Remove Agile Remove Operations Remove Security
article thumbnail

Startups – Integrating Security Mindset and Processes Early

YoungUpstarts

by Quan Heng Lim, Cyber-Operations Consultant at Horangi. Agile Methodology.”. In the chase to produce the best minimum viable product or to push out the next killer feature, security is often given the backseat. Security, efficiently. The Lean Startup.”. Fail Fast, Pivot.”. I’m pretty sure this sounds familiar to many.

Security 206
article thumbnail

Agile Opportunism – Entrepreneurial DNA « Steve Blank

Steve Blank

The former manager had been fired because: ESL had a major military contract to deploy an intelligence gathering system to Korea they needed to train the Army Security Agency on maintenance of the system the 10 week training course (6-hours a day) hadn’t been written the class was supposed to start in 6 weeks. Are You Single?

Agile 269
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Technology, Innovation, and Modern War – Class 16 – Acquisition & Sustainment – Ellen Lord

Steve Blank

We just held our sixteenth session of our new national security class Technology, Innovation and Modern War. Joe Felter , Raj Shah and I designed a class to examine the new military systems, operational concepts and doctrines that will emerge from 21st century technologies – Space, Cyber, AI & Machine Learning and Autonomy.

article thumbnail

Hacking for Defense @ Stanford 2021 Lessons Learned Presentations

Steve Blank

Hacking for Defense has teams of students working to understand and solve national security problems. While all the teams used the Mission Model Canvas , (videos here ), Customer Development and Agile Engineering to build Minimal Viable Products, each of their journeys was unique. Team Silknet – Detecting Ground Base Threats.

Lean 417
article thumbnail

The Firewall Is Dead – What Can Businesses Do To Protect And Secure Their Brands?

YoungUpstarts

It doesn’t, however, change the fact that firewalls are still only perimeter protection devices and are limited to applying security policies against visible packets that travel through them. Agile businesses have moved to the cloud because of its scalability, efficiency and reliability, amongst other benefits. The triple threat.

Security 140
article thumbnail

Why Companies and Government Do “Innovation Theater” Instead of Actual Innovation

Steve Blank

HR processes, legal processes, financial processes, acquisition and contracting processes, security processes, product development and management processes, and types of organizational forms etc. And by product, I mean the creation of new hardware, services, software, tools, operations, tradecraft, etc. Process Versus Product.

article thumbnail

Why The Government is Isn’t a Bigger Version of a Startup

Steve Blank

In hindsight the damage wasn’t the result of what the United States was doing, but over the Pentagon’s inability and unwillingness to own up to why it was doing it: After the intelligence failure of 9/11, security agencies overcompensated by widespread, warrantless datamining as well as electronic and telephonic surveillance, including on U.S.