Picking Your Workplace: Finding the Niche for your Business

Not all co-working spaces are created equal – and that can be a good
thing. Perhaps you want a super-professional, crisp and clean lobby
with white furniture and no music. Or maybe you need a wide expanse of
desks with active conversations and collaborative teams. Before you
make the decision of which co-working space will best suite you,
consider some of these issues:

Can you easily downgrade or upgrade?

You might feel invincible, but every business goes through its ups and
downs. If you suddenly lose your biggest client, can you easily switch
from a private office to a single desk without much trouble? And when
business picks up, can you easily add one of those desks onto your
lease so you have a place for your part-time employee?

What are the other businesses in the space?

While it might be comforting knowing that you are surrounded by other
businesses like yours (think tech starts ups, non profits, lawyers,
etc), you will likely have a greater sense of workplace satisfaction
with a greater diversity of people at your co-working space. Plus, if
you are a business that is looking to use the co-working space for
networking and business development, the greater the diversity, the
better. Be sure to ask about networking events; people often need some
wine and chips to step outside of their office shells and start
talking to each other.

What kinds of fringe benefits does the space offer?

More specifically, how good is the coffee? Neither you nor your
clients want off-brand coffee that sits all day and turns into tar. If
the co-working space doesn’t include hospitality services, you might
want to consider another place. Single serve coffee machines, free
printer use, and a strong Wi-Fi signal can mean the difference between
a mediocre office and a stellar one. And check on the hours of
operation. Some co-working spaces are locked up by 6pm and closed on
the weekends. So if you are going to use your office for any off hour
meetings, you will need to ensure you and your clients have easy
access.

Parking and Meeting Rooms

Is parking going to be difficult? Many co-working spaces are in busy,
downtown areas. Is there public transportation that can get you to the
office? Without it, you might be paying a meter and moving your car
throughout the day. And how accessible are those meeting rooms? Sure,
you may not need to meet clients at the office every day, but if the
meeting rooms are booked three weeks in advance, then you might
trouble when you need to have a private, professional conversation.

Most importantly, visit each space and try to interact with some of
the current tenants. Every co-working space will post beautiful photos
on the web; but standing at the espresso bar and chatting with some
current tenants about the next internal networking event will make
selecting the office an easy choice.

The Patient Will See You Now: Healthcare and the Internet of Things

  1. What time did Mom get up this morning?
  2. Did Dad take his mid-day pill?
  3. Does my teenager still have a fever?

The Internet of Things will soon provide an endless stream of data to
anyone acting as a caretaker to a growing child, ill spouse, or aging
parent. As technology grows smaller, we will be able to monitor vital
signs and physical activities from our phones. What once required a
hospital bed and team of nurses will soon require little more than a
medical patch and a cell phone (or Wi-Fi) signal.

The benefit, of course, will be improved medical care. Most
significantly, the Medical Internet of Things will prevent death. Most
patients don’t know how to recognize the early warning signs of heart
attack and stroke. Although we’ve had medical alert bracelets for
years, these still require the patient to recognize the problem and
press the button. In the future, cognitive choice will be removed from
the equation, and data like body temperature and heart rate will
become the deciding factors. And it won’t take too long before
sub-cutaneous devices will be used regularly to monitor blood
proteins, blood cell counts, and medication levels.

The drawback is privacy. Although you may want to know that your
70-year old mother is actively walking every day, she may not want you
to know she spent the afternoon perusing the purses at Nordstrom’s.
But her medical tag will be able to tell you exactly where she went
and if her heart rate stayed within normal parameters the entire time.

The United Kingdom is currently testing an Internet of Things program
within the National Health System (NHS). Over a two-year period,
patients with diabetes will be continuously monitored by a small
device designed to help them regulate physical activity and blood
sugar levels. The goal is to reduce doctor visits and hospital stays.
While the plan will help improve patient care, it is also intended to
monitor the ways in which caretakers use technology and respond to the
results. For example, will the massive amount of data be overwhelming
for caretakers? Does the NHS need to adjust the caregiver’s end-user
experience to be more efficient and user friendly?

Putting health-related technology into the hands of those who need it
the most can be difficult. Poorer populations don’t have the newest
iPhone or the fastest Wi-Fi signal – if any at all. So the NHS has
launched a second program in some of London’s poorer areas to help
reduce the chance of stroke for those patients. Thanks to a small
set-top box and a Bluetooth signal, caregivers no longer need to visit
patients on a daily or weekly basis to review vital signs like weight,
blood pressure, and pulse rate.

