[reuters query] sony lessons
Dear Subscriber, hi. This is another email to my limited list of industry connectors. I'm looking for sources and insight on the Sony hack and what lessons the corporate world might have learned in the months since the event. If you think you might have a fit, I'd love to hear.
I'm hoping to explore some or all of the following, and looking for insights, examples, anecdotes and data, hopefully beyond the obvious and what has already been said:
- how damaging, really, was the hack for Sony? How big a deal was it generally?
- would it have been as damaging, or more damaging for other companies?
- what specific lessons have companies learned from this, if anything? Not to store old data? To take out better insurance?
- is there a sense that this is a watershed, as some have presented it? Or does everyone still think it won't happen to them?
- is there anything to say about the role of the IT security/AV companies in all this? Could they have done a better job?
- how much must governments themselves, in particular the US, accept responsibility for this? How much has the NSA's own actions -- theft of digital certificates, bugging Chinese and Korean networks, contributed to this escalation in hacking?
- are there counterintuitive, novel or otherwise surprising solutions to this problem of protecting networks and the data in them from these kinds of attacks? Are companies beginning to offer this? For example, shifting all but the most current data onto offline storage, or encrypting data in novel ways?
I'm hoping to explore some or all of the following, and looking for insights, examples, anecdotes and data, hopefully beyond the obvious and what has already been said:
- how damaging, really, was the hack for Sony? How big a deal was it generally?
- would it have been as damaging, or more damaging for other companies?
- what specific lessons have companies learned from this, if anything? Not to store old data? To take out better insurance?
- is there a sense that this is a watershed, as some have presented it? Or does everyone still think it won't happen to them?
- is there anything to say about the role of the IT security/AV companies in all this? Could they have done a better job?
- how much must governments themselves, in particular the US, accept responsibility for this? How much has the NSA's own actions -- theft of digital certificates, bugging Chinese and Korean networks, contributed to this escalation in hacking?
- are there counterintuitive, novel or otherwise surprising solutions to this problem of protecting networks and the data in them from these kinds of attacks? Are companies beginning to offer this? For example, shifting all but the most current data onto offline storage, or encrypting data in novel ways?
- I'm also interested in data -- size and growth of the cybersecurity industry, size of the problem, number of hacks, money lost etc.
I'd be grateful for short notes on what your colleagues/clients might be able to offer, for possible follow up phone interviews. Feel free to just focus on one or two of the above, or choose your own, but I'd like to stress I'm looking for more than run-of-the-mill comments. This was a major incident and now the dust has settled perhaps some more profound, or surprising lessons have been learned, or trends kicked in.
Many thanks!
Jeremy
______________
Jeremy Wagstaff
Chief Technology Correspondent, Asia
Chief Technology Correspondent, Asia
Singapore
Thomson Reuters
Mobile: 65 93270434
jeremy.wagstaff@thomsonreuters.com
jeremy.wagstaff@gmail.com OR loosewire@fastmail.fm
Thomson Reuters
Mobile: 65 93270434
jeremy.wagstaff@thomsonreuters.com
jeremy.wagstaff@gmail.com OR loosewire@fastmail.fm
Blog/guidance for PR: http://www.loosewireblog.com
|
Don't miss what's next. Subscribe to My Awesome Newsletter: