Increasing ethics training is the answer to cyberthreats

By Stephen Ibaraki

This article is an excerpt of a larger piece that appears on IT World Canada and is republished with permission.

Over 90 per cent of networks are compromised and this can happen in less than 20 minutes when exposed to the Internet.

Mobile is the focal point of this trend. With embedded computing, the Internet of Things forming the planetary nervous system, a total disruption or failure is possible. Imagine the global economy of 77 trillion dollars dropping to under 10 trillion. Compounding this are the growing privacy breaches and in the wake of HeartBleed, what other vulnerabilities are lurking?

These privacy and cybersecurity failures are one of the symptoms of the digital quake where there are wholesale changes of over 50 per cent of all enterprises and roles. All disappearing! Thus, there is an urgent need for growing professionalism and ethics training.

Picture 026

There are added thoughts from leading authorities regarding professionalism and ethics:

– In a 2012 interview, Dr.Hamadoun Toure, Secretary General of the ITU, the United Nations agency representing ICT stated, “First, professional best practice is to be encouraged in every industry … In addition, we have our own ethics office which promulgates its guidelines on professional ethics through regular in-house workshops as well as serving as a focal point for individual staff wishing to consult on issues of professional ethics.”

– In a 2013 interview, Ambassador Janis Karklins, ADG UNESCO:”I think there are many examples of good cooperation of professionals with different and sometimes diverging interests which are not really regulated by the government. The first thing that comes to mind is IETF (Internet Engineering Task Force) where internet professionals and the technical community come together to discuss and then to develop necessary standards. I mentioned that we observe not only the advantages of the internet and technology, but also the misuse of technology and we need to think of the best way to help counter that misuse. Our computing professionals should certainly be part of that reflection and also action to counter the misuse of the internet or technology in general.”

– The IFIP World CIO Forum, Global CIO Joint Declarationsstates, “We strive to support [the] IT Industry and professionalism of IT career.” “We will ensure the highest standards in our work, and with both quality and ethics, and will act diligently and professionally, and with integrity in discharge of our duties for the best interest of our respective organisations and society.”

So what can be done? CIPS in June has taken the lead in solving the cyber challenges by providing an online free CIPS ethics exam supported by donations. As noted by CIPS, “We live in a highly connected world where technology has become the central nervous system of our modern society. Technology has changed our world for the better, but technology also has fantastic potential for misuse as far too regularly witnessed. Technology professionals and future business leaders must therefore actively contribute and commit to ethical conduct regarding the data, systems, and IP they influence.”

This aligns with CIPS prior history of leadership. The CIPS’ ethics exam and valued insights gained from it are important to all enterprises and ICT professionals and it’s an important step to get involved by taking the exam. I challenge you to try it, support it, message about it to your colleagues and ultimately see what you can learn!

I believe the common denominator for sustained growth in economic development, GDP, innovation, sustainability and security is a professional workforce supported by internationally accredited industry relevant education, demonstrated skills development, recognized ethical conduct and adherence to proven best practices and standards; an ICT workforce following personal responsibility, public accountability, quality assurance, recognized credentials. This involves the collaboration of business, industry, governments, academia, and professional societies.

Read the full text of this post on IT World Canada and learn more about the CIPS ethics exam campaign.

stephenWith over 100 significant contributions, awards and recognitions, Stephen Ibaraki is an IT World writer, past multiple award winning educator / program research head, multiple award winning serial entrepreneur and executive chairman. He is an ICT nominated founding CIPS Fellow, founding NPA Distinguished Fellow, founding GITCA global Fellow, CIPS Hall of Fame. He is the only recipient of the Computing Canada IT Leadership Lifetime Achievement Award, Lifetime Advanced Technology Award for innovation, global IT industry’s first international Awards for Professionalism Career Achievement Award, Gary Hadford Award, over 10 Microsoft Awards (MVP, Global Gold Awards),…many more. He’s also a first recipient of the IT Hero Award from the Information Technology Association Canada and Government Industry Canada. LinkedIn:

About Cisco Canada Guest

Cisco Canada's guest blog series has been designed to provide insights and perspectives from our partners and customers on transformative technologies and practices that impact their organizations. With each new post we encourage our community to engage in conversation and discussion in the comments section below and share on their social networks. Opinions expressed here, and in any corresponding comments, are the personal opinions of the original authors, not of Cisco. La série des blogues des invités de Cisco Canada a été conçue pour faire connaître les connaissances et les points de vue de nos partenaires et clients à propos des technologies et des méthodes transformatrices qui font avancer leur entreprise. À chaque édition, nous invitons notre communauté à amorcer le dialogue et la discussion dans la section des commentaires au bas de la page du blogue et de partager l'information sur leurs réseaux sociaux. Les opinions qui y sont exprimées de même que les commentaires associés sont les opinions personnelles des auteurs d'origine et non celles de Cisco.
This entry was posted in All Posts, Internet of Everything, Security and tagged , , , , , , , , , , , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s