There are several companies that have raised the standards of business practices in their respective fields by exercising business ethics and making it an important aspect for running business. Insights Success acknowledges these companies by shortlisting “The Most Ethical Companies to watch, 2019”.
1. Offering World-Class Electronic Measurement Solutions and Services
May 2019
Vol- 5
Issue- 2
The Most
to watch 2019
Editor’s Prespective
Securing Future
4. e cannot deny the fact that the ultimate goal of any business is profit. And the key to profit is customers. The
Wtraditional belief suggests that the customer is king and companies do anything they can to satisfy their customers’
needs. However, there are few ethical boundaries which they must adhere to . These boundaries assert that a
business must follow the code of conduct and practice fair trade while meeting its financial goals. It has been observed in the
recent trends that customers prefer companies that are more ethical over the ones that are not. Moreover most enterprises that
are on the top of the table in their respective spaces are highly ethical.
In order to follow the business ethics, a company must have a strong leadership. If the leaders understand their values well
and have the ability to choose being ethically responsible over profit or gain, then it ripples across the organization and
creates the foundation of an ethical culture. However, an enterprise does not become ethical overnight by following some
textbook guidelines. These values must be rooted in the mission and the vision of the company. Every organization has some
values that define it and keeps it together. Business ethics should be one of them.
C.S. Lewis defines Integrity as “Integrity is doing the right thing even when no one is looking.” and I believe it couldn’t be
defined better than this. A company must be transparent to its employees, business associates and other concerned parties.
Building trust among them is one of the most significant practices for the company.
Loyalty towards customers is one of the most important features of business ethics. Lets take a small example to understand
how it benefits the company. In business, there is a certain cost of acquiring a new customer. Similarly, there is a certain cost
of retaining one. The cost of retaining a customer is far less than acquiring one. However, there comes a time in the life cycle
of the customer when retaining him/her becomes loss making for the company. