recentpopularlog in

jerryking : security_consciousness   11

Bracken Bower Prize 2019: excerpts from finalists’ proposals | Financial Times
YESTERDAYPrint this page
Edited excerpts from the book proposals of the three finalists for the 2019 Bracken Bower Prize, backed by the Financial Times and McKinsey.
+++++++++++++++++++++++++++++++++++++++++++
(1)The Sinolarity
China’s quest to wire the world and win the future
By Jonathan Hillman

(2) Hacking Social Impact
How to change systems to tackle urgent problems
By Paulo Savaget

(3) InfoSec
Inside the world’s most secure organisations
By Ernesto Zaldivar
books  book_reviews  China  cyberattacks  cyberintrusions  cyber-security  FT  hacks  hackers  Huawei  McKinsey  networks  passwords  phishing  prizes  security_consciousness  teams 
november 2019 by jerryking
Supercharging retail sales through geospatial analytics
March 2019 | | McKinsey | By Rob Hearne, Alana Podreciks, Nathan Uhlenbrock, and Kelly Ungerman.

A retailer can now use geospatial analytics to understand the interactions between its online and offline channels. With these insights, it can create a higher-performing retail network.
====================================
Is our outlet store in San Francisco hurting foot traffic and sales at our full-price store two miles away? Or is it doing the opposite—attracting new customers and making them more likely to visit both stores? How are our five Manhattan stores affecting our e-commerce revenue? Are they making consumers more likely to shop on our website or to search for our products on Amazon? If we open a new mall store in the Dallas metro area, what impact will it have on sales at our existing stores, at our department-store partners, and online?

The answers to these kinds of questions are increasingly crucial to a retailer’s success, as more and more consumers become omnichannel shoppers......most retailers don’t give adequate thought to the cross-channel impact of their stores. They rely on gut feel or on high-level analysis of aggregated sales data to gauge how their offline and online channels interact.....there’s a way for retailers (and other omnichannel businesses) to quantify cross-channel effects, thus taking the guesswork out of network optimization. Through advanced geospatial analytics and machine learning, a retailer can now generate a detailed quantitative picture of how each of its customer touchpoints—including owned stores and websites, wholesale doors, and partner e-commerce sites—affects sales at all its other touchpoints within a micromarket......US retail sales are on an upward trajectory.....despite the growth of e-commerce, the vast majority of these purchases still happened in brick-and-mortar stores. .....So why have US retailers closed thousands of stores in the past year, with thousands more closures to come?....Because the consumer journey is changing!!......Consumers are transacting in different channels....engaging across multiple channels, often simultaneously rather than sequentially. It’s critical for omnichannel retailers to have a detailed understanding of the interplay between online and offline touchpoints, and between owned and partner networks.

Quantifying cross-channel effects

the starting point is data......from a wide range of internal and external sources. Inputs into a geospatial model would ideally include not just transaction and customer data but also store-specific details such as store size and product mix; site-specific information such as foot traffic and retail intensity; environmental data, including local-area demographics; and anonymized mobile-phone location data.......A simulation model can then quantify the sales effect of each of the retailer’s customer touchpoints on its other channels within a local market. The model must be sophisticated enough to simulate the upward or downward revenue impact of adding or removing a particular touchpoint.

Geospatial analysis reveals that the consistency and magnitude of cross-channel effects vary significantly across channel types and markets.
analytics  bricks-and-mortar  cross-channel  customer_journey  customer_touchpoints  data  e-commerce  foot_traffic  geospatial  gut_feelings  location_based_services  McKinsey  moments_of_truth  omnichannel  privacy  retailers  store_closings  security_consciousness  site_selection 
march 2019 by jerryking
Disney Is Spending More on Theme Parks Than It Did on Pixar, Marvel and Lucasfilm Combined - The New York Times
By BROOKS BARNES NOV. 16, 2018

Increased investment means increased risk
The theme park business will always be sensitive to swings in the economy, said Jessica Reif, an analyst at Bank of America Merrill Lynch. Disney has greatly increased security in recent years, deploying undercover guards and installing metal detectors, but these teeming resorts could become relative ghost towns if a violent incident took place.

