“Food for “Thought” at the Savannah JEA
Join us at the Savannah JEA on 09 February for lunch and a great discussion on cybersecurity.
Join us at the Savannah JEA on 09 February for lunch and a great discussion on cybersecurity.
We’re going to consider Co-Acting Groups versus Work Teams by asking a few simple questions. However, research and experience have identified 5 conditions which may increase the probability that these Work Teams may perform more effectively. So, if I’m asked to come in and set up an intelligence team, I’ve got 5 questions in my head that I want to ask. Now, which one do I want to choose? Let’s find out by asking these five questions.
When you’re looking at an intelligence team from a SOCIAL perspective, it focuses on the importance of collegial interactions to competently assess data. We see it as the “hive,” we see it as the “collective,” where everyone has something to contribute, and diversity makes us stronger. If we didn’t have this we wouldn’t have the SYNERGY needed to be a high performing team.
Anyone who’s been in this field for a length of time – not just intelligence, but cybersecurity, physical security, any professional field built around the concept of teams – if you’ve interacted at ANY level in ANY organization, with ANY group of people, you’re going to recognize the characteristics described in this lesson.
Intelligence teams play a critical role in several industries and may take several forms based on the needs of the organization. In the world of cybersecurity, it is widely established that an intelligence analysis capability is a crucial component of a strong security posture.
The partnership will enable Phase2 Advantage – currently providing cybersecurity training and academic resources to colleges and universities in 18 countries – to potentially expand practical, experiential, and immersive learning experiences to millions of new students in 240 countries and territories.
Cybersecurity managers may choose to overlook the intelligence value provided by script kiddies, but they should not turn their backs on these “amateurs.” They are cyber criminals and have the potential to pose a serious threat to any network.
To accomplish this goal, the university partnered with Phase2 Advantage Cybersecurity and adopted the company’s certification content as its curriculum for the graduate courses. The university also arranged for Phase2 to provide the adjunct instructors to teach the courses in the program.