Best of LinkedIn: ICT & Tech Insights CW 35/ 36
Show notes
We curate most relevant posts about ICT & Tech Insights on LinkedIn and regularly share key takeaways.
This edition offers a comprehensive look at current cybersecurity challenges and strategic responses, with a strong emphasis on Zero Trust architecture as a foundational approach to network security, moving beyond traditional perimeter defences. Several sources highlight the growing impact of AI on cybersecurity, noting both its potential to augment security professionals and its use by adversaries to expand attack surfaces and automate exploits, necessitating robust AI governance. There's significant discussion on the importance of compliance and risk management, with mentions of ISO 27001, NIS2, and CMMC, and a recognition that CEOs must treat compliance as a long-term strategy. Additionally, quantum computing emerges as a transformative yet challenging force, with experts considering its implications for existing cryptographic methods and the development of quantum-safe solutions. Finally, the role of human factors in cybersecurity, from the need for skilled professionals and effective leadership to user awareness and communication of risks, is frequently underscored across the sources.
This podcast was created via Google NotebookLM.
Show transcript
00:00:00: This episode is provided by Thomas Allgaier and Frennus, based on the most relevant LinkedIn posts about ICT and tech insights in CW- three five three six.
00:00:09: Frennus supports ICT enterprises with market and competitive intelligence, decoding emerging technologies, customer insights, regulatory shifts and competitor strategies.
00:00:18: So product teams and strategy leaders don't just react, but shape the future.
00:00:24: Welcome to the deep dive.
00:00:25: We're here to cut through the noise and bring you the most critical ICT and tech trends that we're really making waves across LinkedIn in calendar weeks, thirty five and thirty six.
00:00:34: Our mission for you today is simple, a fast track to being well informed on these developments.
00:00:39: We want to give you those strategic insights you need, but you know, without the information overload.
00:00:43: Exactly.
00:00:43: And we're really going to dig into how organizations are well managing that complex balance, you know, driving innovation, navigating these increasingly sophisticated risks and also for establishing essential collaborations.
00:00:54: We're pulling directly from what industry leaders and experts were saying, so you're getting perspectives straight from those shaping the future right now.
00:01:01: Okay, sounds good.
00:01:02: Let's unpack this with our first major theme.
00:01:05: It really dominated recent discussions.
00:01:07: Cyber security and risk management.
00:01:09: It's pretty clear from these insights that the conversation has, well, significantly matured.
00:01:14: We're moving beyond just basic defenses now.
00:01:16: Absolutely.
00:01:17: The push for Zero Trust maturity models, that's a prime example.
00:01:20: Andrew Aiken really emphasized that executives must shift from the buzzwords to practical, board-ready roadmaps.
00:01:28: The real insight here, I think, for leaders is that Zero Trust isn't just about implementing some technology.
00:01:33: It actually demands a strategic board-level plan that quantifies risk reduction across areas, identity devices, network data, and so on.
00:01:41: It's about having a concrete, measurable plan.
00:01:43: That's a crucial distinction, yeah.
00:01:44: And building on that idea of... practical roadmaps.
00:01:48: Priyadav provided a fantastic real-life analogy for zero-trust architecture, or ZTA.
00:01:53: You know, forget the old castle-in-mote security idea.
00:01:56: ZTA is all about trust.
00:01:57: no one, verify everything.
00:01:59: It means continuous verification and least privilege access, making sure every interaction is authenticated, totally different from traditional perimeter defenses.
00:02:07: Right.
00:02:07: And Divine Uzo Dima highlighted why this is so critical, specifically for protecting an organization's crown jewels, you know, their most valuable data like source code or maybe product designs, protecting them from sophisticated threats that frankly easily bypass those older perimeter defenses.
00:02:23: It's a fundamental shift in defense strategy.
00:02:25: So it's less about a specific product.
00:02:28: It's more like an architectural vision.
00:02:30: Dimitri Tepper reinforced this point exactly.
00:02:32: He said zero trust isn't just a product or even a program.
00:02:36: It's an enterprise architecture vision.