Even so, Ms. Reif said she was pleased that Disney was spending so heavily on its parks. “It’s the highest return on investment that Disney has,” she said.
theme_parks  Disney  redesign  entertainment  makeovers  serious_incidents  security_consciousness 
november 2018 by jerryking
Law firms will pay price for failure to hold off hackers | Evernote Web
31 December/1 January 2017 | Financial Times | Brooke Masters.

"This case of cyber meets securities fraud should serve as a wake-up call for law firms around the world: You are and will be targets of cyber hacking, because you have information available to would-be criminals," Bharara said in a statement....Other professional services firms should take note. This is not the first time the industry has been hit by hackers who specialise in what is becoming known as "outsider trading"....Accounting firms that provide tax advice on mergers, boutique advisory forms, and consultants who weigh in on synergies and downsizing plans are almost certainly on the criminals' hit list....Professional service firms will not be so lucky. Banks and companies pay extremely high prices for outside advice. They expect professionalism and confidentiality in return. Getting hacked by a bunch of Chinese traders is hardly a strong recommendation of either.
Big_Law  Chinese  confidentiality  cyber_security  cyberattacks  hackers  hacking  law_firms  M&A  malware  mergers_&_acquisitions  Preet_Bharara  professional_service_firms  SEC  security_consciousness  securities_fraud  traders 
january 2017 by jerryking
A Burglar’s Guide to the City
Ways of thinking/looking at the built environment. Consider "security architecture".

Studying architecture the way a burglar would, Geoff Manaugh takes readers through walls, down elevator shafts, into panic rooms, and out across the rooftops of an unsuspecting city.

At the core of A Burglar’s Guide to the City is an unexpected and thrilling insight: how any building transforms when seen through the eyes of someone hoping to break into it.

Encompassing nearly 2,000 years of heists and break-ins, the book draws on the expertise of reformed bank robbers, FBI Special Agents, private security consultants, the L.A.P.D. Air Support Division, and architects past and present.

Whether picking locks or climbing the walls of high-rise apartments, finding gaps in a museum’s surveillance routine or discussing home invasions in ancient Rome, A Burglar's Guide to the City ensures readers will never enter a bank again without imagining how to loot the vault or walk down the street without planning the perfect getaway.
Achilles’_heel  architecture  books  counterintuitive  dark_side  fresh_eyes  hacks  heists  mindsets  observations  pay_attention  security  security_consciousness 
april 2016 by jerryking
China will keep spying. Canada must respond with skill, not rhetoric - The Globe and Mail
DAVID MULRONEY
Contributed to The Globe and Mail
Published Thursday, Jul. 31 2014

China uses its long reach for objectives other than espionage. It feels free to confront any Canadian who shows undue interest in “sensitive” topics. Members of Parliaments, mayors, academics and community leaders have been bullied for displaying interest in the Dalai Lama, conditions in China’s restive Xinjiang region, or the plight of Falun Gong practitioners.

This is unacceptable, but here’s the hard part: we can expect more of the same. A rising but insecure China will not shrink from clandestine and downright unfriendly tactics to advance its interests.

We need to be clear-eyed in facing up to this. But we also need to recognize that our future prosperity, security and well-being depend on maintaining our own intelligently self-interested relationship with China.

So let’s start by banishing the rhetoric. China is not our best friend, any more than it is the sum of all fears. We do need to acknowledge and address the real threat China poses to our security.

