Skip to content
info@johnstek.com Corporate HQ: Coral Gables, FL, USA +1.786.375.9020 Latin American HQ: Asuncion, Paraguay +595.213.277.395
Search:
Search
JohnsTek
Strategic Technology Engineering
JohnsTekJohnsTek
  • About
  • Products & Services
  • Cyber Risk
    • Managed Security Services Provider (MSSP)
    • Cyber Risk Management Solution
  • Markets
    • Commercial
    • Government
  • Resource Center
  • Contact
  • About
  • Products & Services
  • Cyber Risk
    • Managed Security Services Provider (MSSP)
    • Cyber Risk Management Solution
  • Markets
    • Commercial
    • Government
  • Resource Center
  • Contact

Design Thinking and Cyber Security, using Operational Design and Design Thinking Concepts to Develop a CyberSecurity Program

You are here:
  1. Home
  2. Blog
  3. Design Thinking and Cyber Security,…
Nov212016
BlogCyberSecurityCyberSecurity

While I was in the military, dealing with complex international crises was the order of the day.  We used a planning technique developed by the Israeli Defense Force and championed by the U.S. Special Operations Command, Operational Design.  The concept of Operational Design uses the skills and techniques of design thinking to plan complex operations. These operations often require novel approaches to so-called “wicked problems”.  Using problem framing techniques and tools, our planners often came up with plans and operations that would not have been possible using traditional methods.  The same tools used in Operational Design can be a powerful method for organizations to develop a comprehensive cyber security strategy to deal with today’s complex cyber landscape.

Cyber Security today is a total business problem, not just an issue for the IT department.  Today’s solutions need to touch organizational policy, corporate culture and awareness, business systems, among other areas.  It is a solution that requires a multi-dimensional view.  Almost every aspect of a 21st century organization relies on or touches cyber space and is therefore potentially exposed to cyber risk.  Understanding the complex cyber situation in an organization and the impacts each business center has on the overall company is no small undertaking.  This complexity demands a method to properly frame the problem and come up with comprehensive approaches to organizational cyber security strategy.

Operational Design provides an opportunity to spot critical intersections and develop an organizational concept that can be flexible and adapt to the cyber landscape. Using design methods, a more balance approach can be identified and implemented, one that takes into account all aspects of business.

By employing Operational Design, companies can develop cyber security approaches that reduce situational complexity, thereby increasing the company’s resilience.  Through this design, businesses can frame the problem correctly, ID critical infrastructure and processes, analyze threats and help define the interdependencies and relationships in organizations. These insights and levels understanding allow companies to make informed decisions in day-to-day operations as well as during cyber security incidents. Making the right decisions at the right time helps to reduce the impact of the incident and keeps organizations up and running.

While most individual businesses may not deal within crises on an international level, it is the untreated cyber security vulnerabilities within any business that can lead to a crisis that will affect the entire organization.  Operational Design allows companies to be best prepared to operate in the complex cyber landscape while preserving organizational structure and remain adaptive to future cyber threats.

Keep up to date and follow us on twitter  @Johnstek and @JTi_EFerraresso

Categories: Blog, CyberSecurityBy Scott JohnstonNovember 21, 2016
Tags: CybersecurityCybersecurity DesignCybersecurity StrategyOperational Design

Author: Scott Johnston

https://johnstek.com

Post navigation

PreviousPrevious post:JohnsTek uses Drone Technology to Map the Border in South America for Design of Infrastructure Improvements for National Security InitiativesNextNext post:Not All Unmanned Aerial Vehicles (UAVs) Are Created Equal

Related posts

CyberShield
Stay Secure During the Holiday Season!
December 13, 2020
Cafe Photo
Data Protection In Cafes And Restaurants
February 10, 2019
JohnsTek Capability Statement 2019
February 9, 2019
EOC_ops
Five Things Local Governments Can Do Now To Prepare For Disaster Response
January 11, 2019
Cyber_Pentagon_Transparent
Five Things You Can Do Now To Implement Or Improve Cybersecurity
January 8, 2019
IBM_JohnsTek
JohnsTek Partners with IBM Security!
November 19, 2018
Shortcuts
  • About Us
  • Offerings
  • Products & Services
  • Commercial
  • Government
  • Privacy
  • Terms
JohnsTek News
  • CyberShield
    Stay Secure During the Holiday Season!
    December 13, 2020
  • Cafe Photo
    Data Protection In Cafes And Restaurants
    February 10, 2019
  • JohnsTek Capability Statement 2019
    February 9, 2019
Security Alerts
  • Alert Dispatch 23JUN17 ~ By JohnsTek
    June 23, 2017
  • Alert Dispatch 5JUN17 ~ By JohnsTek
    June 5, 2017
  • Alert Dispatch 18MAY17 ~ By JohnsTek
    May 18, 2017
Intel Brief
  • The Intel Brief 02OCT17 ~ By JohnsTek
    September 28, 2017
  • The Intel Brief 16AUG17 ~ By JohnsTek
    August 16, 2017
  • The Intel Brief 16JUN17 ~ By JohnsTek
    June 16, 2017
Press Releases
  • JohnsTek Capability Statement 2019
    February 9, 2019
  • IBM_JohnsTek
    JohnsTek Partners with IBM Security!
    November 19, 2018
  • Veterans Day
    JOHNSTEK WISHES YOU A HAPPY VETERAN’S DAY!
    November 10, 2017
Copyright © 2022 JohnsTek | All Rights Reserved.
  • About Us
  • Offerings
  • Products & Services
  • Commercial
  • Government
  • Privacy
  • Terms
Footer