00:02:38: Organizations really need to anchor it in their broader business priorities, things like agility and compliance, and this elevates identity and access management, IAM.
00:02:47: to become a strategic control plane across the whole ecosystem.
00:02:51: And this strategic vision, well, it is translating into real world applications.
00:02:54: We saw Ben Martin Barr share how Siemens is actively achieving zero trust requirements, and they're using Windows three sixty five for it.
00:03:02: This helps ensure secure access and that clear separation of professional and private data doesn't matter what device is used.
00:03:09: And what's more, Tony Mackleworth pointed out something important to.
00:03:12: he noted that Microsoft is making enterprise grade security, including the zero trust much more accessible and affordable, even for mid-market companies.
00:03:21: That's pretty critical for broader adoption, you know.
00:03:23: Oh, absolutely.
00:03:24: That accessibility is a huge game changer for a lot of organizations.
00:03:28: Now... Beyond the sort of technical implementation, how we communicate risk is equally vital, right?
00:03:34: Tamer Ejlal discussed how effective cybersecurity pros don't just block insecure practices.
00:03:39: Instead, they communicate the risks and offer solutions.
00:03:42: It's about translating those technical risks into clear business terms and then offering safer alternatives.
00:03:48: That's a much more productive approach for the business overall.
00:03:51: Indeed.
00:03:51: And for that communication to actually be effective, it needs to be rooted in solid analysis.
00:03:56: Dirk Leopold underscored the importance of consistent threat analysis and risk assessment, Terra, he emphasized it's crucial for cybersecurity compliance, rooting security in design by security right from the beginning.
00:04:09: He also highlighted tools like item is secure that can help streamline these processes.
00:04:14: Okay, that makes sense.
00:04:15: But this raises an important question.
00:04:18: What about all those increasingly smart devices we integrate into our lives and, well, our work?
00:04:25: Sven Janssen issued a pretty clear warning about smart home devices, specifically those with hidden back doors.
00:04:31: He really stressed the need to prioritize cybersecurity before you even buy something.
00:04:35: He urged us to look for reputable manufacturers, and in Germany, the BSI IT security label is something to look for.
00:04:42: And always enable two-factor authentication.
00:04:44: As he nicely put it, convenience always has a price.
00:04:48: It's a point well taken.
00:04:50: You know, Marcel Velika even offered a humorous, yet kind of insightful take.
00:04:54: He suggested that for some people, switching to Linux can offer peace of mind, just because there are fewer system disruptions and patching headaches.
00:05:00: Sometimes, he joked, it's the real antivirus.
00:05:04: It's a reminder that sometimes the simplest solutions might be overlooked.
00:05:08: Okay, moving from individual devices to the bigger enterprise structures, compliance is still a huge driver.
00:05:14: Andrei Prozrov published a really practical, thirty-two-step roadmap for implementing an information security management system, an ISMS, and actually achieving ISO twenty-seven thousand zero one certification.
00:05:26: That's a, well, that's a significant undertaking for any organization.
00:05:29: It certainly is.
00:05:30: And what's fascinating here is what Clayton Inge observed, he called it the reality of cybersecurity certification.
00:05:36: Apparently many SMEs, small and medium enterprises are opting for more accessible options, things like the NIS-II quality mark instead of ISO-II, why?
00:05:46: Mainly because of the cost and the extensive documentation needed for ISO.
00:05:49: But the positive trend here is that organizations are seeking certification, even if it's a, let's say, lighter variant, that collective raises the security baseline, which is
00:05:57: good.
00:05:57: And it's not just about voluntary certifications anymore, is it?
00:06:01: Mandatory compliance seems to be expanding.
00:06:05: Christopher Ocpala updated us that CMMC implementation is now officially in effect.
00:06:09: This makes cybersecurity compliance mandatory for defense contractors.
00:06:13: And that significantly reinforces the demand for GRC and RMF professionals, especially in that sector.
00:06:19: Yeah, connecting this to the bigger picture, you know, leadership and culture, Rob McGowan delivered a strong message.
00:06:25: He said CEOs must view compliance as a long-term strategy, not some kind of fad or a gamble.
