Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
SlideShare a Scribd company logo
Offering World-Class Electronic Measurement Solutions and Services
May 2019
Vol- 5
Issue- 2
The Most
to watch 2019
Editor’s Prespective
Securing Future
The most ethical companies to watch 2019
The most ethical companies to watch 2019
e cannot deny the fact that the ultimate goal of any business is profit. And the key to profit is customers. The
Wtraditional belief suggests that the customer is king and companies do anything they can to satisfy their customers’
needs. However, there are few ethical boundaries which they must adhere to . These boundaries assert that a
business must follow the code of conduct and practice fair trade while meeting its financial goals. It has been observed in the
recent trends that customers prefer companies that are more ethical over the ones that are not. Moreover most enterprises that
are on the top of the table in their respective spaces are highly ethical.
In order to follow the business ethics, a company must have a strong leadership. If the leaders understand their values well
and have the ability to choose being ethically responsible over profit or gain, then it ripples across the organization and
creates the foundation of an ethical culture. However, an enterprise does not become ethical overnight by following some
textbook guidelines. These values must be rooted in the mission and the vision of the company. Every organization has some
values that define it and keeps it together. Business ethics should be one of them.
C.S. Lewis defines Integrity as “Integrity is doing the right thing even when no one is looking.” and I believe it couldn’t be
defined better than this. A company must be transparent to its employees, business associates and other concerned parties.
Building trust among them is one of the most significant practices for the company.
Loyalty towards customers is one of the most important features of business ethics. Lets take a small example to understand
how it benefits the company. In business, there is a certain cost of acquiring a new customer. Similarly, there is a certain cost
of retaining one. The cost of retaining a customer is far less than acquiring one. However, there comes a time in the life cycle
of the customer when retaining him/her becomes loss making for the company. Usually the companies stop retaining the
customers after this point. This costs them their goodwill. An ethical company remains loyal to its customers as long as the
customer is associated.
Standardizing Business Ethics
There are several companies that have raised the standards of business practices in their respective fields by exercising
business ethics and making it an important aspect for running business. Insights Success acknowledges these companies by
shortlisting “The Most Ethical Companies to watch, 2019”.
Featuring as our cover story is Keysight Technologies, a company that has the broadest range of products in the industry to
accelerate deployment of its customers new technologies. Keysight reflects its rich heritage - a direct line from both Hewlett-
Packard’s standards of integrity and innovation and Agilent’s premier measurement business.
Alongside this, the magazine also includes Cementos Progreso, which produces and markets cement and other construction
materials accompanied by services and high quality; BIBICO, a designer firm of beautiful easy-to-wear clothing made from
quality natural & organic fabrics; and Beaumont Organic, an international ethical ladies wear brand that combines signature
styling with contemporary classics.
Also, make sure to flip through articles, written by our in-house editorial team as well as CXO standpoints of notable industry
personalities to have a brief taste of the sector.
Let’s start reading!
“ “
Shubham Khampariya
Expert’s Outlook
Living Through Fourth
Industrial Revolution
Leader’s Insights
The Importance of an
Undying Passion in
Budding Entrepreneurs
08Cover Story
Keysight
Technologies
30
Offering World-Class
Electronic Measurement
Solutions and Services
16
CONENTS
Beaumont Organic
Providing Meaning to
Sustainable Living!
BIBICO
Offering Quality Clothing
whilst Sustaining the
Environment
Cementos Progreso
Promoting Business
Ethics Globally
Editor’s Prespective
Network Security
Threats and Soloution
BIBICO
Offering Quality Clothing
whilst Sustaining the
Environment
Cementos Progreso
Promoting Business
Ethics Globally
18
3426
Securing Future
Cyber Security
Secure Your Network
with Intelligence
36
Articles
22
The most ethical companies to watch 2019
sales@insightssuccess.com
May, 2019
Editor-in-Chief
Senior Sales Manager Business Development Manager
Marketing Manager
Technical Head
Technical Specialist Digital Marketing Manager
Research Analyst
Database Management Technology Consultant
Pooja M. Bansal
Managing Editor
Anish Miller
Executive Editor
Shubham Khampariya
Assistant Editors
Jenny Fernandes
Bhushan Kadam
Visualizer
David King
Art & Design Director
Amol Kamble
Associate Designer
Kushagra Gupta
Kshitij Shrivatsav Peter Collins
John Matthew
Sales Executives
David, Kevin, Mark, Avadhut
Business Development Executives
Steve, Joe, Alan, AnupJacob Smile
Aditya Marry D'Souza
SME-SMO Executive
Prashant Chevale Patrick James
Circulation Manager
Robert Brown Stella Andrew David Stokes
Asha Bhange
Co-designer
Copyright © 2019 Insights Success, All rights reserved. The content and images used in this magazine should not be reproduced or transmitted in any
form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior permission from Insights Success.
Reprint rights remain solely with Insights Success.
Follow us on : www.facebook.com/insightssuccess/ www.twitter.com/insightssuccess
We are also available on :
Insights Success Media Tech LLC
555 Metro Place North, Suite 100,
Dublin, OH 43017, United States
Phone - (614)-602-1754
Email: info@insightssuccess.com
For Subscription: www.insightssuccess.com
Insights Success Media and Technology Pvt. Ltd.
Off. No. 22 & 510, 5th Flr., Rainbow Plaza, Shivar Chowk,
Pimple Saudagar, Pune, Maharashtra 411017
Phone - India: +91 7410079881/ 82/ 83/ 84/ 85
Email: info@insightssuccess.in
For Subscription: www.insightssuccess.in
Ron Nersesian
CEO & President
Cover	Story
Offering	World-Class	Electronic	Measurement	Solutions	and	Services
Keysight’s	mission	
is	to	accelerate	
innovation	to	
connect	and	secure	
the	world.
The Most
to watch 2019
In an interview with Insights
Success, the CEO and President
of Keysight Technologies, Ron
Nersesian, shares his key insights on
various aspects of the company and
how it contributes towards the industry
by offering cutting edge solutions and
services. He also discusses Keysight’s
attainments and future endeavors.
Below are the highlights from the
interview conducted between Ron and
Insights Success:
Give a brief overview of your
organization, its mission and vision?
Keysight provides world-class
electronic measurement capabilities to
accelerate technology innovations that
make the world more productive and a
safer place to live. We offer an
unmatched breadth and depth of
measurement tools and expertise to
meet the world’s critical requirements
for electronic measurement. Keysight
develops solutions that help bring
electronic products to market faster
from design simulation, to prototype
validation, to manufacturing test, to
optimization in networks and cloud
environments. Our customers span the
worldwide communications ecosystem,
aerospace and defense, automotive and
energy, semiconductor and general
electronics end markets.
What are the cutting-edge
products/solutions offered by
Keysight Technologies?
Keysight is at the heart of innovation
processes in key end markets and
emerging technology trends such as
5G, connected and autonomous
vehicles, E-Mobility, IoT, and high-
speed datacenters. Innovations like
these require considerable technology
reinvention. That’s why at Keysight,
we are innovating the invention
process by streamlining workflows for
software and hardware designers. As
the market leading test and
measurement company in the world,
we offer end-to-end test equipment,
solutions, and services to help design,
validate, manufacture, and optimize
these innovations. Wherever the signal
goes, Keysight is there to accelerate
development lifecycles.
We see a lot of exciting growth areas
across many markets. Let’s start with
the promise of 5G. Like what the
market experienced in 3G and 4G
usage growth, 5G promises to connect
over a billion new devices. That alone
is exciting, but even more exciting is
the attributes of those devices.
Intermixed with more standard users
will be billions of IoT devices each
communicating small amounts of data,
virtual and augmented reality systems
requiring very fast connections, and
connected cars moving at highway
speeds.
Getting there requires use of complex
technologies such as millimeter wave
frequencies for commercial
communication along with dense
waveform modulations, massive
multiple-input multiple-output
(MIMO) antenna techniques, and
antenna beamforming, just to name a
few. To test all this, we not only need
to extend the capabilities of individual
test platforms, but to build entire
system solutions aimed at validating
specific 5G design implementations.
Keysight partners across the 5G
ecosystem, including chipset makers,
device designers, network equipment
manufacturers, and service providers.
We create tests to validate designs of
individual features, specific products,
or end-to-end networks. There are
plenty of exciting technology
challenges to go around in every part
of the 5G ecosystem as each part
pushes the boundaries of technical
innovation.
In terms of automotive, our customers
are pushing the boundaries in battery
manufacturing, power conversion and
power loading in e-Mobility. They are
also innovating longer range, higher-
resolution radar and LIDAR sensors
for autonomous driving and integrating
e-Call services and broadening the data
connections to make a truly connected
car.
In IoT, we are seeing an evolution from
’best effort’ applications to more
’mission critical’ applications that
require higher reliability and more
secure wireless connections. In data
centers, we constantly see
improvements in data connection
speeds which now top 400 Gbps
requiring a new generation of
transceivers. In aerospace and defense,
of course, our customers are always
pushing the boundaries in sensors and
communications.
Describe the experiences or
achievements that have shaped the
journey of the company.
I would say our biggest achievement
was the rapid transformation from
hardware-centric products to software-
centric solutions. We realized that at
each stage of development – design
simulation, prototype validation, and
production optimization – different
teams create their own test parameters
and analysis points. Traditionally,
design simulation software tends to
operate independently from prototype
validation lab systems, which tend to
operate independently from production
test systems. With Keysight’s software
platform, PathWave, design, test and
analysis work from each stage can be
shared with the next. This not only
improves the design but saves a lot of
time used to reinvent tests typical in
most developments.
PathWave allows our customers to
accelerate innovation and product
development from concept through
manufacturing and deployment. It’s the
industry’s first software platform to
integrate design, test, measurement and
analysis in a completely programmable
environment. It combines design
We	don’t	just	make	
products	for	the	sake	
of	making	products	or	
to	collect	a	pay	check.	
We	make	products	
that	enable	our	
customers	to	
accelerate	innovation.
“
“
software, instrument control, and application-
specific test software in an open development
environment allowing users to create high-
performance solutions fast.
Keysight’s strong products combined with its
talented employees and culture makes me
incredibly excited for what the future holds, not
only for our company but also for the
technologies that advance the world.
What influence over the company have you
had as the CEO?
I feel strongly that customers think in terms of
finding solutions to their unique business and
technical problems. They don’t think in terms of
products to purchase. We transformed the
company to address real-world business
requirements in our customers’ target industries
to deliver integrated solutions. This entailed a
major transformation in how we were structured,
how we engaged with customers, and in our go-
to-market strategy.
“Keysight’s	vision	is	to	
build	a	better	planet	by	
accelerating	innovation	
to	connect	and	secure	
the	world.”
For example, in the past, we were organized around our
products and internal capabilities. We shifted that to reflect
the focus on our customers end ecosystems. This has
allowed us to think about our customers first, about solving
their challenges, and getting them to market faster.
And for those customers who need expert assistance or
want to outsource test altogether, we offer multiple services,
including test-as-a-service locations around the world. The
number of early engagements and partnerships we have
forged with market-maker companies demonstrates that this
strategy is working for us and for our customers.
Does having an ethical approach affect your business
strategies or growth of your company?
Absolutely, at the highest level, our standards of business
conduct, which every employee receives annual training on,
provide a guidepost for managing our ethical governance
across the company. From there, our environmental
policies, employee benefits and diversity, responsible
sourcing efforts, community philanthropy and volunteerism,
as well as our solutions, support an end-to-end ethical
workplace at Keysight.