Government needs to lead the way, but Canadian companies also need to step up their game. Enhanced security consciousness starts at the top. There are all too many anecdotes about security minded employees being over-ruled by senior executives who are worried about offending inquisitive Chinese visitors. That exquisite sensitivity is never reciprocated when it is the turn of the Chinese to host foreign guests....The one thing that we should avoid doing is closing doors to co-operation. Unfortunately, that’s already happening, and companies on both sides of the Pacific are paying a price. The Chinese media are portraying the U.S. technology sector as a major security threat. This makes it fair game for overly zealous regulators, and plays into the longstanding Chinese inclination to make life tougher for foreign firms. This week, investigators descended on Microsoft offices in China. Meanwhile the China operations of U.S.-based chip maker Qualcomm are also under review. Firms like Apple and Google have felt a similar chill.

Here in North America, China’s telecom giant Huawei is our bête noir, accused of being a proxy for the Chinese security apparatus. These allegations find a ready audience among a Canadian public that, as recent polling has shown, is increasingly wary of China.

It’s hard to argue against caution when it comes to China. But we’re jumping from naive acceptance to complete risk avoidance. There is an intermediate step – risk mitigation. Although its approach is not without controversy, the U.K. has opted for a partnership with Huawei that sees the Chinese company funding an inspection process in Britain designed to reduce security risks.

Complete risk avoidance, or shutting our door to China, comes at a cost that falls on consumers, on smaller companies seeking access to global markets, and on communities seeking investment....China is at the heart of changes that expose us to new levels of threat and uncertainty. We need to respond with skill, purpose and confidence. The only thing more dangerous than engaging China is not engaging it.
anecdotal  Canada  Canada-China_relations  cyberespionage  China  David_Mulroney  espionage  frenemies  Huawei  influence  influence_peddling  intimidation  inquisitiveness  purpose  risk-aversion  risk-avoidance  risk-management  risk-mitigation  security_consciousness  security_&_intelligence  self-confidence  threats  uncertainty 
july 2014 by jerryking
Anti-espionage travel tips
May 21, 2013 | The Financial Times | by Alicia Clegg.

Work trips can leave businesses particularly vulnerable to security breaches. Alicia Clegg looks at how you can reduce the risk

Experience h...
safety  travel  espionage  security_&_intelligence  industrial_espionage  security_consciousness 
may 2013 by jerryking
What to Do Before Disaster Strikes - WSJ.com
September 27, 2005 | WSJ | By GEORGE ANDERS.

What's missing is a systematic way of approaching corporate self-defense. Each potential calamity is treated in isolation....Sheffi believes that companies need to start by cataloging what could go wrong. General Motors Corp., for example, has created "vulnerability maps" that identify more than 100 hazards, ranging from wind damage to embezzlement. Such maps make it easier for managers to focus on areas of greatest risk or gravest peril. He implies that normal budgeting -- which matches the cost of doing something against the risk-adjusted cost of doing nothing -- can determine which battles against vulnerability are worth fighting....Mr. Sheffi nods approvingly at some ingenious ways to mobilize for trouble before it arrives. Federal Express Corp., he says, puts two empty planes in the air each night, just so they can swoop into any airport with a grounded plane and take over delivery services as fast as possible. Wall Street firms have recently added similar redundancy with multiple data centers, so that a New York City crisis won't imperil their record-keeping.

Intel Corp. (post-Heathrow) gets a thumbs-up, too, for finding a sly way of outwitting airport thieves. It couldn't control every aspect of security in transit -- but it could change its box design. Rather than boast about "Intel inside," the company switched to drab, unmarked packaging that gave no hint of $6 million cargoes. The name for this approach: "Security through obscurity." (jk: security consciousness)
disaster_preparedness  risk-management  book_reviews  mapping  security_&_intelligence  redundancies  vulnerabilities  rate-limiting_steps  business-continuity  thinking_tragically  obscurity  cost_of_inaction  base_rates  isolated  GM  Fedex  Intel  risk-adjusted  self-defense  Wall_Street  high-risk  budgeting  disasters  beforemath  risks  George_Anders  catastrophes  natural_calamities  systematic_approaches  security_consciousness  record-keeping  hazards 
may 2012 by jerryking

Copy this bookmark:





to read