Health-related, Internet-connected apps and services are already a
part of our lives. You may not even know it, but your smartphone
probably has an activity tracker waiting to be initiated. (Or you
already have logged in and you are ignoring its constant reminders to
exercise more.) The technology is only going to become more precise
and accurate. And what we might sacrifice in privacy, we will likely
gain in healthy living.

MIT Wine Social

Celebrate 13 years of sipping and socializing

Make your plans now to attend the networking event of the summer…the 13th annual Wine Social, presented by the MIT Enterprise Forum San Diego.

GRAPHIC, WINE SOCIAL

 

WINE SOCIAL

MIT Enterprise Forum, San Diego
Wednesday, July 27, 2016
6 pm – 9 pm
Birch Aquarium, La Jolla

You can’t top the location at the Birch Aquarium with its panoramic views of the ocean and La Jolla. Plus, mingle with top tech executives in San Diego — all while raising important funds.

  • SPECIAL Pricing for CYBERTECH: $75 using CyberTech Discount code = CT74125
  • Otherwise: $90 per person Until July 24; July 25 thru July 27 (at the door): $120 per person

To order tickets, click here

Please note: Payment processor is PayPal, but you may use any major credit card

As a 501(c)(3), your ticket is tax deductible and helps raise funds for SEPT – the MIT Science and Engineering Program for teachers.

Every year, the San Diego MIT Alumni Club sends one local teacher to MIT in Cambridge, MA for special training that they bring back to our community.

Wines from more than 30 wineries – representing the best of Napa, Sonoma, and San Diego County – will be featured, plus the finest locally-based craft beers and sodas.

The French Gourmet, a San Diego culinary favorite, will feature an array of specialty appetizers and entrées to perfectly match all tastes:

  • Tray-passed hors d’oeuvres (including vegetarian and gluten-free offerings)
  • Stations with grilled steak and truffle parmesan fries; chicken roulade with quinoa and ratatouille; and Caesar salad.
  • Plus, The French Gourmet’s famous desserts — croquembouche puffs, chocolate eclairs, salted caramel brownies bites, chocolate- dipped strawberries, and much more

For an added bonus, buy five tickets and get one FREE … use code GRP2365

As one of the event’s co-sponsors, CyberTECH looks forward to seeing our members and guests at the 13th annual Wine Social, presented by MIT Enterprise Forum San Diego.

Federal judge rules probable cause isn’t necessary for computer search

In a surprising twist on a Constitutional precept, a senior US district judge has declared that probable cause wasn’t required for the FBI to search a suspect’s home computer.

The recent Virginia-based case involves a defendant who stands accused of intent to view child pornography and the receipt of child pornography.

According to the ruling, Judge Henry Coke Morgan, Jr., found that Edward Matish III “possessed no reasonable expectation of privacy in his computer’s IP address.” Thus, said the court, that IP address did not represent a prohibited search.

In pursuing the case, the FBI used what’s called “network investigative technique” (NIT) after agents seized control of Playpen, a dark net website. Users were surreptitiously transferred to an undercover FBI site.

The judge declared that “the rise of computer hacking via the Internet has changed the public’s reasonable expectations of privacy.”

The surprise ruling makes an ominous exception for the Fourth Amendment right against unreasonable search and seizure. If upheld, law enforcement would be free to remotely search and seize information from any computer, without a warrant, without probable cause, or without any suspicion at all.

In other words, privacy be damned.

The Electronic Frontier Foundation (EFF), a leading nonprofit organization that defends civil liberties in the digital space, intends to file an appeal.

The implications for the decision, if upheld, are “staggering,” said the EFF.

“Law enforcement would be free to remotely search and seize information from your computer,” said a spokesman, “without a warrant, without probable cause, or without any suspicion at all. To say the least, the decision is bad news for privacy.”

SOURCE: The New York Times

Bay Area ranks as top U.S. tech hub

Each year, the CBRE Group gives the nation’s top 50 technology cities a score based on 13 metrics such as college degrees, tech job growth and the concentration of tech jobs in the workforce.

The top five winners: Northern California’s Bay Area, Washington D.C., Seattle, New York and Austin.

CBRE, which releases such rankings annually, is the world’s largest commercial real estate services firm serving owners, investors and occupiers.

However, the rankings tend to be a bit misleading.

The reason: CBRE’s research centers on computer/software-related technology jobs, such as programmers, computer technicians and engineers. It does not include life science-related jobs — where 16th-ranked San Diego, for example, has a large footprint. In addition, life science firms increasingly are requiring software engineers and other traditional tech workers for big data analysis in fields such as genomics.

