JS

Author

James Scott

/james-scott-quotes-and-sayings

46 Quotes
3 Works

Author Summary

About James Scott on QuoteMust

James Scott currently has 46 indexed quotes and 3 linked works on QuoteMust. This page is the canonical destination for that author archive.

Works

Books and titles linked to this author

co-founder, Institute for Critical Infrastructure Technology Senior Fellow, Institute for Critical Infrastructure Technology Sr. Fellow, Institute for Critical Infrastructure Technology

Quotes

All quote cards for James Scott

"

Few critical infrastructures need to expedite their cyber resiliency as desperately as the health sector, who repeatedly demonstrates lackadaisical cyber hygiene, finagled and Frankensteined networks, virtually unanimous absence of security operations teams and good ol_ boys club bureaucratic board members flexing little more than smoke and mirror, cyber security theatrics as their organizational defense.

JS
James Scott

Senior Fellow, Institute for Critical Infrastructure Technology

"

We__e talking about the fate of our economy and the questionable resiliency of our Nation__ critical infrastructure. Why are experts so polite, patient, and forgiving when talking about cybersecurity and National Security? The drama of each script kiddie botnet attack and Nation State pilfering of our IP has been turned into a soap opera through press releases, sound bites and enforced absurdity of mainstream media. It__ time for a cybersecurity zeitgeist in the West where cyber hygiene is a meme that is aggressively distributed by those who have mastered it and encouraged to be imitated by those who have experienced it.

JS
James Scott

Senior Fellow, Institute for Critical Infrastructure Technology

"

Security-by-design is an indispensable prerequisite to the establishment of vital critical infrastructure resiliency. Each device vulnerable to adversarial compromise, inflates and bolsters the exploitable cyber-attack surface that can be leveraged against targets, and every enslaved device grants adversaries carte blanche access that can be utilized to parasitically entwine malware into organizational networks and IoT microcosms, and that can be leveraged to amplify the impact and harm inflicted on targeted end-users, organizations, and government entities

JS
James Scott

Sr. Fellow, Institute for Critical Infrastructure Technology