00:06:31: The tone from the taut, he argued, really dictates the culture of accountability across the entire organization.
00:06:37: Without that executive buy-in, true security is pretty elusive.
00:06:41: That makes perfect sense.
00:06:43: Antonio Grasso reinforced this, too.
00:06:45: He highlighted that cybersecurity is truly a shared duty.
00:06:47: It's a delicate balance between technology, policies, and crucially human behavior.
00:06:52: He pointed out that phishing still accounts for over thirty percent of data breaches.
00:06:55: That really just underscores how critical employee awareness and vigilance truly are.
00:06:59: It's not just an IT problem, you know.
00:07:00: And Sarah Mock took this even further.
00:07:02: She emphasized that cybersecurity is a team sport that actually extends to customers.
00:07:08: She argued for human connection and shared responsibility.
00:07:11: She stated that what customers need most is human connection partners who listen deeply.
00:07:17: This kind of shifts security from being just a technical issue to more of a relationship issue.
00:07:22: Interesting perspective.
00:07:24: Yet, despite all these advancements and, you know, clear strategies, David Sparks' discussion on the CIO series podcast showed that security professionals still find prevention challenging, and it's often disruptive to business operations.
00:07:35: It really is a constant balancing act, isn't it, between security and actually enabling the business to function.
00:07:40: It
00:07:40: absolutely is.
00:07:41: And maybe to conclude this section, Larry O'Brien reported that the acquisition of Nozomi Networks by Mitsubishi Electric for a staggering one billion dollars signifies continued significant investment and strategic importance in OT cybersecurity.
00:07:56: I mean, that acquisition really speaks volumes about where major players see the future of critical infrastructure protection.
00:08:02: Okay, now let's transition to a theme that is, well, both an incredible accelerator and a significant new challenge for security.
00:08:10: AI and data-driven transformation.
00:08:13: Right, and here's where it gets really interesting.
00:08:15: Because as AI agents gain more autonomy, their tax services are just growing rapidly.
00:08:19: KJ Lee and pulling insights from what sounded like Black Hat planing, warned of critical risks like prompt injection and client-side threats.
00:08:27: His advice for mitigation is pretty stark.
00:08:29: Robust design, input validation, and minimizing autonomy.
00:08:33: He basically advised treat prompt injection like a root exploit.
00:08:36: Wow.
00:08:36: Yeah, and this connects directly to a really modern threat that Jane Franklin discussed.
00:08:41: AI-driven deep fakes and identity manipulation.
00:08:44: These aren't just theoretical risks anymore.
00:08:46: They're here actively eroding trust.
00:08:48: They demand new safeguards because, well... Traditional identity verification methods are simply no longer sufficient.
00:08:55: The implications for trust and verification are profound.
00:09:00: The implications for leadership are also crystal clear.
00:09:02: Eckhart M highlighted Isaac's new AISM certificate.
00:09:05: that's advanced in AI security management.
00:09:08: It signals that AI is now a core governance challenge for CISOs, you know, bridging innovation and compliance.
00:09:13: And William McBurl stated it very firmly, CISOs must take the lead in governing AI to ensure cybersecurity.
00:09:19: It's not some optional add-on, it's really become a CISO imperative.
00:09:22: And the pace of this challenge is just unprecedented.
00:09:25: Chris Bohm observed that the CISO role is now operating at machine speed.
00:09:28: I mean, attacks unfold in seconds, adversaries are already wielding AI, it's posing a significant test for leadership cybersecurity.
00:09:35: It's a constant high stakes race.
00:09:38: But AI isn't just a threat, right?
00:09:40: It's also a powerful tool for defense and productivity.
00:09:43: Wheelen-Hollfelders' report from Google Cloud illustrated how AI-powered tools are actually revolutionizing data science.
00:09:49: They streamline workflows in these unified development environments, or UDEs, reducing context switching and freeing up data scientists for more strategic vision and creativity.
00:09:59: That's a massive efficiency game right across the board.
00:10:02: Yeah, and Joshua Wells offered very practical advice on this.