A high concentration of millennials is a characteristic of tech cities, according to the report. San Diego posted a nearly 14 percent population increase in millennials from 2009 to 2014 – the latest data available.That ranked third nationally for percentage gain in cities with a tech workforce above 50,000 jobs, trailing only Washington, D.C., and the Bay Area.

San Diego had 67,590 tech workers in 2015 – up 47 percent over the previous five years. The average wage last year was $98,990, up 16.6 percent since 2010.

Source: San Diego Union-Tribune

Member Spotlight: Toronto Stock Exchange

Toronto Stock Exchange (TSX) is one of the largest stock exchanges in the world and the eighth largest exchange in the world by market capitalization.

Based in Toronto, the Toronto Stock Exchange is owned by and operated as a subsidiary of the TMX Group for the trading of senior equities.

A broad range of businesses from Canada and abroad are represented on the exchange.

In addition to conventional securities, the exchange lists various exchange-traded funds, split share corporations, income trusts and investment funds.

More mining and oil and gas companies are listed on Toronto Stock Exchange than any other stock exchange.

The future of San Diego’s CoWork Space has arrived

You’re invited to join CyberTECH members and special guests for the official Grand Opening of iHive at NEST, Thursday, July 28.

Covering more than 16,000 square feet, iHive at NEST reflects San Diego’s fast-growing leadership role in the hi-tech and cybersecurity sectors. The space is fully leased with 47 resident members.

That total is expected to grow to 80 companies by mid-2017. What’s more, for every resident member, iHive also supports an additional four non-resident members through its Community Social Incubation model.

Celebrate the future of CoWork Space with us!

___________________________

Mark your calendar:

  • Thursday, July 28, 5:30 pm-7:30 pm
  • iHIVE at NEST: 1855 First Avenue, Manpower building, in Bankers Hill adjacent to downtown San Diego

___________________________

Quick facts:

  • Additional tech-themed CoWork spaces include: CyberHive, iHive, and xHive, featuring an array of incubators, shared workspaces, temporary workspaces and co-working spaces.
  • Funding for iHive at NEST derives from San Diego Mayor Kevin Faulconer’s commitment to grow San Diego’s innovation sector incubators. Under his leadership, the city issued a $40,000 grant to help spur more startups and jobs across the city.
  • With the guidance of San Diego-based cybersecurity executive Darin Andersen, NEST is supported by resident and non-resident membership fees, plus sponsor partners and grants.

SIOT 2016: It’s almost time for Vegas!

We’re excited to host three networking events at the annual “Securing the Internet of Things” (SIOT) event in Las Vegas, Aug. 2-4. Together with leading industry stakeholders and key decision-makers, join us as we explore emerging trends in IoT and the latest advances in technology security and privacy.

Tuesday, August 2

Masters Panels I and II

  • Charlie Palmer Steak, Four Seasons Hotel, Las Vegas
  • 10:45 am-2:30 pm

Theme: Global thought leaders, industry experts and luminaries explore the IoT phenomenon from private, government and academic perspectives.

Topics:

  • Securing emerging technologies such as 3D printers, robots and drones;
  • The role of IoT and cloud security, privacy, and innovation;
  • Forward thinking and actionable intelligence in an evolving, competitive marketplace

Schedule:

Masters Panel I, 10:45 am-12 noon

  • Welcome: Darin Andersen, CyberTECH (Distinguished Ponemon Fellow)
  • Keynote: Bill Diotte, Mocana, “Developing, Distributing, and Securing the Internet of Things”
  • Moderator: Stephan Chenette, AttackIQ

Masters Panel II, 12 noon-1 pm

  • Topic: “Healthcare Security: Patient Health vs. Patient Data”
  • Panelists: Andre McGregor; Tanium and Justine Phillips Sheppard Mullin; two additional TBD
  • Moderator: Ted Harrington, Independent Security Evaluators

Group Exercise, 1 pm-2:30 pm

  • Topic: “Building in Security and Privacy in your Imbedded IoT Devices”
  • Participants: Craig Harper, Sysorex; Karl Weaver, Oasis Smart SIM
  • Moderator: Darin Andersen,CyberTECH

Networking reception: 3 pm

Wednesday, August 3

Cyber+IOT Bangers and Mash Roundtable Breakfast

  • Ri Ra Irish Pub, Mandalay Bay Hotel, Las Vegas
  • 8:30 am-10:30 am

Background:

The tradition began at the 2013 Black Hat Conference when a handful of CyberTECH and industry leaders were looking for a venue for their breakfast meetings. The one restaurant to accept reservations was an Irish pub. The first ad-hoc breakfast was well-attended with meaningful conversations and relationships developed.