From individual employee responsibilities through
corporate governance, our strategic and operational
business management policies, procedures, and values
provide operational transparency and business sustainability
while meeting compliance requirements.
I view this approach as having a direct impact on our
incredible growth. We enable faster acquisition integration
and new market entry through consistent programs and
policies that meet global regulations and requirements
across the company. We support employee hiring and
development in growth areas, with future engineer
development, employee diversity and benefits that also
include philanthropy, volunteerism, STEM programs in
elementary, middle, and high schools, and university
relations in support of future workforce development.
University research grants and engagements ensure we are
positioned well for innovation. In addition, our remarketing
solutions and used product sales through product quality
and take-back programs support environmental
sustainability while offering new revenue streams.
How do you plan to sustain the ethical nature of your
organization in the near future?
Well, quite simply, to keep doing what we have been doing
through our entrepreneurial and continuous improvement
mindset. For 80 years as of January 2019 – first as part of
Hewlett-Packard, then Agilent, and now Keysight, we have
acknowledged our responsibility to deliver through ethical
governance practices and help address global social and
environmental challenges. Beyond just being the right thing
to do, it is part of our company DNA going back to HP
founders Bill Hewlett and Dave Packard.
Our Keysight Leadership Model – which defines how the
company continuously delivers greater value to customers,
shareholders, and employees – has the same defined value
set of social responsibility, accountability and
uncompromising integrity. It is the philosophy that
permeates every aspect of our operations and drives our
innovation, speed, and excellence in execution.
Beyond that, we support a continuous improvement
mentality. So, while we will continue to do the great things
we have always done, it is our mindset to improve wherever
we can. From our Corporate Social Responsibility program
that monitors opportunities in these areas, to every
employee that looks to their own roles and functions for
how to do things better through operational excellence and
innovation.
Address :
Country :City : State : Zip :
Global Subscription
Date :Name :
Telephone :
Email :
READ
IT
FIRST
Never Miss an Issue
Yes I would like to subscribe to Insights uccess Magazine., S
SUBSCRIBE
T O D A Y
Che should be drawn in favor of:ck INSIGHTS SUCCESS MEDIA TECH LLC
Insights Success Media Tech LLC
555 Metro Place North, Suite 100,
Dublin, OH 43017, United States
Phone (614)-602-1754,(302)-319-9947:
Email: info@insightssuccess.com
For Subscription: www.insightssuccess.com
CORPORATE OFFICE
The most ethical companies to watch 2019
The Importance of an
Undying Passion
in Budding Entrepreneurs
Iwas at an event in San Francisco in 2014, when I
heard a piece of advice that stuck in my mind ever
since. At the time, when I considered the advice, I
really wasn’t sure whether I was actually following it.
However, since then, I have come to understand the
significance of it. The speaker said, in relation to
choosing what you work on:
“If you’re going to climb a mountain, make sure it’s the
right one”
You spend much of the best part of your early life trying
to understand yourself well enough to find the right
mountain for you. You look for indicators; subjects you
like at school, mentors whose advice particularly
resonates, which exams you do well in, the clubs you
join at university, the career paths of those more senior
than you in our first job. But it’s hard – I rarely come
across people who really have the conviction to
absolutely know their mountain to climb through
forward looking indicators alone.
I started my career as an engineer. I joined a world
leading Engineering and Project Management company
which took me to projects in London, the US and the
Middle East. I worked on some of the largest and most
cutting edge mega-projects in the world. I quickly
became a chartered civil engineer and project manager
and it seemed like I was destined for a long and
successful career in the industry. However, I wasn’t
happy. Despite all the indicators pointing in a positive
direction, I knew something wasn’t right.
It was then that I got a call from my brother, to ask for
help on a little project he was working on with some
teacher friends of his. Fast forward a couple of years and
I had left the Middle East, left my career, and founded a
company called Pobble that would go on to change the
lives of thousands of children all over the world.
Now, every indicator would have told me that this was a
risky, even crazy thing to do! In fact, the next 6 years
that bought me to now, have been the most wonderful,
painful, challenging, and rewarding years of my life.
Entrepreneurship is truly a rollercoaster ride! When I
reflect on that decision point 6 years ago though, it
would have been impossible to have rationally decided
to leave everything and start on a new path – I just knew
in my gut that I had to do it!
4 years on I look back on that piece of advice and realise
that I did pick the right mountain to climb. And there’s
one indicator that I see above all else that convinces me
that this is the case. The fact that I didn’t give up. When
you are working on something that truly aligns with your
passion, every challenge is just the next one to overcome
as you progress along your journey to achieving your
mission, giving up just isn’t an option!
I’m often asked about the secret to successful
entrepreneurship and I say two things; focus and
resilience. When you are doing something that you love
and that you believe in, no matter what the challenge,
you keep going and make it happen. You keep going,
when others would just give up. Also, despite all the
chaos and challenge, you find the way to focus on taking
the next best step forward in a sea of uncertainty. When
you have the clarity of knowing where you are going on
your journey you are able to focus on the right things.
When I meet with new ideas and startups, it’s relatively
16 |May 2019
easy to verify the market, the need and the solution – but
much more important in my opinion is the reason for the
founding team to be doing what they are doing. If this
project aligns with their life’s mission, their “mountain”,
then no matter how hard the challenge is, they will find a
way to create the best path forward. Maybe they’ll fail
for the many other reasons that startups fail, but they
have the best chance if they have that personal
commitment and passion to achieve success.
Pobble has won many awards, gained significant
investment, and continues to attract fantastic partners.
However, at the end of the day all these things are by-
products of one thing; every member of our amazing
team has an incredibly strong belief in our mission and is
passionate about giving teachers tools that will make
their life easier and inspire and engage their children to
make writing ridiculously exciting for them in school!
Without this passion and our commitment to climb our
mountain, none of this impact or achievement would be
possible.
Jon is Co-founder and CEO of
award winning edtech venture
Pobble. Pobble is used by tens of
thousands of teachers each day to
nd the best teaching resources, give
pupils a global audience for their
work, and to assess writing.
Pobble has global acclaim, gaining
endorsements from famous authors
such as Michael Morpurgo,
partnerships with organisations like
the BBC, OUP and Microsoft, and
investment from some the world's
most prolic education focussed
angel investors.
After graduating with a Masters in
Engineering Science from Trinity
College, Oxford, Jon because a
chartered Civil Engineer and Project
Manager. Jon started Pobble with his
brother and two other teachers in
their spare time. They then went on
to incubate Pobble whilst Jon studied
for his MBA at London Business
School. The fth co-founder
(technical) joined Pobble from Jon's
stream at London Business School.
About the Author
Jon Smith
Founder & CEO
Leader’s Insights
17|May 2019
Paving the way
for fashion to
have a more
sustainable future.
“
“
Providing Meaning to Sustainable Living!
Hannah Beaumont Laurencia
Founder & Director
The Most
to watch 2019
18 |May 2019
Sustainable living describes a
lifestyle that attempts to reduce
an individual’s or society’s use
of the Earth’s natural resources, and
one’s personal resources.- Wiki
Founded in 2008, Beaumont Organic
is a pioneering conscious clothing
brand that combines signature styling
with contemporary classics using
luxury organic, fair trade and eco
fabrics. As a clothing brand, Beaumont
is paving the way for fashion to have a
more sustainable future. The
organization does this by creating
contemporary conscious clothing for
the modern woman. Its vision is to be a
brand people are proud to be wearing
and be associated with, producing
timeless clothing that will last a
lifetime with care from its customers.
Beaumont is inspired by the thought of
making changes and paving a way for
fashion to have a more sustainable
future. The brand execute this by
asking questions, producing ethically,
reducing wastage, using off-cuts where
it can for sampling and keeping
consumption low.
Making Sustainable Living
Mainstream
Beaumont Organic was founded before
the term ‘sustainable living’ was so
commonly discussed. Hence, during its
initial period building the brand was
challenging and the leaders had to
educate clients on the need for
conscious clothing. When it comes to
achievements, Beaumont has already
been received various awards,
recognitions and signed agents in
countries that believe in sustainable
living, and are passionate about the
product and capabilities.
Also when it comes to preserving the
intactness of organizational ethics,
Beaumont Organic has made sure that
it uses GOT’s certified organic cotton
in order to produce its clothing. Being
responsible is also part of the process
to preserve its ethics. Working towards
reducing waste by using off-cuts for
sampling and holding sample sales, to
make use of its waste wherever
possible Beaumont ensures its ethics
are preserved.
Advocating Sustainability
The Director and Founder of
Beaumont Organic Hannah
Beaumont Laurencia is an advocate
of sustainability. She passionately
believes in slow sustainable living. She
claims the mindset of slow conscious
living must be transmitted through
every part of her and Beaumont
Organic’s business philosophies. It is
important to believe in something
yourself, when trying to encourage
others to follow the same path, and
particularly for the business to
continue to grow and remain ethical.
Since the day she could walk, Hannah
loved to travel and was spoiled with
wonderful holidays, including cultural
trips to Washington DC, magical weeks
at Disneyland, etc. In her late teen days
Hannah visited a truly developing
country for the first time. Living in a
hut with corrugated metal roof,
infested with all kinds of insects and
wildlife, no hot water and an outside
toilet helped Hannah to understand the
value that travel can bring to a person.
During her tenure in Fiji, she became
more grounded and self-sufficient.
For Hannah it was a life changing
experience but the thing that has stayed
with her the longest is not the living
standards, it is the love and happiness
that the people of Fiji have and the
gratitude they have for the simplest
things.
Encouraging Others to Follow Steps
When it comes to sustaining the ethical
nature of the organization, Beaumont is
writing new policies within the
company at the moment to ensure as it
grows and takes more staff onboard,
that the correct training is given to
them and they knows what Beaumont’s
value and ethics are. With the
continuous growth of the organization,
it is continuing to build on its
relationships with suppliers, as well as
forming new relationships who all
believe in sustainability and will
continue working with Beaumont in
the future.
The company also believes that, having
an ethical approach doesn’t affect
anything within the business; it is just
the way it works. It is normal for
Beaumont Organic to do things in an
ethical way and encourage others to
follow in its steps; it allows the
company to educate its customers and
gives them the choice to be sustainable
and conscious with their clothing.
Client Feedback
“Beaumont Organic offers consistently
outstanding quality, beautiful fabrics
and excellent customer service.
Hannah is brilliant at listening to
feedback and using this to move the
collections forward in the right
direction season after season.”
(Vanessa Collen – Managing Director
of Collen & Clare)
“We have been working with Beaumont
Organic for many years now and
admire how Hannah has grown her
brand whilst remaining true to her
vision throughout. The clothes offer
timeless soft wear ability and have a
clear handwriting. A personal and
proper brand.” (Amy Hall – Director
of Hall & Co)
“It has always been a pleasure
working with Hannah and her team at
Beaumont Organic. The fabrics are
really beautiful and the designs are
consistently unique, showcasing
modern cuts.” (Anna Atwal – Director
of PAD Lifestyle)
19|May 2019
The most ethical companies to watch 2019
The most ethical companies to watch 2019
SecureYourNetworkwithIntelligence
Cyber
Security
22 |May 2019
At present, cyber security is
playing a vital role in the
digital world and it is also
known as a standard technology use
for the protection of cyber
environment of an individual or any
organization. It is mainly known for
security culture which includes user
network, drives, software process,
information storage, application
security and system support which is
directly or indirectly connected to the
network. The prime objective of
cyber security is to reduce
continuously growing cyber risks and
cyber threats.
Cyber security technology consists of
a collection of tools, policies,
security concepts, risk management,
actions, and training. The technology
tracks protected networks, data
security from data attack, along with
cyber security and physical security.