00:10:05: He basically said, embrace the arrival of AI and use it to enhance security productivity.
00:10:11: But crucially, while always, always upholding Zero Trust principles, it's about leveraging AI without compromising those fundamental security tenets.
00:10:19: That makes sense.
00:10:20: Reinforcing that strategic view, J. Chaudhary, the CEO of Zscaler, shared insights that adversaries are already using agentic AI.
00:10:28: They're using it to expand attack surfaces and automate exploits.
00:10:31: This just underscores the urgent need for robust AI threat prevention strategies and secure agent-to-agent communication platforms.
00:10:39: It's really an arms race where both sides are using AI now.
00:10:42: And from an industry perspective, Francis Odom observed that the volume of AI security M&A is rapidly increasing.
00:10:48: This is actually creating new challenges for cybersecurity companies trying to differentiate themselves in what's becoming a very crowded market.
00:10:56: The market is consolidating and evolving fast, making strategic positioning even more critical.
00:11:02: Okay, shifting back to compliance for a moment.
00:11:04: Martin's wick shared what he called an expensive case study in compliance failure.
00:11:08: Apparently, ING Bank Schulski was fined a hefty four point three million euros.
00:11:13: Why?
00:11:14: For non-compliant ID scanning.
00:11:16: This really stresses the critical need for a legitimate purpose and proper risk assessment before you even think about collecting sensitive data.
00:11:23: It's a powerful reminder of the financial penalties for regulatory missteps.
00:11:26: This brings up a crucial human element that David Schloss highlighted.
00:11:30: He argued there isn't actually a cybersecurity skills shortage per se, but rather a knowledge gap from non-technical hiring managers.
00:11:39: And this, he argues, leads to unfilled roles and significantly higher breach of costs for organizations.
00:11:45: Investing in good people, he noted, is far more cost-effective than suffering breaches.
00:11:49: It's quite a perspective that challenges the conventional narrative.
00:11:53: That is a powerful reframing.
00:11:55: So what does all this mean for the future of resilience then?
00:11:58: Yashir users key takeaway from the latest IBM report seems clear.
00:12:02: The talent gap is the top barrier to resilience, while AI is the biggest enabler of progress.
00:12:08: So
00:12:08: leaders really must invest in skills, not just tools, if they want to achieve cyber resilience by twenty twenty eight.
00:12:14: It really comes back to being a human-centered challenge.
00:12:17: Exactly.
00:12:18: And Christopher Nett's detailed breakdown of Microsoft's Zero Trust architecture showed how it integrates strong identity security, access policies, endpoint protection, data security, app security, infrastructure security, and its all-leveraging AI capabilities like Microsoft Security Co-Pilot for modern security operations.
00:12:38: It's a vision of integrated AI-powered defense.
00:12:41: And we saw a real-world application of this.
00:12:43: Katharina Christ reported on two sued, pioneering zero trust with Microsoft.
00:12:47: They're leveraging security co-pilot, defender and sentinel.
00:12:52: and achieving a remarkable, sixty-seventy percent faster incident analysis and holistic threat visibility.
00:12:58: That's a huge operational gain.
00:12:59: It really demonstrates AI's immediate impact on security operations.
00:13:02: Yeah, and what's fascinating here is Chris H. shared that Andreessen Horowitz, the VC firm, believes AI can actually break the cyber kill chain.
00:13:10: They're advocating for AI-native security as the platform shift of today.
00:13:14: That's a pretty bold vision for completely re-architecting security for the
00:13:17: AI era.
00:13:18: Okay, moving on now to our next theme.
00:13:20: Cloud and infrastructure innovation.
00:13:21: Let's explore how advanced computing is truly pushing the boundaries here.
00:13:24: Well, we saw a really significant breakthrough reported by Michael Brad.
00:13:29: It was a collaborative effort between Institute Contique at University of Schubertruck, NVIDIA, and Amazon Web Services, AWS.
00:13:37: They achieved a staggering four thousand X acceleration in quantum system simulations.
00:13:42: And they did this using NVIDIA GPUs running on AWS.
00:13:45: I mean, this isn't just a big number.
