A Bandage without the Wound..

Published on

Cutting through the XYZ bottom line. Do you know the risk you want to solve, correction, all of us want to solve. Yeah we have a clue from all the solutions we have at hand.

Aha! Now we get somewhere. The house is on fire and we had all fire protectants so why?

We built the house knowing everyone else’s issues with their house not on fire so yeah good to emulate .

Wow!! That is humanity or simply human “dumbanity” (geez mum I created a new word)

Ok, in today’s super(assumed)intelligent world that might just equate to something very, very primitive.

So why do we do it. Here’s why. A buddy of mine calls himself the futurist. I ask how and why that is not a dumb thing and hippie enough minus the green beans and about 30 years too late. Reason: fix the today and future might just be better if not great. He’s not to fault, we all want a future, buy a lotto, make a lot of money and hence futurist rich.

Equally if we watched our today we might just and might just be more than a tad bit safer for your, mine and our (maybe loving) neighbors well being.

Boring Bottom Line: Let’s not imagine the solution before we know our risks. We cannot bandage in anticipation of a wound yes but we can be prepared for policing the reason before the wound takes place.

Intelligent gently. Enough said. #Intellicta


Gautam DevGautam Dev

CyberSecurity Leader, Information Security Veteran, Cyber Risk Governance Advisor, Speaker and Evangelist


About Gautam Dev

21+ years of global experience, establishing information risk and security policy frameworks and technologies. Providing Enterprise Information Security leadership, innovating next generation of Cyber Risk Protection, Governance and Cyber Security frameworks and platforms. Over 17 years experience with global delivery models, successfully overseeing, managing and delivering geographically dispersed Information security programs and teams. Acted as a Venture leader, Strategic head, Practice head, Principal Security Services Architect, Information Security Officer, Engagement Manager and Lead Engineer (along with other roles). Expertise in several industry verticals, including retail, transport, technology, banking, education, government, health care and life sciences, energy and utilities, insurance, media, hospitality and telecommunications. Invited to speak at multiple distinguished summits and council panels by government agencies (US Defense Intelligence Agency - US Department of Defense Intelligence Information Systems), technology vendor conferences and analyst forums. C-Level Management and Advisory Cyber Risk Governance and Privacy Program Development and Leadership Cyber Security Standards and Compliance Custom Cyber Risk and Data Privacy Framework and Platform Data structure Modeling for Entity Authenticity and Certifying Authority.

Leave a comment

Your email address will not be published. Required fields are marked *