The core functionality of cyber-
security is based on techniques
involved protecting information and
system from cyber threats.
How Cyber Security came into
Existence?
As with the history, cyber security
has huge network background with
its own findings and technology
aspects. In the early 1990s, a
research on information security and
policy was been introduced where
information was in the form of
accuracy and based on system
awareness. Under 2016 survey, 70%
of the organizations in the US were
adopted by US Security survey
which is comprised of NIFT
(National Institute of Standards
and Technology)
Cyber-security framework.
Origins of Cyber Security Platform
Cyber security is defined as a
package of safety solutions which
provides major security processes.
There are many sectors which are
consuming cyber security platform as
its major functionality for web
service network. The fundamentals
of cyber security process are,
Ÿ Application Security
Ÿ Information Security
Ÿ Network Security
Ÿ Operational Security
Ÿ Application security is covered
with technology that measures the
feasibility of the application by
finding, fixing and preventing
security exposers. There are
different techniques which are
being used as security platform to
emphasize safety at different
stages of the application cycle.
Application cycle includes
different segments such as design,
development, deployment,
upgrade, and maintenance. The
standard of security process is
consequently changing and
application cycle has also a
different process with different
standardization.
Techniques used in application
security are mainly focused on
its exposer of the application
security. Whitebox security is
used for reviewing the source
code and noticing security flaws
of the application through
manual functionality. Blackbox
security audit is used for testing
security functions where source
code is not needed.
Design review is used as an
application of threat model, and
works before the code is written.
And Tooling is the technique
which includes automated tools
that test security flaws with
higher positive rate.
Ÿ Information security is a core
source of information which is
confidential, integrated and easily
available. The primary focus of
this security process is to the
stable data protection while
maintaining a focus on efficient
policy application. Risk
management process is achieved
by identifying assets, threat
sources, and vulnerabilities and is
also followed by the effectiveness
of the risk management plan.
Information security mainly
works on confidential information
which is highly entitled to the
process.
Ÿ Network security sets a variety
of computer networks, used in
both public and private sector. It
also includes conducting
transactions and build
communications among
businesses, government agencies,
and individuals. All networks are
divided into two sections, private
network and public network.
Private networking is used
within the company and public
network access relates to the
open source network. This
security culture is highly
involved in most of the
companies, enterprises, and other
types of institutions. It is mainly
used for protecting and
overseeing the operations. The
Securing Future
23|May 2019
network resource is relatively protected by assigning
a unique name and a corresponding password. The
process is concerned with authentication of
username and password which implements its
security concept.
Ÿ Operational security is a process that identifies
information which is critical and easy to determine by
competitor intelligence. It protects individual piece of
data that could be grouped together to give a proper
set of information. It includes critical information
essential for military commanders, senior leaders, and
higher management. The whole process also includes
technical and non-technical measures such as, use of
email encryption software, taking precautions against
spying data and securing confidential information not
to be shared on social media platform.
Operational security is a five-step process which
assists any organization to specify required
information,
Ÿ Identification of critical information
Ÿ Analysis of threats
Ÿ Analysis of Vulnerabilities
Ÿ Assessment of Risk.
Securing Organization Processes
Cyber security process plays a crucial role to impact
information security of the organization. It also explores
the “Relationship between Organization Culture and
Information Security Culture” and contributes into the
organization’s protection as well as maintains all kind of
information. Security process is a never-ending process
in which information is used as a resource tool to
manage statistics security culture.
The security process served five-step processes including
pre-evaluation, strategic planning, operative planning,
and implementation. The pre-evaluation process
identifies the awareness of information security within
employees in the organization. Strategic Planning offers
healthier awareness program where target gets sets
according to the grouping of people. Operative Planning
provides good security process which can be established
based on internal communication, security awareness,
and a training program. Implementation is four stage
process used as security process to implement
information. The process is used for management,
communication with organizational members, and
current employees.
Enhancing Future with Cyber Security
Cyber security is aggressively contributing to the IT field
concerned with reducing organization’s risk and data
break. According to research in 2016, 46% of
organizations carry problematic shortage of cyber
security, and is increased by 28% compared to 2015.
Also, government, commercial and non-governmental
organizations use cyber security for better and secure
platform.
The demand for cyber security is increasing rapidly as
professional security worker in all industries are
managing the volume of consumer data of finance,
healthcare, and retail. However, the use of the term
“cyber security” is more popular in all industrial areas
that will help organizations with security process culture.
Conclusion
Cyber security is equally important for local, state, and
central government as these organizations maintains a
huge amount of confidential data and records concerning
the country and its citizens. Yet there are many
government and commercial organizations that face
difficulties in protecting the confidential data due to lack
of inadequate secured infrastructure, and lack of security
awareness.
24 |May 2019
The most ethical companies to watch 2019
“ “We have the power
to change the world for
the better by just being
careful in what we buy.
Choose slow fashion.
Offering Quality Clothing whilst
Sustaining the Environment
Nieves Ruiz Ramos (Snow)
Founder
BIBICO
26 |May 2019
The Most
to watch 2019
ounded in 2009, BIBCO is an award winning
Fwomen’s ethical clothing label that specializes
designing women’s clothing made from quality
natural materials. Bibico’s collection is produced in fair
trade certified cooperatives. Designed by Nieves Ruiz
Ramos (Snow), the Founder of BIBICO and made
ethically by producers she knows and trust. The company’s
vision is to push the fashion industry in a more sustainable
and ethical direction, where success is based on more than
just offering the cheapest price, a direction that not only
values beautiful designs, but the producer and the planet
just as much as the end consumer.
BIBICO values the safety and well-being of its producers
and takes seriously its environmental impact. Its two main
producers are certified by the WFTO (World Fair Trade
Organization) who audit its members regularly, checking to
see if the suppliers are meeting with the 10 Fair Trade
principles set out by the WFTO including fair payment,
good working conditions, no child or forced labor. In
addition, the company meets with its suppliers once a year
to check that these principles are being upheld.
Sustaining Quality
In terms of its commitment to the environment BIBICO
always tries to use sustainable fabrics where it can. For
example it uses GOTS certified organic cotton which means
no chemicals are used in its production. The company has
recently added Tencel to its collections, a fabric made from
regenerated wood cellulose.
In order to highlight the impact of fabric choices on
environment, Snow refers to an important statement from
the report of International Union For Conservation Of
Nature, that is, “Clothes and textiles are a major source of
primary micro plastic to the oceans, accounting for 35% of
the global total.”. These micro plastics come from the
synthetic fibres used to make clothes. Fast fashion has
heralded a huge growth of cheaper clothes that use
synthetic fabrics which in turn has heavily contributed to
the influx of micro plastics in the oceans. At BIBICO less
than 5% of all of the collections include synthetic fabrics
and the rest is made from natural, biodegradable fabrics.
The company’s aim is exclude all synthetic fibres from our
clothing thereby becoming plastic free by 2020.
From the first Sketch
The Idea behind BIBICO originated by Snow when walked
through the door of the women’s cooperative in Mumbai.
She realized that her idea of creating a more sustainable
clothing company was going to be possible. Inspired by the
things that matter to her the most including her love of the
outdoors, simple, family pleasures and her home in
Northern Spain, she sat down to sketch her first Bibico
collection.
However, the journey of BIBICO started a year before
when Snow and her husband Tim had taken a holiday in a
small farmhouse in Menorca, Spain. She had been
designing for major clothing brands for over 10 years and
had become disillusioned by the industry and how it had
changed in 10 years from producing 4 collections per year
to churning out new collections every week. The clothes
were cheaper but the quality was worse and there was no
consideration for the people producing these clothes.
Snow’s background designing for some of the world’s
leading high street retailers has allowed her to create
collections that appeal to so many customers. She also
maintains close relationships with suppliers and as
mentioned above, visits them at least once every year.
Overcoming Adversities
Adapting the ethical approach of production has been quite
challenging for BIBICO. The company is aware of the
consequences of producing certain items at a cheaper price
with other suppliers, or by using cheaper synthetic materials
that are bad for the planet rather than sustainable or natural
fabrics. Hence it is not interested in short term gains.
BIBICO describes itself as a “slow fashion company”
which means it is focused on producing clothing in a more
sustainable way. This may mean producing less but it also
means producing better quality garments. Consumers are
starting to wake up to the fact that over consumption is
having a huge effect on the planet.
Aspiring a Better Future
BIBICO believes that there is a growing consumer
movement for brands to become more transparent. Recent
changes in the industry have highlighted the need of brands
and retailers to improve working conditions for the people
who make their clothes. Since its launch BIBICO has been
one of the main supporters of improving the lives and well-
being of garment workers so its long term growth is
nurturing and growing this transparency. This will also
enable growth of brands that are doing the right thing.
Emblem of Excellence
“Love your company’s ethics and will keep being repeat
customer.” – Tanya
“Your clothing range is exactly what I’ve been looking for.
It’s smart, classic designs and supports fair trade. I’m past
this fast fashion mentality. I want my clothing to last more
than one season.” – Louise
27|May 2019
The most ethical companies to watch 2019
The most ethical companies to watch 2019
Dr Danil Korchagin is an
innovator and senior expert in
ICT. He specialises in signal
processing, data analysis and
software engineering. Having
worked for industries,
organisations and academia,
Danil Korchagin has
comprehensive experience in
both the industrial and
academic worlds. He has
managed many ICT projects
with outstanding performance
outcomes. He is founder of
Aicue.
About the Author
Dr Danil Korchagin
Founder
Aicue
30 |May 2019
Danil Korchagin set up Aicue,
a technology company that
targets to change the way
audience videos are consumed on the
web, in 2011. In this article, he
shares his point of view on ongoing
fourth industrial revolution and its
impact on everyday life.
We live in amazing time of fourth
industrial revolution. The industrial
revolution surpasses the scope of
ICT, transforms the world and
businesses, jobs and life styles. The
concepts such as digital
transformation, artificial intelligence
and connected objects, incarnated
into smartphones, are already hiding
in our pockets. The self-driving cars
leave science fiction and arrive into
reality. The old professions go into
oblivion and get replaced by new
exciting jobs.
The artificial intelligence based
solutions are already present in many
cross-domains and quite often used
by professionals and businesses to
smarter use time and improve
productivity. These solutions can
manage financial portfolios and
decrypt genetic code, pilot robots and
drive cars, entertain people and even
be creative. As an example, the
cliperie.com platform creates new
compelling clips by automatically
linking audience videos all together
from big data cloud.
The big data becomes de facto fuel
of XXI century and industrial
revolution. The amount of
information, which is being gathered
and transmitted by digital gadgets,
sensors and internet of things,
surpasses any imagination.
Constantly increasing and improving
population of digital objects results
in constantly improving quantity and
quality of data, while the next 5G
mobile networks are going to take
care about increasing digital data
traffic. The big data surrounds us and
helps to come up with efficient
solutions.
There are already more than fifteen
billion connected objects worldwide.
The population of connected devices
will surpass fifty billions in less than
five years. The internet of things,
network of connected devices, is
already present in commercial and
LivingThrough
Industrial
Revolution
Fourth
Expert’s Outlook
31|May 2019
industrial, consumer and infrastructure areas: from
connected wearable heart monitor wristbands to
connected pullovers, from connected security cameras to
connected alarms, from connected parking lot sensors to
connected displays of available places.
The internet of things in turn enables smart tiers of
technologies as smart homes, smart parking, smart traffic
control and smart cities. The smart home hubs control
communication among connected thermostats and stores,
heating systems and other connected objects to enable
home automation, energy savings and higher quality of
life. The smart cities enable to reduce traffic jams and
adjust public transportation in real-time, tighten security
control and predict unforeseen events, reduce noise
pollution and improve air quality.