00:13:48: It massively expands research capabilities, potentially accelerating the entire field of quantum computing.
00:13:53: Wow, four
00:13:53: thousand X acceleration in quantum simulations.
00:13:56: That's incredible.
00:13:58: Sandeep Shetty captured this excitement perfectly, didn't he?
00:14:00: He talked about the powerful synergy and how the future of computing is truly being built one quibbit at a time.
00:14:06: It really signifies we're moving closer to practical applications.
00:14:09: It does, but this raises an important question, though, about the security implications of quantum computing itself.
00:14:14: Dr.
00:14:14: Paul Antonio Pereira raised a pretty provocative thought.
00:14:17: Will quantum computing crack the two-fifty-six crypto digital wallet security?
00:14:22: Maybe it already has.
00:14:23: It definitely highlights the urgent need to address potential vulnerabilities.
00:14:27: Oof, that's a chilling thought indeed.
00:14:30: But Madhukeshwarpad provided perhaps a more balanced view.
00:14:33: He stated that quantum computing presents both an opportunity or threat to cybersecurity.
00:14:39: So while it definitely challenges current cryptography, it also offers solutions, like post-quantum cryptography.
00:14:46: Organizations really need to start developing quantum safe strategies now to prepare for both sides of that
00:14:51: coin.
00:14:52: And speaking of infrastructure challenges, Joaquin Rodriguez and Abon discussed something maybe less glamorous but critical, the shortage of skilled personnel in the data center sector.
00:15:02: This leads to operational and strategic risks, highlighting the urgent need for mitigation through training, reskilling, and maybe even integrating AI as a partial support mechanism.
00:15:13: It's a reminder that even the most cutting-edge infrastructure relies heavily on human expertise.
00:15:17: That's a really important point.
00:15:19: Okay, let's shift gears now to how strategic partnerships key industry events are shaping the broader ICT landscape.
00:15:24: It's clear from these posts that collaboration and knowledge sharing are paramount right now.
00:15:29: Absolutely.
00:15:30: One notable collaboration reported by Dancroft was between Hyperion Partners and Mission Critical IoT.
00:15:36: They announced a strategic partnership aimed at strengthening enterprise connectivity, specifically across IoT and fixed wireless markets.
00:15:43: They're emphasizing end-to-end service delivery and two hundred and forty seven support as their key differentiators.
00:15:50: It shows how specialized partnerships are becoming crucial for delivering comprehensive solutions.
00:15:54: We also saw a series of key events emphasizing the growing regulatory landscape.
00:15:58: and the need for practical compliance.
00:16:02: Silku Kuhnline, for instance, announced an exclusive Dora Summit for decision makers in Munich, the focus, how regulation translates into real security through practical examples.
00:16:11: And complimenting that Nina Wagner announced a webinar specifically on NIS-II guidelines and pen testing covering risk management and maturity levels.
00:16:19: This just reinforces that industry-wide push to understand and implement these new compliance standards.
00:16:24: Global collaboration seems to be a strong theme, too.
00:16:27: Rolf Gupferth updated us about Deutsche Telekom's IT&T security leadership team.
00:16:32: They met with industry leaders like Microsoft and F-Five out in Bellevue, Seattle to discuss key cybersecurity topics.
00:16:39: This demonstrates that solving these complex challenges really requires broad international dialogue.
00:16:44: Right.
00:16:45: And Marco Samola also extended an invitation to Accenture's OT Security Summit down in Houston.
00:16:51: It featured top speakers discussing challenges in industrial cybersecurity, including, apparently, the world's largest smart water metering IoT project.
00:17:00: This highlights the increasing focus on securing operational technology and critical infrastructure.
00:17:05: Dina Ali Alota shared some positive feedback from Fortinet Security Day, it sounds like it showcased cutting-edge insights on AI-powered security, unified SAAS-E, and also the synergy between Google Cloud and Fortinet.
00:17:17: These events are becoming crucial showcases for the latest integrated security solutions, it seems.
00:17:22: And
00:17:22: it's not just about the technology itself, but also the people who will drive it.
00:17:27: Steve Suarez attended ID Quantum Week, where discussions focused on bridging the human gap in quantum readiness.
00:17:33: They were emphasizing workforce readiness and the human factors in quantum adoption.
00:17:38: This just highlights that technological progress is only as good as our ability to implement and manage it effectively.
00:17:44: Absolutely
00:17:44: spot on.
00:17:45: Basu Jackel also shared her excitement about participating in events over in Japan, including the security user and the Microsoft AI Tour.
00:17:54: Promoting innovation, collaboration, and responsible AI development globally seems really key right now.
00:18:01: And Elliott Franklin's completion of ISECA's beta program for that AISM certification we mentioned earlier, if further demonstrates the active shaping of future AI security governance, that's vital as AI adoption accelerates getting ahead of the curve in terms of skills and standards.
00:18:15: Joy Chick gave us some insights into Microsoft's real-time cybersecurity strategy.
00:18:20: She emphasized speed, preparation and cross-team coordination to anticipate and respond to threats effectively.
00:18:27: It really speaks to the dynamic nature of threats and the need for agile, coordinated responses.
00:18:32: And back in Germany, Hartmut Merch reported from the Federal Commission on Cybersecurity Meeting.
00:18:37: Discussions there focused on building a resilient infrastructure with something called the Deutschlandstek, pioneering AI initiatives, and of course, the upcoming implementation of NIS-II.
00:18:48: He also noted, interestingly, the struggle for AI gig... factories in Europe, especially with significant investments coming from EWS.
00:18:55: It highlights the competitive landscape for that critical AI infrastructure.
00:18:59: Federico Gerardo Cardona's discussion on how IoT and smart metering are revolutionizing resource management was also interesting, enhancing efficiency and sustainability for businesses, cities, individuals.
00:19:10: It really highlighted how innovation in this space isn't just an option anymore, but a necessity for future resource optimization.
00:19:17: And finally, David Young shared a conversation he had with Jay Choudhury, the CEO of Zscaler.
00:19:23: It touched on his journey from the Himalayan foothills to Silicon Valley, reinforcing that zero-trust playbook for the future.
00:19:31: It's just a powerful reminder of how visionary leadership can drive these huge technological shifts.
00:19:36: Okay, fascinating stuff.
00:19:38: Let's pivot now just quickly to some forward-looking signals, moving beyond the immediate products and partnerships, and looking maybe a bit further down the road at what's on the horizon.
00:19:46: Yeah,
00:19:47: this is where several posts reflected on the interplay of CPUs, GPUs, and QPUs, thinking about them for hybrid workflows.
00:19:54: It points toward a longer-term vision of truly orchestrated computing.
00:19:58: It's about seeing these powerful processors not just in isolation, but really as complementary forces working together.
00:20:04: That's such an exciting concept, isn't it?
00:20:06: Daniel Voles elaborated on this.
00:20:08: He sees the future not as some kind of competition between these computing paradigms, but as an orchestration of CPUs, GPUs, and QPUs, with each bringing their own unique strengths.
00:20:19: He believes the real magic happens when we learn to build these hybrid workflows that can solve problems at a level classical systems alone just cannot reach.
00:20:27: It's about combining worlds to unlock entirely new capabilities.
00:20:30: Exactly.
00:20:31: These perspectives really underline how the next decade of ICT might be characterized less by isolated technology battles, you know, this versus that, and more by integrating and combining these different worlds.
00:20:44: The future likely belongs to those who can master that synergy.
00:20:47: If you enjoy this deep dive, new episodes drop every two weeks.
00:20:50: Also, check out our other editions on cloud, defense tech, health tech, digital products and services, artificial intelligence and sustainability in green ICT.
00:20:58: Thank you for joining us on this exploration of the latest ICT and tech insights from calendar weeks thirty five and thirty six.
00:21:05: So as we look to the future, maybe consider this.
00:21:08: What isolated winners in technology are you currently betting on?
00:21:11: And well, what untapped potential might lie in orchestrating them together?
00:21:15: Thank you for listening and be sure to subscribe to the deep dive for more curated insights.
New comment