This inspired CyberTECH to evolve the breakfast into what is now the CyberTECH Cyber+IoT Bangers and Mash Roundtable Breakfast with Irish pub-style bangers (sausages) & mash (mashed potatoes) and other classic Irish breakfast fare.

In addition to a hearty breakfast, and with support from eWeek Magazine, the CyberTECH+IOT Bangers and Mash Roundtable Breakfast is where C-level and InfoSec professionals come together to network, hear security presentations and participate in an interactive panel discussion.

Thursday, August 4

Cyber CISO Roundtable Dinner

  • Charlie Palmer Steak House, Four Seasons Hotel, Las Vegas
  • 6 pm-8 pm

Featuring several expert speakers, the event brings together dynamic thinkers, thought leaders and industry experts in the cyber, IoT and emerging technology spaces. The goal is to create a safe and trusted space for CISOs to learn, share information, discuss recent cyber news and trends, and build long-term relationships with one another.

Join our Coworking Manifesto for better cyber world

The Challenge

We believe that society is facing unprecedented economic, environmental, social and cultural challenges. We also believe that new innovations are the key to turning these challenges into opportunities to improve our communities and our planet. Join our movement, Sign the Coworking Manifesto

The Solution

Coworking is redefining the way we do work. Inspired by the participatory culture of the open source movement and the empowering nature of IT, we are building a more sustainable future.

We are a group of connected individuals and small businesses creating an economy of innovation and creativity in our communities and worldwide. We envision a new economic engine composed of collaboration and community, in contrast to the silos and secrecy of the 19th/20th century economy.

The Values/Code of Conduct of the Community

We have the talent. We just need to work together. Different environments need to overlap, to connect and to interact in order to transform our culture. In order to create a sustainable community based on trust, we value:

  • collaboration over competition
  • community over agendas
  • participation over observation
  • doing over saying
  • friendship over formality
  • boldness over assurance
  • learning over expertise
  • people over personalities
  • “value ecosystem” over “value chain”

This new economy cannot thrive without engaging the larger business, creative, entrepreneurial, governmental, non-governmental and technical communities
together.

The Future

We believe that innovation breeds innovation. We will transform the world culture into one supportive of the entrepreneurial spirit, of risk taking, of pioneering into the unknown territories as the great leaders of our times.

This requires education, entrepreneurship and a large network of creative workspaces. We are reshaping the economy and the society through social entrepreneurship and innovation. Our communities are coming together to rebuild more human scale, with networked and sustainable economies to build a better world.

We are the world CoWorking movement!

Cyber Wars: High School Students Get Innovative

The gritty task of cracking complex codes and fending off hack attacks may not be official high school sports, but the competitive spirit was no less intense at California’s inaugural Cyber Innovation Challenge, held June 29 at Sacramento City College.

Eight of the state’s top high school students competed against each other in a make-shift “cyber wars,” an all-day event presented by the Governor’s Office of Business and Economic Development (GO-Biz) in partnership with:

  • the Cyber California network;
  • the California Community Colleges Chancellor’s Office;
  • and the California Workforce Development Board

“What a perfect opportunity to showcase our state’s best and brightest students by addressing the global cybersecurity skills gap,” said Cyber California chair Darin Andersen. “The need to know that our fast-growing industry welcomes their innovative young minds with open arms.”

Eight teams of high school students from Sacramento Valley, Los Angeles, San Diego and the Bay Area competed in a series of cyber security challenges.

GO-Biz is the Governor’s Office of Business and Economic Development, which serves as California’s lead entity for economic development and job creation efforts.

CyberCalifornia is a coalition of businesses, state agencies, and educational partners dedicated to reinforcing California’s leadership position in cybersecurity.

CoWork Day, Aug. 11: Work free for a day at NEST

Looking for a CoWork space that’s convenient to San Diego’s downtown? you’re invited to work free at NEST at iHive on Thursday, Aug. 11.

Located at the corner of First and Fir streets in Bankers Hill, in the Manpower building just a few blocks from downtown, NEST at iHive is offering the rent-free day as part of San Diego CoWorking Week, Aug. 8-12.

For an added bonus, CyberTECH will host a complimentary after-work mixer in the outdoor patio, open to all members and potential new members.