Constantly connected digital gadgets continue to pull
further more people from reality to social networks and
virtual worlds. The choice of remote communication
still outfights real life communication. The picture of the
family together with each member navigating within its
own virtual world on smartphone starts to be everyday
occurrence. The same picture can be observed in the
trains, airports and other places. However, some people
started to apply reasonable moderation.
Even when people put away connected gadgets and back
to physical world, the following interaction might be
with nearby humanoid robot. Powered with same
artificial intelligence as their virtual compatriots, they
can follow conversations, understand individual social
signals and respond appropriately. Their social
interaction ability keeps improving, making future
humanoid robots irreplaceable companions and assistants
in nursing homes and hospitals, hotels and
commercial stores.
The industrial robots are separate topic. The global
robot density in the manufacturing industries is
accelerating around the world and there is already at
least one industrial robot per 100 working people in
more than 20 countries worldwide. The ongoing trend to
automate production helps industries to be more
competitive on the global market and has positive impact
on job market in many countries due to manufacturing
stays at home instead of being moved overseas.
The tangible shift in professions happens with all
industrial revolutions. The current one is not an
exception. Some professions get automated, freeing up
people to do new tasks: data management, data
interpretation, digital marketing management, robot
supervision, process control, process moderation,
intervention in unforeseen situations, quality control and
so on. The automated places can enable work week
reduction and equilibrate shift in social insurances
caused by increasing life expectancy.
The advances in technologies enable to process more
data with less energy and smarter use available
resources. The paradox in our society is that the focus
still stays on profitability and growth over durability and
climate sustainability. As consequence, the digital
footprint on global energy consumption keeps
increasing from year to year and can reach one fifth by
2030, regardless it is feasible to pursue industrial
revolution at moderate pace within fixed energetic
envelope until there is an excess of renewable energy.
The years will pass. The artificial intelligence, big data
and internet of things will become ordinary tools in
many areas of our life just like electricity and telephones,
internet and personal computers did during previous
industrial revolutions. No one will be questioning them
anymore. They stay under human control. The human
society is free to decide up to which extent new
technologies and innovations have to be validated,
regulated and certified for future everyday use.
32 |May 2019
The most ethical companies to watch 2019
serves as the foundation to its Leadership Agenda.
Everyone who wants to form part of its corporate family
should voluntary commit to live by these values, both in
and out of the company. Cementos uses compliance
management software called Convercent that helps it
integrate compliance risks, disclosures, and policies with
day to day operations. Annually, its employees reaffirm
their commitment to its COVEC through Convercent.
To encourage a safe environment and protect employee
wellbeing, the company has a completely anonymous
complaint line for those who wish to report incidents
without placing their privacy at risk. This model of
anonymous reporting applies to everyone in the company,
from the CEO to the entry level employee.
An All Encompassing CEO
Jose Raul Gonzalez is the CEO of Cementos Progreso.
Before joining Progreso he had a 17 year career as CFO of
CBC, the Pepsi Cola anchor bottler for Central America and
the Caribbean where he participated in the design and
execution of the regional expansion of the company. He is a
member of the Board of Trustees of Universidad Francisco
Marroquin where he lectures in economics and is a former
Dean of the School of Economics and the Business School.
He serves in the Board of Directors of the National Center
for Economic Research, a Guatemalan think tank dedicated
to implement social and economic policies and also serves
in the Board of Directors of FICEM, the Ibero-American
Federation of Cement. Jose holds a B.A. in Business
Administration from Universidad Francisco Marroquin in
Guatemala and an MBA in Finance and Economics from
the University of Rochester, N.Y.
ementos Progreso
C
is a Guatemalan
company that endeavors to be
exemplary in the construction
industry. Since it’s founding the organization
has been managed according to strong family
values including ethical behavior and
leadership, solidarity with the community and
a commitment to long term sustainability.
Cementos is characterized by its high-quality
standards in the production and
commercialization of cement, lime, and other
construction materials and services.
Additionally, it partners with communities to
participate in the development and
implementation of projects that improve their
quality of life. Environmental programs that
foster conservation in the areas the company
serves are a key component of its social
responsibility.
Values are Blueprints
Cementos Progreso has a Code of Values,
Ethics and Conduct (known as COVEC),
which represents the values which have guided
the company since its establishment over a
century ago. Every employee should
demonstrate full commitment to achieving its
operational and financial goals with
accountability and minimum tolerance to
failure.
The company believes that its values are the
blueprints by which it measures its actions and
Cementos
Progreso
Promoting Business Ethics Globally
The Most
to watch 2019
34 |May 2019
Leading the Industry Since 1899
Cementos Progreso was founded by Carlos F.
Novella, the son of Italian and German
immigrants, in 1899. After graduating as an
engineer in Belgium, he returned to his home
country of Guatemala and decided to
manufacture and sell a product not yet known
in the country, cement. At first, he struggled to
demonstrate the relevance and advantages of
using this new product, but succeeded after
this new product became the cornerstone for
construction.
Long before Corporate Social Responsibility
became popular, his company made significant
contributions to the development of
Guatemalan society by providing medical
services for his workers and their families,
schools for their children, above average
salaries, training in occupational safety and a
deep sense of ethics. Such is the heritage of
those who have the privilege to belong to this
organization.
A century later, Cementos Progreso is an
industry leader renowned for its sound
corporate practices, and a commitment to
safety and the environment. Those efforts have
been recognized by different organizations
such as the British Safety Council or the Great
Place to Work Institute. Furthermore,
Cementos Progreso made history as the first
Guatemalan company to join the UN Global
Compact.
Global Recognition
Cementos Progreso’s Code of Values, Ethic
and Conduct dates back to its origins and
represents the values with which its founder
lived. This has allowed the company to forge a
corporate culture that has led it to stand out for
its ethics. Since 2014, the Ethisphere Institute,
an independent center of research promoting
best practices in corporate ethics and
governance, has recognized Cementos
Progreso as one of the World´s Most Ethical
Companies for exemplifying and advancing
corporate citizenship, transparency and the
standards of integrity. This accolade is the
result of years of commitment at all levels of
the company.
Ethical Approach
According to Cementos Progreso, in this modern financial world where
shareholders own and sell companies at the speed of light, family owned
companies are a rare species and interesting sociological phenomena. In
the troubled environment in which Latin America now finds itself,
privately held companies also perform a valuable yet little known and
seldom appreciated function as they work as a “moral reserve”.
Since the company expects its employees to practice the COVEC in all
areas of their life, it believes that there is an important multiplier effect in
its society. Its colleagues are encouraged to share this behavior code with
their families, their communities and their leaders. It is not unusual for a
Cementos Progreso worker to be identified with these values and become
a moral leader in his or her community.
Together we build
the country where
we want to live in.
Jose Raul Gonzalez
CEO
Cementos Progreso
35|May 2019
ovember 3, 1988, is considered as a turning point
Nin the world of Internet. 25 Years ago a Cornell
University graduate student created first computer
worm on the Internet, “Morris Worm.” The Morris worm
was not a destructive worm, but it permanently changed the
culture of the Internet. Before Morris unleashed his worm,
the Internet was like a small town where people thought
little of leaving their doors unlocked. Internet security was
seen as a mostly theoretical problem, and software vendors
treated security flaws as a low priority.
Today, there is a paradigm shift, Morris worm was
motivated more by intellectual curiosity than malice, but it
is not the case today. According to a 2015 Report, 71% of
represented organizations experienced, at least, one
successful cyber attack in the preceding 12 months (up
from 62% the year prior).
According to survey report, discloses that, among 5500
companies in 26 countries around the world, 90% of
businesses admitted a security incident. Additionally, 46%
of the firms lost sensitive data due to an internal or external
security threat. On average enterprises pay US$551,000 to
recover from a security breach. Small and Medium business
spend 38K.
Incidents involving the security failure of a third-party
contractor, fraud by employees, cyber espionage, and
network intrusion appear to be the most damaging for large
enterprises, with average total losses significantly above
other types of the security incident.
Let’s Take a Look at Recurrent Security Threats Types-
Denial of Service Attacks
A denial of service (DoS) attack is an incident in which a
user or organization is deprived of the services of a resource
they would normally expect to have. These attacks are very
common, accounting for more than one-third of all network
attacks reviewed in the report. A standard approach is to
overload the resource with illegitimate requests for service.
Brute Force Attacks
Brute force attack tries to kick down the front door. It’s a
trial-and-error attempt to guess a system’s password. The
Brute Force Attack password cracker software simply uses
all possible combinations to figure out passwords for a
computer or a network server. It is simple and does not
employ any inventive techniques.
Identity Spoofing
IP spoofing, also known as IP address forgery. The hijacker
obtains the IP address of a legitimate host and alters packet
headers so that the regular host appears to be the source. An
attacker might also use special programs to construct IP
packets that seem to originate from valid addresses inside
the corporate intranet.
Browser Attacks
Browser-based attacks target end users who are browsing
Threats
NETWORK SECURITY
Threats

SolutionsSolutions
March 2019|36
the internet which in turn can spread in the whole enterprise
network. The attacks may encourage them to unwittingly
download malware disguised as a fake software update or
application. Malicious and compromised websites can also
force malware onto visitors’ systems.
SSL/TLS Attacks
Transport layer security (TLS) ensures the integrity of data
transmitted between two parties (server and client) and also
provides strong authentication for both sides. SSL/TLS
attacks aim to intercept data that is sent over an encrypted
connection. A successful attack enables access to the
unencrypted information. Secure Sockets Layer (SSL)
attacks were more widespread in late 2014, but they remain
prominent today, accounting for 6% of all network attacks
analyzed.
Network Security is an essential element in any
organization’s network infrastructure. Companies are
boosting their investments in proactive control and threat
intelligence services, along with better wireless security,
next-generation firewalls and increasingly advanced
malware detection. The U.S. Federal Government has
spent $100 billion on cyber security over the past decade,
$14 billion budgeted for 2016.
Increased use of technology helps enterprises to maintain
the competitive edge, most businesses are required to
employ IT security personnel full-time to ensure networks
are shielded from the rapidly growing industry of cyber
crime. Following are the methods used by security
specialists to full proof enterprise network system-
Penetration Testing
Penetration testing is a form of hacking which network
security professionals use as a tool to test a network for any
vulnerabilities. During penetration testing IT professionals
use the same methods that hackers use to exploit a network
to identify network security breaches.
Intrusion Detection
Intrusion detection systems are capable of identifying
suspicious activities or acts of unauthorized access over an
enterprise network. The examination includes a malware
scan, review of general network activity, system
vulnerability check, illegal program check, file settings
monitoring, and any other activities that are out of the
ordinary.
Network Access Control
Network Access Controls are delivered using different
methods to control network access by the end user. NACs
offer a defined security policy which is supported by a
network access server that provides the necessary access
authentication and authorization.
Network Security is a race against threats, and many
organizations are a part of this race to help enterprises to
37|May 2019
Editor’s Prespectives
secure their network systems. Organizations like IBM, Symantec, Microsoft have created solutions to counter the global
problem of network security threat. These cutting-edge products show genuine promise and are already being used by
enlightened companies.
Good Network Security Solutions Traits
A real security solution should have four major characteristics;
Detect Threats
Targeted attacks are multi-faceted and specially designed to evade many point technologies attempting to identify and
block them. Once they are inside, the only way to find these cyber threats is to understand the behavior of the individual
attack components and use analytics to understand their relationships.
