AXIS Global Cyber & Technology

AXIS 35 Views

Foreword

The need to understand the world we inhabit is not a new issue, but rather the eternal problem. However, what has changed is the pace at which our understanding needs to develop because the pace of change has accelerated and shows no signs of slowing up.

This constant change leaves us in a volatile, uncertain, complex and ambiguous world – often outlined under the acronym VUCA. This is obviously a challenge to those striving for clarity and understanding, a VUCA world cannot be understood with just one simple model, it cannot be evaluated with just one measurement and it cannot be communicated with one simple narrative.

This is the problem we face when trying to evaluate, measure, assess, communicate and respond to the cyber risks we face. The cyber world is constantly changing, seemingly locked in a spiral of increasing reliance on technology that appears ever more vulnerable to outside influences.

We can never claim to fully know the cyber world, but we do believe that it can be better understood. Understanding needs to come from a diverse range of thinking and draw on ideas from wide schools of thought; in a complex world, diversity of thought trumps single models every time. The cyber environment is not a linear one and thus can be much better understood when different parts of the picture come together to form one wider illustration. We need to combine knowledge from several fields and use it to improve our understanding – combinative thinking.

It is such combinative thinking that our inspirational colleague John Donald has brought together here. Taking his own inspiration from the master print maker Katsushika Hokusai, who himself tried to explain the changing nature of his own world by producing 36 different views of the same object, we have tried to bring together the 35 views that we see as we traverse around the cyber risk environment. This journey is never over but I hope it gives food for thought and helps explain away at least some of the volatility, uncertainty, complexity and ambiguity.

Content

VIEW 1

Hokusai's great wave

Read more ➔

VIEW 2

The four quadrants of risk

Read more ➔

VIEW 3

The four quadrants of security

Read more ➔

VIEW 4

Cyber risk in context

Read more ➔

VIEW 5

Systemic risk: The catataxic shift

Read more ➔

VIEW 6

Systemic risk: Industry connectivity

Read more ➔

VIEW 7

Systemic risk: Complex adaptive systems

Read more ➔

VIEW 8

Medieval castle model

Read more ➔

VIEW 9

Where is the wall?

Read more ➔

VIEW 10

Why the squid lost its shell

Read more ➔

VIEW 11

The immune system model

Read more ➔

VIEW 12

History of cyber attacks

Read more ➔

VIEW 13

The evolutionary arms race

Read more ➔

VIEW 14

Cyber vulnerability pyramid

Read more ➔

VIEW 15

Hacking return on investment

Read more ➔

VIEW 16

PII prices on the dark web

Read more ➔

VIEW 17

Malware infection rates

Read more ➔

VIEW 18

Threat actors: Nation states

Read more ➔

VIEW 19

Threat actors: Rogue employees

Read more ➔

VIEW 20

Threat actors: Botnets

Read more ➔

VIEW 21

Why me?

Read more ➔

VIEW 22

Breach incident chain

Read more ➔

VIEW 23

The incident response plan

Read more ➔

VIEW 24

Costs of a cyber incident

Read more ➔

VIEW 25

Cyber insurance: Product or peril

Read more ➔

VIEW 26

Where are the peacock's feathers?

Read more ➔

VIEW 27

The units of cyber risk

Read more ➔

VIEW 28

Assets: The Parkerian Hexad

Read more ➔

VIEW 29

Assets: Industry variation

Read more ➔

VIEW 30

Parkerian Hexad: Insurance mapping

Read more ➔

VIEW 31

Capping risk

Read more ➔

VIEW 32

Cyber incident under-reporting

Read more ➔

VIEW 33

Cost of capital factors

Read more ➔

VIEW 34

Cyber supply chain cove

Read more ➔

VIEW 35

Return on security investment (RoSI)

Read more ➔

Sources

Sources

Read more ➔

What's next: VIEW 1 Hokusai's great wave

Find out more

Cookies | Terms | Privacy