To arrange for a free CoWork day, contact Mo Rahseparian at: mr@cyberhive.org

 

Uber Pays Bug Bounty and Patches Vulnerabilities

Thanks to a team of bug bounty hackers out of Portugal, Uber has patched some system weaknesses. Uber has seen tremendous growth in recent years, acting as a market disruptor for personal transportation. With millions of registered users around the world, Uber stores the kind of sensitive, personal and financial information that could be extremely profitable to unethical hackers.

Specifically, the Uber hackers were able to identify individual drivers, trip histories, rider financial data, and user device data. Additional finds included passenger photos, fare prices, and coupon code vulnerabilities. According to UK-based tech publication, The Register, Uber quickly responded to the issues and closed the security gaps before any malicious hackers could access the system.

According to Lane Thomas of Tripwire, these kinds of programming problems are very commonplace. Services like Uber need to be built with cyber security as a primary goal.

Without programmers focusing on inadvertent vulnerabilities during the development process, software become very susceptible to hacks. Reverse programming to fix problems is frequently more expensive and less effective than avoiding the weaknesses upfront.

As more and more companies are creating apps and programs that customize services for individuals, more and more people are filing their personal and financial data and assuming the information is safe. But it’s not. Large companies, like Uber, have massive resources at their disposal to build the system correctly, routinely update the software, and proactively work to prevent future hacks. However, with app development happening on every corner in tech hubs like San Jose, Seattle, and San Diego, smaller firms may not have the knowledge base or resources to secure client information.

Bug bounty rewards have proven to be a very cost-effective way for companies willing to listen to the independent hackers trying to help. If the hackers can’t find any problems, the companies don’t pay a dime. But given the proliferation of malicious hacks, most companies will eventually be tested by hackers. Being amenable to paying out for a benign hack will often save the millions of dollars that would have been paid in stolen money, revenue decreases, and brand deterioration.

Uber was lucky. Given the value of the data uncovered through the system vulnerabilities, Uber would have eventually lost this data to a more malignant hack. Uber had millions of users to protect; but smaller companies with just a few thousand users are still a source of valuable data. There’s a market for active credit card accounts, and hackers are willing to sell off their finds to the highest bidder.

Organizational-spanning characteristics of IoT Systems

mindthegap-300x223

Gaps between institutional organizations implementing & supporting IoT Systems create challenges

One of the unique characteristics of IoT Systems, and one that adds to the complexity of a system’s deployment, is that they tend to span many organizations and entities within the institution. This is particularly true in Higher Education institutions with their city-like aspects, multiple service lines, and wide variety of activities in their buildings and spaces. While traditional enterprise systems, such as e-mail or calendaring, are likely to be owned and operated by one or two institutional organizations, IoT Systems involve many and are deployed in the ‘complex and material manifestations’ that characterize buildings and spaces.

A Higher Education institution example might be a research lab that incorporates an automation and environmental control system that involves the facilities organization, the central IT organization, maybe a local/distributed IT organization, the lead researcher (aka Principal Investigator or PI), her lab team, at least one vendor/contractor and probably several other vendors. Between each of these, a gap forms where system ownership and accountability can fall. Everyone sees their piece, but not much of the others. There’s no one monitoring the greater Gestalt of the IoT System. And that’s where the wild things are.

Traditional enterprise systems tend to fall within the domain of central IT with use of the system being distributed around the institution. So with traditional enterprise systems, use is distributed but ownership and operation is largely with one organization. IoT Systems, on the other hand, tend to have multiple parties/organizations involved in the implementation and management, but the ownership is unclear.

IoT Systems are systems within systems within systems …

IoT Systems are systems within systems within systems …

This lack of ownership can lead to unfortunate assumptions. For example, the end user/researcher in the Higher Ed case is probably thinking, “central IT and the Chief Information Security Officer are ensuring my system is safe and secure.” The central IT group is thinking, “I’ve got no idea what they’re plugging into the network down there … I didn’t even know they bought a new system. Where did that come from? “ The facilities people might be thinking, “Okay I’ll install these 100 sensors and 50 actuators around this building and these two computers in the closet that the vendor said I had to install. The research people and central IT people will make sure it’s all configured properly.” No one is seeing the whole picture or managing the whole system to desired outcomes.

This implementation and management of IoT Systems is a part of what is being explored within Internet2’s IoT Systems Risk Management Task Force in support of Internet2’s Smart Campus Initiative.

Read more from the Long Tail Risk