Respond Continuously
Today it is not important that an organization will be attacked, but important and more crucial is to identify when and
how much they can limit the impact and contain their exposure. This means having the capability to respond quickly
once the initial incident has been discovered.
Prevent Attacks
Malware is gettings quick-witted day by day. They utilize heuristics to change their code dynamically. A capable
solution should have an adaptive architecture that evolves with the changing environment, and threats today’s business
faces.
Integration
Today’s threats have multiple facets, and a single software or solution is not sufficient. Protection system should have
the capability to integrate with other security tools from different vendors to work together as a single protection system,
acting as connective tissue for today’s disjointed cyber security infrastructure.
Solutions In Market
Like infectious diseases, cyber threats will never be eradicated entirely, but they can be better contained and understood,
and their effects minimized. How can this be achieved? IBM has built an enterprise-level “immune system,” an adaptive
security architecture to battle today’s cyber pathogens. IBM has developed a vast fleet of products, QRadar, X-Force
Threat Intelligence, Trusteer Pinpoint Malware Detection, IBM Threat Protection System a dynamic, integrated system
to meddle the lifecycle of advanced attacks and prevent loss.
The IBM Threat Protection System integrates with 450 security tools from over 100 vendors acting as connective tissue
for today’s disjointed cyber security infrastructure.
Symantec is another major player in catering enterprise network security systems with Symantec Advanced Threat
Protection. Symantec ATP operates via a single console and works across endpoints, networks, and emails, integrating
with Symantec Endpoint Protection (SEP), and Symantec Email Security cloud, which means organizations do not need
to deploy any new endpoint agents. Symantec says, ATP is the only threat protection appliance that can work with all
three sensors without requiring additional endpoint agents. With ATP, Symantec’s goal is to deliver end-to-end threat
protection, prevention, detection, and response in a single pane of glass, offering more value to businesses than
individual point products can provide. Symantec Advanced Threat Protection combines multiple layers of prevention,
detection, and response.
March 2019|38
The most ethical companies to watch 2019
The most ethical companies to watch 2019
The most ethical companies to watch 2019
The most ethical companies to watch 2019

More Related Content

The most ethical companies to watch 2019

  • 1. Offering World-Class Electronic Measurement Solutions and Services May 2019 Vol- 5 Issue- 2 The Most to watch 2019 Editor’s Prespective Securing Future
  • 4. e cannot deny the fact that the ultimate goal of any business is profit. And the key to profit is customers. The Wtraditional belief suggests that the customer is king and companies do anything they can to satisfy their customers’ needs. However, there are few ethical boundaries which they must adhere to . These boundaries assert that a business must follow the code of conduct and practice fair trade while meeting its financial goals. It has been observed in the recent trends that customers prefer companies that are more ethical over the ones that are not. Moreover most enterprises that are on the top of the table in their respective spaces are highly ethical. In order to follow the business ethics, a company must have a strong leadership. If the leaders understand their values well and have the ability to choose being ethically responsible over profit or gain, then it ripples across the organization and creates the foundation of an ethical culture. However, an enterprise does not become ethical overnight by following some textbook guidelines. These values must be rooted in the mission and the vision of the company. Every organization has some values that define it and keeps it together. Business ethics should be one of them. C.S. Lewis defines Integrity as “Integrity is doing the right thing even when no one is looking.” and I believe it couldn’t be defined better than this. A company must be transparent to its employees, business associates and other concerned parties. Building trust among them is one of the most significant practices for the company. Loyalty towards customers is one of the most important features of business ethics. Lets take a small example to understand how it benefits the company. In business, there is a certain cost of acquiring a new customer. Similarly, there is a certain cost of retaining one. The cost of retaining a customer is far less than acquiring one. However, there comes a time in the life cycle of the customer when retaining him/her becomes loss making for the company. Usually the companies stop retaining the customers after this point. This costs them their goodwill. An ethical company remains loyal to its customers as long as the customer is associated. Standardizing Business Ethics
  • 5. There are several companies that have raised the standards of business practices in their respective fields by exercising business ethics and making it an important aspect for running business. Insights Success acknowledges these companies by shortlisting “The Most Ethical Companies to watch, 2019”. Featuring as our cover story is Keysight Technologies, a company that has the broadest range of products in the industry to accelerate deployment of its customers new technologies. Keysight reflects its rich heritage - a direct line from both Hewlett- Packard’s standards of integrity and innovation and Agilent’s premier measurement business. Alongside this, the magazine also includes Cementos Progreso, which produces and markets cement and other construction materials accompanied by services and high quality; BIBICO, a designer firm of beautiful easy-to-wear clothing made from quality natural & organic fabrics; and Beaumont Organic, an international ethical ladies wear brand that combines signature styling with contemporary classics. Also, make sure to flip through articles, written by our in-house editorial team as well as CXO standpoints of notable industry personalities to have a brief taste of the sector. Let’s start reading! “ “ Shubham Khampariya
  • 6. Expert’s Outlook Living Through Fourth Industrial Revolution Leader’s Insights The Importance of an Undying Passion in Budding Entrepreneurs 08Cover Story Keysight Technologies 30 Offering World-Class Electronic Measurement Solutions and Services 16
  • 7. CONENTS Beaumont Organic Providing Meaning to Sustainable Living! BIBICO Offering Quality Clothing whilst Sustaining the Environment Cementos Progreso Promoting Business Ethics Globally Editor’s Prespective Network Security Threats and Soloution BIBICO Offering Quality Clothing whilst Sustaining the Environment Cementos Progreso Promoting Business Ethics Globally 18 3426 Securing Future Cyber Security Secure Your Network with Intelligence 36 Articles 22
  • 9. sales@insightssuccess.com May, 2019 Editor-in-Chief Senior Sales Manager Business Development Manager Marketing Manager Technical Head Technical Specialist Digital Marketing Manager Research Analyst Database Management Technology Consultant Pooja M. Bansal Managing Editor Anish Miller Executive Editor Shubham Khampariya Assistant Editors Jenny Fernandes Bhushan Kadam Visualizer David King Art & Design Director Amol Kamble Associate Designer Kushagra Gupta Kshitij Shrivatsav Peter Collins John Matthew Sales Executives David, Kevin, Mark, Avadhut Business Development Executives Steve, Joe, Alan, AnupJacob Smile Aditya Marry D'Souza SME-SMO Executive Prashant Chevale Patrick James Circulation Manager Robert Brown Stella Andrew David Stokes Asha Bhange Co-designer Copyright © 2019 Insights Success, All rights reserved. The content and images used in this magazine should not be reproduced or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior permission from Insights Success. Reprint rights remain solely with Insights Success. Follow us on : www.facebook.com/insightssuccess/ www.twitter.com/insightssuccess We are also available on : Insights Success Media Tech LLC 555 Metro Place North, Suite 100, Dublin, OH 43017, United States Phone - (614)-602-1754 Email: info@insightssuccess.com For Subscription: www.insightssuccess.com Insights Success Media and Technology Pvt. Ltd. Off. No. 22 & 510, 5th Flr., Rainbow Plaza, Shivar Chowk, Pimple Saudagar, Pune, Maharashtra 411017 Phone - India: +91 7410079881/ 82/ 83/ 84/ 85 Email: info@insightssuccess.in For Subscription: www.insightssuccess.in
  • 10. Ron Nersesian CEO & President Cover Story
  • 12. In an interview with Insights Success, the CEO and President of Keysight Technologies, Ron Nersesian, shares his key insights on various aspects of the company and how it contributes towards the industry by offering cutting edge solutions and services. He also discusses Keysight’s attainments and future endeavors. Below are the highlights from the interview conducted between Ron and Insights Success: Give a brief overview of your organization, its mission and vision? Keysight provides world-class electronic measurement capabilities to accelerate technology innovations that make the world more productive and a safer place to live. We offer an unmatched breadth and depth of measurement tools and expertise to meet the world’s critical requirements for electronic measurement. Keysight develops solutions that help bring electronic products to market faster from design simulation, to prototype validation, to manufacturing test, to optimization in networks and cloud environments. Our customers span the worldwide communications ecosystem, aerospace and defense, automotive and energy, semiconductor and general electronics end markets. What are the cutting-edge products/solutions offered by Keysight Technologies? Keysight is at the heart of innovation processes in key end markets and emerging technology trends such as 5G, connected and autonomous vehicles, E-Mobility, IoT, and high- speed datacenters. Innovations like these require considerable technology reinvention. That’s why at Keysight, we are innovating the invention process by streamlining workflows for software and hardware designers. As the market leading test and measurement company in the world, we offer end-to-end test equipment, solutions, and services to help design, validate, manufacture, and optimize these innovations. Wherever the signal goes, Keysight is there to accelerate development lifecycles. We see a lot of exciting growth areas across many markets. Let’s start with the promise of 5G. Like what the market experienced in 3G and 4G usage growth, 5G promises to connect over a billion new devices. That alone is exciting, but even more exciting is the attributes of those devices. Intermixed with more standard users will be billions of IoT devices each communicating small amounts of data, virtual and augmented reality systems requiring very fast connections, and connected cars moving at highway speeds. Getting there requires use of complex technologies such as millimeter wave frequencies for commercial communication along with dense waveform modulations, massive multiple-input multiple-output (MIMO) antenna techniques, and antenna beamforming, just to name a few. To test all this, we not only need to extend the capabilities of individual test platforms, but to build entire system solutions aimed at validating specific 5G design implementations. Keysight partners across the 5G ecosystem, including chipset makers, device designers, network equipment manufacturers, and service providers. We create tests to validate designs of individual features, specific products, or end-to-end networks. There are plenty of exciting technology challenges to go around in every part of the 5G ecosystem as each part pushes the boundaries of technical innovation. In terms of automotive, our customers are pushing the boundaries in battery manufacturing, power conversion and power loading in e-Mobility. They are also innovating longer range, higher- resolution radar and LIDAR sensors for autonomous driving and integrating e-Call services and broadening the data connections to make a truly connected car. In IoT, we are seeing an evolution from ’best effort’ applications to more ’mission critical’ applications that require higher reliability and more secure wireless connections. In data centers, we constantly see improvements in data connection speeds which now top 400 Gbps requiring a new generation of transceivers. In aerospace and defense, of course, our customers are always pushing the boundaries in sensors and communications. Describe the experiences or achievements that have shaped the journey of the company. I would say our biggest achievement was the rapid transformation from hardware-centric products to software- centric solutions. We realized that at each stage of development – design simulation, prototype validation, and production optimization – different teams create their own test parameters and analysis points. Traditionally, design simulation software tends to operate independently from prototype validation lab systems, which tend to operate independently from production test systems. With Keysight’s software platform, PathWave, design, test and analysis work from each stage can be shared with the next. This not only improves the design but saves a lot of time used to reinvent tests typical in most developments. PathWave allows our customers to accelerate innovation and product development from concept through manufacturing and deployment. It’s the industry’s first software platform to integrate design, test, measurement and analysis in a completely programmable environment. It combines design
  • 14. software, instrument control, and application- specific test software in an open development environment allowing users to create high- performance solutions fast. Keysight’s strong products combined with its talented employees and culture makes me incredibly excited for what the future holds, not only for our company but also for the technologies that advance the world. What influence over the company have you had as the CEO? I feel strongly that customers think in terms of finding solutions to their unique business and technical problems. They don’t think in terms of products to purchase. We transformed the company to address real-world business requirements in our customers’ target industries to deliver integrated solutions. This entailed a major transformation in how we were structured, how we engaged with customers, and in our go- to-market strategy. “Keysight’s vision is to build a better planet by accelerating innovation to connect and secure the world.”
