More...
Symptoms.
What does forensic systems and root cause analysis reveal?
Cyber math and methods are structurally flawed due to errors that are designed into "standard" methods. It is like a structural flaw in an apartment building that was caused by a design error. Fancy decor cannot fix the structural danger.
Structural flaws flow from faulty assumptions.
For example, is the assumption true that cybersecurity lives in a linear stable system like bookkeeping? NO. Cybersecurity lives in a complex dynamic, often chaotic and highly adversarial system.
False assumptions lead to errors in math and method, data and measurement, and selection and use of point products -- leaving "expense in depth."
Method errors hurt cyber pros -- causing stress and work-life damage.
Cyber is a "wicked problem" (as described by Rittel and Webber).
More tech point products cannot solve the real problem in the real system.
Cyber pros need something more, especially...
By
Bringing proven innovation action to cyber
Better work-life balance and safer world
Putting people in the center of cybersecurity
Contact us for a consult to learn more
Investigations are at least uncomfortable, if not ugly. As are:
(Learn more about where cyber forensics led us in "The Story.")
Start by exploring 4 questions:
Don't wait for security incidents and forensics:
Design thinking is thinking like a designer -- innovative problem-solving
Observing how people behave to discover what people might need or desire from a new product.
Design in art, architecture, clothing, food and more flourished for thousands of years. Design became formalized into schools of thought.
Design thinking formalized thousands of years of design in art, architecture, clothing and food. Then into psychology, sociology, anthropology, biology and more.
In business, design thinking has been applied in diverse products including autos, home appliances, consumer electronics, manufacturing and processed foods.
Design thinking informs the user experience in human-computer interface by blending storytelling with ease of using computers.
Industrial-strength design involves four broad applications: style, usability, serviceability, and manufacturability.
How can we apply industrial-strength design thinking to cybersecurity? Read on...
If design thinking is already used in your company, then you’ve already witnessed the success in breakthroughs in new products, operations, marketing, customer service and more. As a consumer, you've benefited from design thinking.
Design thinking starts with challenging established norms (called paradigms, frames or perspectives in design-speak). It asks…
Challenging and "breaking the mold"
Design thinking realizes that:
Asking these questions has led to amazing new products you've experienced in appearance plus ease of use, manufacture and service. From easier websites to delicious food to stylish clothing to engaging car dashboards, it’s all about design.
Design thinking is all around you.
Curious about design thinking in cybersecurity? Read on…
Design thinking is proven and practical across disciplines. In cybersecurity, consider...
For you as an individual, it gets you off the gerbil wheel -- for starters :).
For your organization, this:
Because methods that you are forced to use fail to realize:
Dozens, maybe hundreds of design tools are now available to the designer to revisit assumptions and discover.
But, not all are industrial-strength.
What design tools are needed?
For the answer, read the next Q&A…
Industrial-strength design thinking is a rich set of tools catalyzing spectacular successes. Yet, there is more to fashion design than a color pallet.
For success, needed are…
Are you feeling empowered by this insight?
At least, are you curious to learn more?
Are you an active learner by nature?
To discover more about how these insights can make your job (and life) easier, better protect your organization and make our world safer from adversaries, you are welcome to explore the "Learn More" page and join in this initiative.
Sign up on our Contact Page to receive…
Scroll down for a bonus...
If you've read this far, you'd probably like to know that:
Think.Design.Cyber is different because it draws on the entirety of proven and practical industrial-strength design thinking:
Think.Design.Cyber is in sharp contrast to limited uses of design in tech and cybersecurity:
Think.Design.Cyber goes beyond design to draw on insights from critical thinking, systems thinking, New Product Management and organizational change. This is to achieve:
Contact us for a consult to learn more
© Copyright 2010-2023. All rights reserved. ValueBridgeAdvisors, LLC