communicating, not commuting. I also suspect businesses will continue to look at Augmented Reality (AR) for training and troubleshooting. Personal applications will evolve from gaming to more social networking and experiential commerce. We will also see the Metaverse incorporate other technologies like Artificial Intelligence (AI) to provide customizations like placing the faces of real people on avatars. Blockchain will most like help the Metaverse be decentralized and grow globally.

See Radar

2023 Predictions for Digital Transformation

Date : October 11, 2022

COVID accelerated Digital Adoption. Digital is now inherent to every business and the way we live. It will continue to weave its way into every nook and cranny in the same way electricity has. The World Economic Forum believes more than 60% of the Global Domestic Product (GDP) is from Digital and more than 50% of Corporate Valuations are from intangible assets. Digital Transformation is a board conversation. Organizations will continue to take Digital Transformation out of I.T., taking it across the enterprise, creating a greater focus on the role of culture and enhanced business models, resulting in Digital Trust as the core focus. As we move through 2023, more organizations will talk about their Metaverse strategies.

See Radar

2022 Predictions for Cybersecurity

Date : December 03, 2021

Cyber is no longer an I.T. issue. It is finally being treated as a business risk, transforming into a board issue. Cyber is unique in that it is the only risk that can affect the others. In 2022, we will see the weaving of cyber into GRC programs accelerate. With the accelerated growth of the Cloud, staffing challenges, and the like, we will see a growing interest in Third Party Risk Management (TPRM), Operational Resilience (OR), and Critical Infrastructure Protection. I also predict we will not see a national Privacy Law in the U.S. – too many hurdles. My stretch prediction is that we will see the Cybersecurity Maturity Model Certification (CMMC) grow outside of the Defense Department to other parts of the U.S. Government and its Allies.

See Radar

Blog

Opportunities