  • 15. For example, in the past, we were organized around our products and internal capabilities. We shifted that to reflect the focus on our customers end ecosystems. This has allowed us to think about our customers first, about solving their challenges, and getting them to market faster. And for those customers who need expert assistance or want to outsource test altogether, we offer multiple services, including test-as-a-service locations around the world. The number of early engagements and partnerships we have forged with market-maker companies demonstrates that this strategy is working for us and for our customers. Does having an ethical approach affect your business strategies or growth of your company? Absolutely, at the highest level, our standards of business conduct, which every employee receives annual training on, provide a guidepost for managing our ethical governance across the company. From there, our environmental policies, employee benefits and diversity, responsible sourcing efforts, community philanthropy and volunteerism, as well as our solutions, support an end-to-end ethical workplace at Keysight. From individual employee responsibilities through corporate governance, our strategic and operational business management policies, procedures, and values provide operational transparency and business sustainability while meeting compliance requirements. I view this approach as having a direct impact on our incredible growth. We enable faster acquisition integration and new market entry through consistent programs and policies that meet global regulations and requirements across the company. We support employee hiring and development in growth areas, with future engineer development, employee diversity and benefits that also include philanthropy, volunteerism, STEM programs in elementary, middle, and high schools, and university relations in support of future workforce development. University research grants and engagements ensure we are positioned well for innovation. In addition, our remarketing solutions and used product sales through product quality and take-back programs support environmental sustainability while offering new revenue streams. How do you plan to sustain the ethical nature of your organization in the near future? Well, quite simply, to keep doing what we have been doing through our entrepreneurial and continuous improvement mindset. For 80 years as of January 2019 – first as part of Hewlett-Packard, then Agilent, and now Keysight, we have acknowledged our responsibility to deliver through ethical governance practices and help address global social and environmental challenges. Beyond just being the right thing to do, it is part of our company DNA going back to HP founders Bill Hewlett and Dave Packard. Our Keysight Leadership Model – which defines how the company continuously delivers greater value to customers, shareholders, and employees – has the same defined value set of social responsibility, accountability and uncompromising integrity. It is the philosophy that permeates every aspect of our operations and drives our innovation, speed, and excellence in execution. Beyond that, we support a continuous improvement mentality. So, while we will continue to do the great things we have always done, it is our mindset to improve wherever we can. From our Corporate Social Responsibility program that monitors opportunities in these areas, to every employee that looks to their own roles and functions for how to do things better through operational excellence and innovation.
  • 16. Address : Country :City : State : Zip : Global Subscription Date :Name : Telephone : Email : READ IT FIRST Never Miss an Issue Yes I would like to subscribe to Insights uccess Magazine., S SUBSCRIBE T O D A Y Che should be drawn in favor of:ck INSIGHTS SUCCESS MEDIA TECH LLC Insights Success Media Tech LLC 555 Metro Place North, Suite 100, Dublin, OH 43017, United States Phone (614)-602-1754,(302)-319-9947: Email: info@insightssuccess.com For Subscription: www.insightssuccess.com CORPORATE OFFICE
  • 18. The Importance of an Undying Passion in Budding Entrepreneurs Iwas at an event in San Francisco in 2014, when I heard a piece of advice that stuck in my mind ever since. At the time, when I considered the advice, I really wasn’t sure whether I was actually following it. However, since then, I have come to understand the significance of it. The speaker said, in relation to choosing what you work on: “If you’re going to climb a mountain, make sure it’s the right one” You spend much of the best part of your early life trying to understand yourself well enough to find the right mountain for you. You look for indicators; subjects you like at school, mentors whose advice particularly resonates, which exams you do well in, the clubs you join at university, the career paths of those more senior than you in our first job. But it’s hard – I rarely come across people who really have the conviction to absolutely know their mountain to climb through forward looking indicators alone. I started my career as an engineer. I joined a world leading Engineering and Project Management company which took me to projects in London, the US and the Middle East. I worked on some of the largest and most cutting edge mega-projects in the world. I quickly became a chartered civil engineer and project manager and it seemed like I was destined for a long and successful career in the industry. However, I wasn’t happy. Despite all the indicators pointing in a positive direction, I knew something wasn’t right. It was then that I got a call from my brother, to ask for help on a little project he was working on with some teacher friends of his. Fast forward a couple of years and I had left the Middle East, left my career, and founded a company called Pobble that would go on to change the lives of thousands of children all over the world. Now, every indicator would have told me that this was a risky, even crazy thing to do! In fact, the next 6 years that bought me to now, have been the most wonderful, painful, challenging, and rewarding years of my life. Entrepreneurship is truly a rollercoaster ride! When I reflect on that decision point 6 years ago though, it would have been impossible to have rationally decided to leave everything and start on a new path – I just knew in my gut that I had to do it! 4 years on I look back on that piece of advice and realise that I did pick the right mountain to climb. And there’s one indicator that I see above all else that convinces me that this is the case. The fact that I didn’t give up. When you are working on something that truly aligns with your passion, every challenge is just the next one to overcome as you progress along your journey to achieving your mission, giving up just isn’t an option! I’m often asked about the secret to successful entrepreneurship and I say two things; focus and resilience. When you are doing something that you love and that you believe in, no matter what the challenge, you keep going and make it happen. You keep going, when others would just give up. Also, despite all the chaos and challenge, you find the way to focus on taking the next best step forward in a sea of uncertainty. When you have the clarity of knowing where you are going on your journey you are able to focus on the right things. When I meet with new ideas and startups, it’s relatively 16 |May 2019
  • 19. easy to verify the market, the need and the solution – but much more important in my opinion is the reason for the founding team to be doing what they are doing. If this project aligns with their life’s mission, their “mountain”, then no matter how hard the challenge is, they will find a way to create the best path forward. Maybe they’ll fail for the many other reasons that startups fail, but they have the best chance if they have that personal commitment and passion to achieve success. Pobble has won many awards, gained significant investment, and continues to attract fantastic partners. However, at the end of the day all these things are by- products of one thing; every member of our amazing team has an incredibly strong belief in our mission and is passionate about giving teachers tools that will make their life easier and inspire and engage their children to make writing ridiculously exciting for them in school! Without this passion and our commitment to climb our mountain, none of this impact or achievement would be possible. Jon is Co-founder and CEO of award winning edtech venture Pobble. Pobble is used by tens of thousands of teachers each day to nd the best teaching resources, give pupils a global audience for their work, and to assess writing. Pobble has global acclaim, gaining endorsements from famous authors such as Michael Morpurgo, partnerships with organisations like the BBC, OUP and Microsoft, and investment from some the world's most prolic education focussed angel investors. After graduating with a Masters in Engineering Science from Trinity College, Oxford, Jon because a chartered Civil Engineer and Project Manager. Jon started Pobble with his brother and two other teachers in their spare time. They then went on to incubate Pobble whilst Jon studied for his MBA at London Business School. The fth co-founder (technical) joined Pobble from Jon's stream at London Business School. About the Author Jon Smith Founder & CEO Leader’s Insights 17|May 2019
  • 20. Paving the way for fashion to have a more sustainable future. “ “ Providing Meaning to Sustainable Living! Hannah Beaumont Laurencia Founder & Director The Most to watch 2019 18 |May 2019
  • 21. Sustainable living describes a lifestyle that attempts to reduce an individual’s or society’s use of the Earth’s natural resources, and one’s personal resources.- Wiki Founded in 2008, Beaumont Organic is a pioneering conscious clothing brand that combines signature styling with contemporary classics using luxury organic, fair trade and eco fabrics. As a clothing brand, Beaumont is paving the way for fashion to have a more sustainable future. The organization does this by creating contemporary conscious clothing for the modern woman. Its vision is to be a brand people are proud to be wearing and be associated with, producing timeless clothing that will last a lifetime with care from its customers. Beaumont is inspired by the thought of making changes and paving a way for fashion to have a more sustainable future. The brand execute this by asking questions, producing ethically, reducing wastage, using off-cuts where it can for sampling and keeping consumption low. Making Sustainable Living Mainstream Beaumont Organic was founded before the term ‘sustainable living’ was so commonly discussed. Hence, during its initial period building the brand was challenging and the leaders had to educate clients on the need for conscious clothing. When it comes to achievements, Beaumont has already been received various awards, recognitions and signed agents in countries that believe in sustainable living, and are passionate about the product and capabilities. Also when it comes to preserving the intactness of organizational ethics, Beaumont Organic has made sure that it uses GOT’s certified organic cotton in order to produce its clothing. Being responsible is also part of the process to preserve its ethics. Working towards reducing waste by using off-cuts for sampling and holding sample sales, to make use of its waste wherever possible Beaumont ensures its ethics are preserved. Advocating Sustainability The Director and Founder of Beaumont Organic Hannah Beaumont Laurencia is an advocate of sustainability. She passionately believes in slow sustainable living. She claims the mindset of slow conscious living must be transmitted through every part of her and Beaumont Organic’s business philosophies. It is important to believe in something yourself, when trying to encourage others to follow the same path, and particularly for the business to continue to grow and remain ethical. Since the day she could walk, Hannah loved to travel and was spoiled with wonderful holidays, including cultural trips to Washington DC, magical weeks at Disneyland, etc. In her late teen days Hannah visited a truly developing country for the first time. Living in a hut with corrugated metal roof, infested with all kinds of insects and wildlife, no hot water and an outside toilet helped Hannah to understand the value that travel can bring to a person. During her tenure in Fiji, she became more grounded and self-sufficient. For Hannah it was a life changing experience but the thing that has stayed with her the longest is not the living standards, it is the love and happiness that the people of Fiji have and the gratitude they have for the simplest things. Encouraging Others to Follow Steps When it comes to sustaining the ethical nature of the organization, Beaumont is writing new policies within the company at the moment to ensure as it grows and takes more staff onboard, that the correct training is given to them and they knows what Beaumont’s value and ethics are. With the continuous growth of the organization, it is continuing to build on its relationships with suppliers, as well as forming new relationships who all believe in sustainability and will continue working with Beaumont in the future. The company also believes that, having an ethical approach doesn’t affect anything within the business; it is just the way it works. It is normal for Beaumont Organic to do things in an ethical way and encourage others to follow in its steps; it allows the company to educate its customers and gives them the choice to be sustainable and conscious with their clothing. Client Feedback “Beaumont Organic offers consistently outstanding quality, beautiful fabrics and excellent customer service. Hannah is brilliant at listening to feedback and using this to move the collections forward in the right direction season after season.” (Vanessa Collen – Managing Director of Collen & Clare) “We have been working with Beaumont Organic for many years now and admire how Hannah has grown her brand whilst remaining true to her vision throughout. The clothes offer timeless soft wear ability and have a clear handwriting. A personal and proper brand.” (Amy Hall – Director of Hall & Co) “It has always been a pleasure working with Hannah and her team at Beaumont Organic. The fabrics are really beautiful and the designs are consistently unique, showcasing modern cuts.” (Anna Atwal – Director of PAD Lifestyle) 19|May 2019
  • 25. At present, cyber security is playing a vital role in the digital world and it is also known as a standard technology use for the protection of cyber environment of an individual or any organization. It is mainly known for security culture which includes user network, drives, software process, information storage, application security and system support which is directly or indirectly connected to the network. The prime objective of cyber security is to reduce continuously growing cyber risks and cyber threats. Cyber security technology consists of a collection of tools, policies, security concepts, risk management, actions, and training. The technology tracks protected networks, data security from data attack, along with cyber security and physical security. The core functionality of cyber- security is based on techniques involved protecting information and system from cyber threats. How Cyber Security came into Existence? As with the history, cyber security has huge network background with its own findings and technology aspects. In the early 1990s, a research on information security and policy was been introduced where information was in the form of accuracy and based on system awareness. Under 2016 survey, 70% of the organizations in the US were adopted by US Security survey which is comprised of NIFT (National Institute of Standards and Technology) Cyber-security framework. Origins of Cyber Security Platform Cyber security is defined as a package of safety solutions which provides major security processes. There are many sectors which are consuming cyber security platform as its major functionality for web service network. The fundamentals of cyber security process are, Ÿ Application Security Ÿ Information Security Ÿ Network Security Ÿ Operational Security Ÿ Application security is covered with technology that measures the feasibility of the application by finding, fixing and preventing security exposers. There are different techniques which are being used as security platform to emphasize safety at different stages of the application cycle. Application cycle includes different segments such as design, development, deployment, upgrade, and maintenance. The standard of security process is consequently changing and application cycle has also a different process with different standardization. Techniques used in application security are mainly focused on its exposer of the application security. Whitebox security is used for reviewing the source code and noticing security flaws of the application through manual functionality. Blackbox security audit is used for testing security functions where source code is not needed. Design review is used as an application of threat model, and works before the code is written. And Tooling is the technique which includes automated tools that test security flaws with higher positive rate. Ÿ Information security is a core source of information which is confidential, integrated and easily available. The primary focus of this security process is to the stable data protection while maintaining a focus on efficient policy application. Risk management process is achieved by identifying assets, threat sources, and vulnerabilities and is also followed by the effectiveness of the risk management plan. Information security mainly works on confidential information which is highly entitled to the process. Ÿ Network security sets a variety of computer networks, used in both public and private sector. It also includes conducting transactions and build communications among businesses, government agencies, and individuals. All networks are divided into two sections, private network and public network. Private networking is used within the company and public network access relates to the open source network. This security culture is highly involved in most of the companies, enterprises, and other types of institutions. It is mainly used for protecting and overseeing the operations. The Securing Future 23|May 2019
  • 26. network resource is relatively protected by assigning a unique name and a corresponding password. The process is concerned with authentication of username and password which implements its security concept. Ÿ Operational security is a process that identifies information which is critical and easy to determine by competitor intelligence. It protects individual piece of data that could be grouped together to give a proper set of information. It includes critical information essential for military commanders, senior leaders, and higher management. The whole process also includes technical and non-technical measures such as, use of email encryption software, taking precautions against spying data and securing confidential information not to be shared on social media platform. Operational security is a five-step process which assists any organization to specify required information, Ÿ Identification of critical information Ÿ Analysis of threats Ÿ Analysis of Vulnerabilities Ÿ Assessment of Risk. Securing Organization Processes Cyber security process plays a crucial role to impact information security of the organization. It also explores the “Relationship between Organization Culture and Information Security Culture” and contributes into the organization’s protection as well as maintains all kind of information. Security process is a never-ending process in which information is used as a resource tool to manage statistics security culture. The security process served five-step processes including pre-evaluation, strategic planning, operative planning, and implementation. The pre-evaluation process identifies the awareness of information security within employees in the organization. Strategic Planning offers healthier awareness program where target gets sets according to the grouping of people. Operative Planning provides good security process which can be established based on internal communication, security awareness, and a training program. Implementation is four stage process used as security process to implement information. The process is used for management, communication with organizational members, and current employees. Enhancing Future with Cyber Security Cyber security is aggressively contributing to the IT field concerned with reducing organization’s risk and data break. According to research in 2016, 46% of organizations carry problematic shortage of cyber security, and is increased by 28% compared to 2015. Also, government, commercial and non-governmental organizations use cyber security for better and secure platform. The demand for cyber security is increasing rapidly as professional security worker in all industries are managing the volume of consumer data of finance, healthcare, and retail. However, the use of the term “cyber security” is more popular in all industrial areas that will help organizations with security process culture. Conclusion Cyber security is equally important for local, state, and central government as these organizations maintains a huge amount of confidential data and records concerning the country and its citizens. Yet there are many government and commercial organizations that face difficulties in protecting the confidential data due to lack of inadequate secured infrastructure, and lack of security awareness. 24 |May 2019
  • 28. “ “We have the power to change the world for the better by just being careful in what we buy. Choose slow fashion. Offering Quality Clothing whilst Sustaining the Environment Nieves Ruiz Ramos (Snow) Founder BIBICO 26 |May 2019 The Most to watch 2019
  • 29. ounded in 2009, BIBCO is an award winning Fwomen’s ethical clothing label that specializes designing women’s clothing made from quality natural materials. Bibico’s collection is produced in fair trade certified cooperatives. Designed by Nieves Ruiz Ramos (Snow), the Founder of BIBICO and made ethically by producers she knows and trust. The company’s vision is to push the fashion industry in a more sustainable and ethical direction, where success is based on more than just offering the cheapest price, a direction that not only values beautiful designs, but the producer and the planet just as much as the end consumer. BIBICO values the safety and well-being of its producers and takes seriously its environmental impact. Its two main producers are certified by the WFTO (World Fair Trade Organization) who audit its members regularly, checking to see if the suppliers are meeting with the 10 Fair Trade principles set out by the WFTO including fair payment, good working conditions, no child or forced labor. In addition, the company meets with its suppliers once a year to check that these principles are being upheld. Sustaining Quality In terms of its commitment to the environment BIBICO always tries to use sustainable fabrics where it can. For example it uses GOTS certified organic cotton which means no chemicals are used in its production. The company has recently added Tencel to its collections, a fabric made from regenerated wood cellulose. In order to highlight the impact of fabric choices on environment, Snow refers to an important statement from the report of International Union For Conservation Of Nature, that is, “Clothes and textiles are a major source of primary micro plastic to the oceans, accounting for 35% of the global total.”. These micro plastics come from the synthetic fibres used to make clothes. Fast fashion has heralded a huge growth of cheaper clothes that use synthetic fabrics which in turn has heavily contributed to the influx of micro plastics in the oceans. At BIBICO less than 5% of all of the collections include synthetic fabrics and the rest is made from natural, biodegradable fabrics. The company’s aim is exclude all synthetic fibres from our clothing thereby becoming plastic free by 2020. From the first Sketch The Idea behind BIBICO originated by Snow when walked through the door of the women’s cooperative in Mumbai. She realized that her idea of creating a more sustainable clothing company was going to be possible. Inspired by the things that matter to her the most including her love of the outdoors, simple, family pleasures and her home in Northern Spain, she sat down to sketch her first Bibico collection. However, the journey of BIBICO started a year before when Snow and her husband Tim had taken a holiday in a small farmhouse in Menorca, Spain. She had been designing for major clothing brands for over 10 years and had become disillusioned by the industry and how it had changed in 10 years from producing 4 collections per year to churning out new collections every week. The clothes were cheaper but the quality was worse and there was no consideration for the people producing these clothes. Snow’s background designing for some of the world’s leading high street retailers has allowed her to create collections that appeal to so many customers. She also maintains close relationships with suppliers and as mentioned above, visits them at least once every year. Overcoming Adversities Adapting the ethical approach of production has been quite challenging for BIBICO. The company is aware of the consequences of producing certain items at a cheaper price with other suppliers, or by using cheaper synthetic materials that are bad for the planet rather than sustainable or natural fabrics. Hence it is not interested in short term gains. BIBICO describes itself as a “slow fashion company” which means it is focused on producing clothing in a more sustainable way. This may mean producing less but it also means producing better quality garments. Consumers are starting to wake up to the fact that over consumption is having a huge effect on the planet. Aspiring a Better Future BIBICO believes that there is a growing consumer movement for brands to become more transparent. Recent changes in the industry have highlighted the need of brands and retailers to improve working conditions for the people who make their clothes. Since its launch BIBICO has been one of the main supporters of improving the lives and well- being of garment workers so its long term growth is nurturing and growing this transparency. This will also enable growth of brands that are doing the right thing. Emblem of Excellence “Love your company’s ethics and will keep being repeat customer.” – Tanya “Your clothing range is exactly what I’ve been looking for. It’s smart, classic designs and supports fair trade. I’m past this fast fashion mentality. I want my clothing to last more than one season.” – Louise 27|May 2019
  • 32. Dr Danil Korchagin is an innovator and senior expert in ICT. He specialises in signal processing, data analysis and software engineering. Having worked for industries, organisations and academia, Danil Korchagin has comprehensive experience in both the industrial and academic worlds. He has managed many ICT projects with outstanding performance outcomes. He is founder of Aicue. About the Author Dr Danil Korchagin Founder Aicue 30 |May 2019
  • 33. Danil Korchagin set up Aicue, a technology company that targets to change the way audience videos are consumed on the web, in 2011. In this article, he shares his point of view on ongoing fourth industrial revolution and its impact on everyday life. We live in amazing time of fourth industrial revolution. The industrial revolution surpasses the scope of ICT, transforms the world and businesses, jobs and life styles. The concepts such as digital transformation, artificial intelligence and connected objects, incarnated into smartphones, are already hiding in our pockets. The self-driving cars leave science fiction and arrive into reality. The old professions go into oblivion and get replaced by new exciting jobs. The artificial intelligence based solutions are already present in many cross-domains and quite often used by professionals and businesses to smarter use time and improve productivity. These solutions can manage financial portfolios and decrypt genetic code, pilot robots and drive cars, entertain people and even be creative. As an example, the cliperie.com platform creates new compelling clips by automatically linking audience videos all together from big data cloud. The big data becomes de facto fuel of XXI century and industrial revolution. The amount of information, which is being gathered and transmitted by digital gadgets, sensors and internet of things, surpasses any imagination. Constantly increasing and improving population of digital objects results in constantly improving quantity and quality of data, while the next 5G mobile networks are going to take care about increasing digital data traffic. The big data surrounds us and helps to come up with efficient solutions. There are already more than fifteen billion connected objects worldwide. The population of connected devices will surpass fifty billions in less than five years. The internet of things, network of connected devices, is already present in commercial and LivingThrough Industrial Revolution Fourth Expert’s Outlook 31|May 2019
  • 34. industrial, consumer and infrastructure areas: from connected wearable heart monitor wristbands to connected pullovers, from connected security cameras to connected alarms, from connected parking lot sensors to connected displays of available places. The internet of things in turn enables smart tiers of technologies as smart homes, smart parking, smart traffic control and smart cities. The smart home hubs control communication among connected thermostats and stores, heating systems and other connected objects to enable home automation, energy savings and higher quality of life. The smart cities enable to reduce traffic jams and adjust public transportation in real-time, tighten security control and predict unforeseen events, reduce noise pollution and improve air quality. Constantly connected digital gadgets continue to pull further more people from reality to social networks and virtual worlds. The choice of remote communication still outfights real life communication. The picture of the family together with each member navigating within its own virtual world on smartphone starts to be everyday occurrence. The same picture can be observed in the trains, airports and other places. However, some people started to apply reasonable moderation. Even when people put away connected gadgets and back to physical world, the following interaction might be with nearby humanoid robot. Powered with same artificial intelligence as their virtual compatriots, they can follow conversations, understand individual social signals and respond appropriately. Their social interaction ability keeps improving, making future humanoid robots irreplaceable companions and assistants in nursing homes and hospitals, hotels and commercial stores. The industrial robots are separate topic. The global robot density in the manufacturing industries is accelerating around the world and there is already at least one industrial robot per 100 working people in more than 20 countries worldwide. The ongoing trend to automate production helps industries to be more competitive on the global market and has positive impact on job market in many countries due to manufacturing stays at home instead of being moved overseas. The tangible shift in professions happens with all industrial revolutions. The current one is not an exception. Some professions get automated, freeing up people to do new tasks: data management, data interpretation, digital marketing management, robot supervision, process control, process moderation, intervention in unforeseen situations, quality control and so on. The automated places can enable work week reduction and equilibrate shift in social insurances caused by increasing life expectancy. The advances in technologies enable to process more data with less energy and smarter use available resources. The paradox in our society is that the focus still stays on profitability and growth over durability and climate sustainability. As consequence, the digital footprint on global energy consumption keeps increasing from year to year and can reach one fifth by 2030, regardless it is feasible to pursue industrial revolution at moderate pace within fixed energetic envelope until there is an excess of renewable energy. The years will pass. The artificial intelligence, big data and internet of things will become ordinary tools in many areas of our life just like electricity and telephones, internet and personal computers did during previous industrial revolutions. No one will be questioning them anymore. They stay under human control. The human society is free to decide up to which extent new technologies and innovations have to be validated, regulated and certified for future everyday use. 32 |May 2019
  • 36. serves as the foundation to its Leadership Agenda. Everyone who wants to form part of its corporate family should voluntary commit to live by these values, both in and out of the company. Cementos uses compliance management software called Convercent that helps it integrate compliance risks, disclosures, and policies with day to day operations. Annually, its employees reaffirm their commitment to its COVEC through Convercent. To encourage a safe environment and protect employee wellbeing, the company has a completely anonymous complaint line for those who wish to report incidents without placing their privacy at risk. This model of anonymous reporting applies to everyone in the company, from the CEO to the entry level employee. An All Encompassing CEO Jose Raul Gonzalez is the CEO of Cementos Progreso. Before joining Progreso he had a 17 year career as CFO of CBC, the Pepsi Cola anchor bottler for Central America and the Caribbean where he participated in the design and execution of the regional expansion of the company. He is a member of the Board of Trustees of Universidad Francisco Marroquin where he lectures in economics and is a former Dean of the School of Economics and the Business School. He serves in the Board of Directors of the National Center for Economic Research, a Guatemalan think tank dedicated to implement social and economic policies and also serves in the Board of Directors of FICEM, the Ibero-American Federation of Cement. Jose holds a B.A. in Business Administration from Universidad Francisco Marroquin in Guatemala and an MBA in Finance and Economics from the University of Rochester, N.Y. ementos Progreso C is a Guatemalan company that endeavors to be exemplary in the construction industry. Since it’s founding the organization has been managed according to strong family values including ethical behavior and leadership, solidarity with the community and a commitment to long term sustainability. Cementos is characterized by its high-quality standards in the production and commercialization of cement, lime, and other construction materials and services. Additionally, it partners with communities to participate in the development and implementation of projects that improve their quality of life. Environmental programs that foster conservation in the areas the company serves are a key component of its social responsibility. Values are Blueprints Cementos Progreso has a Code of Values, Ethics and Conduct (known as COVEC), which represents the values which have guided the company since its establishment over a century ago. Every employee should demonstrate full commitment to achieving its operational and financial goals with accountability and minimum tolerance to failure. The company believes that its values are the blueprints by which it measures its actions and Cementos Progreso Promoting Business Ethics Globally The Most to watch 2019 34 |May 2019
  • 37. Leading the Industry Since 1899 Cementos Progreso was founded by Carlos F. Novella, the son of Italian and German immigrants, in 1899. After graduating as an engineer in Belgium, he returned to his home country of Guatemala and decided to manufacture and sell a product not yet known in the country, cement. At first, he struggled to demonstrate the relevance and advantages of using this new product, but succeeded after this new product became the cornerstone for construction. Long before Corporate Social Responsibility became popular, his company made significant contributions to the development of Guatemalan society by providing medical services for his workers and their families, schools for their children, above average salaries, training in occupational safety and a deep sense of ethics. Such is the heritage of those who have the privilege to belong to this organization. A century later, Cementos Progreso is an industry leader renowned for its sound corporate practices, and a commitment to safety and the environment. Those efforts have been recognized by different organizations such as the British Safety Council or the Great Place to Work Institute. Furthermore, Cementos Progreso made history as the first Guatemalan company to join the UN Global Compact. Global Recognition Cementos Progreso’s Code of Values, Ethic and Conduct dates back to its origins and represents the values with which its founder lived. This has allowed the company to forge a corporate culture that has led it to stand out for its ethics. Since 2014, the Ethisphere Institute, an independent center of research promoting best practices in corporate ethics and governance, has recognized Cementos Progreso as one of the World´s Most Ethical Companies for exemplifying and advancing corporate citizenship, transparency and the standards of integrity. This accolade is the result of years of commitment at all levels of the company. Ethical Approach According to Cementos Progreso, in this modern financial world where shareholders own and sell companies at the speed of light, family owned companies are a rare species and interesting sociological phenomena. In the troubled environment in which Latin America now finds itself, privately held companies also perform a valuable yet little known and seldom appreciated function as they work as a “moral reserve”. Since the company expects its employees to practice the COVEC in all areas of their life, it believes that there is an important multiplier effect in its society. Its colleagues are encouraged to share this behavior code with their families, their communities and their leaders. It is not unusual for a Cementos Progreso worker to be identified with these values and become a moral leader in his or her community. Together we build the country where we want to live in. Jose Raul Gonzalez CEO Cementos Progreso 35|May 2019
  • 38. ovember 3, 1988, is considered as a turning point Nin the world of Internet. 25 Years ago a Cornell University graduate student created first computer worm on the Internet, “Morris Worm.” The Morris worm was not a destructive worm, but it permanently changed the culture of the Internet. Before Morris unleashed his worm, the Internet was like a small town where people thought little of leaving their doors unlocked. Internet security was seen as a mostly theoretical problem, and software vendors treated security flaws as a low priority. Today, there is a paradigm shift, Morris worm was motivated more by intellectual curiosity than malice, but it is not the case today. According to a 2015 Report, 71% of represented organizations experienced, at least, one successful cyber attack in the preceding 12 months (up from 62% the year prior). According to survey report, discloses that, among 5500 companies in 26 countries around the world, 90% of businesses admitted a security incident. Additionally, 46% of the firms lost sensitive data due to an internal or external security threat. On average enterprises pay US$551,000 to recover from a security breach. Small and Medium business spend 38K. Incidents involving the security failure of a third-party contractor, fraud by employees, cyber espionage, and network intrusion appear to be the most damaging for large enterprises, with average total losses significantly above other types of the security incident. Let’s Take a Look at Recurrent Security Threats Types- Denial of Service Attacks A denial of service (DoS) attack is an incident in which a user or organization is deprived of the services of a resource they would normally expect to have. These attacks are very common, accounting for more than one-third of all network attacks reviewed in the report. A standard approach is to overload the resource with illegitimate requests for service. Brute Force Attacks Brute force attack tries to kick down the front door. It’s a trial-and-error attempt to guess a system’s password. The Brute Force Attack password cracker software simply uses all possible combinations to figure out passwords for a computer or a network server. It is simple and does not employ any inventive techniques. Identity Spoofing IP spoofing, also known as IP address forgery. The hijacker obtains the IP address of a legitimate host and alters packet headers so that the regular host appears to be the source. An attacker might also use special programs to construct IP packets that seem to originate from valid addresses inside the corporate intranet. Browser Attacks Browser-based attacks target end users who are browsing Threats NETWORK SECURITY Threats SolutionsSolutions March 2019|36
  • 39. the internet which in turn can spread in the whole enterprise network. The attacks may encourage them to unwittingly download malware disguised as a fake software update or application. Malicious and compromised websites can also force malware onto visitors’ systems. SSL/TLS Attacks Transport layer security (TLS) ensures the integrity of data transmitted between two parties (server and client) and also provides strong authentication for both sides. SSL/TLS attacks aim to intercept data that is sent over an encrypted connection. A successful attack enables access to the unencrypted information. Secure Sockets Layer (SSL) attacks were more widespread in late 2014, but they remain prominent today, accounting for 6% of all network attacks analyzed. Network Security is an essential element in any organization’s network infrastructure. Companies are boosting their investments in proactive control and threat intelligence services, along with better wireless security, next-generation firewalls and increasingly advanced malware detection. The U.S. Federal Government has spent $100 billion on cyber security over the past decade, $14 billion budgeted for 2016. Increased use of technology helps enterprises to maintain the competitive edge, most businesses are required to employ IT security personnel full-time to ensure networks are shielded from the rapidly growing industry of cyber crime. Following are the methods used by security specialists to full proof enterprise network system- Penetration Testing Penetration testing is a form of hacking which network security professionals use as a tool to test a network for any vulnerabilities. During penetration testing IT professionals use the same methods that hackers use to exploit a network to identify network security breaches. Intrusion Detection Intrusion detection systems are capable of identifying suspicious activities or acts of unauthorized access over an enterprise network. The examination includes a malware scan, review of general network activity, system vulnerability check, illegal program check, file settings monitoring, and any other activities that are out of the ordinary. Network Access Control Network Access Controls are delivered using different methods to control network access by the end user. NACs offer a defined security policy which is supported by a network access server that provides the necessary access authentication and authorization. Network Security is a race against threats, and many organizations are a part of this race to help enterprises to 37|May 2019 Editor’s Prespectives
  • 40. secure their network systems. Organizations like IBM, Symantec, Microsoft have created solutions to counter the global problem of network security threat. These cutting-edge products show genuine promise and are already being used by enlightened companies. Good Network Security Solutions Traits A real security solution should have four major characteristics; Detect Threats Targeted attacks are multi-faceted and specially designed to evade many point technologies attempting to identify and block them. Once they are inside, the only way to find these cyber threats is to understand the behavior of the individual attack components and use analytics to understand their relationships. Respond Continuously Today it is not important that an organization will be attacked, but important and more crucial is to identify when and how much they can limit the impact and contain their exposure. This means having the capability to respond quickly once the initial incident has been discovered. Prevent Attacks Malware is gettings quick-witted day by day. They utilize heuristics to change their code dynamically. A capable solution should have an adaptive architecture that evolves with the changing environment, and threats today’s business faces. Integration Today’s threats have multiple facets, and a single software or solution is not sufficient. Protection system should have the capability to integrate with other security tools from different vendors to work together as a single protection system, acting as connective tissue for today’s disjointed cyber security infrastructure. Solutions In Market Like infectious diseases, cyber threats will never be eradicated entirely, but they can be better contained and understood, and their effects minimized. How can this be achieved? IBM has built an enterprise-level “immune system,” an adaptive security architecture to battle today’s cyber pathogens. IBM has developed a vast fleet of products, QRadar, X-Force Threat Intelligence, Trusteer Pinpoint Malware Detection, IBM Threat Protection System a dynamic, integrated system to meddle the lifecycle of advanced attacks and prevent loss. The IBM Threat Protection System integrates with 450 security tools from over 100 vendors acting as connective tissue for today’s disjointed cyber security infrastructure. Symantec is another major player in catering enterprise network security systems with Symantec Advanced Threat Protection. Symantec ATP operates via a single console and works across endpoints, networks, and emails, integrating with Symantec Endpoint Protection (SEP), and Symantec Email Security cloud, which means organizations do not need to deploy any new endpoint agents. Symantec says, ATP is the only threat protection appliance that can work with all three sensors without requiring additional endpoint agents. With ATP, Symantec’s goal is to deliver end-to-end threat protection, prevention, detection, and response in a single pane of glass, offering more value to businesses than individual point products can provide. Symantec Advanced Threat Protection combines multiple layers of prevention, detection, and response. March 2019|38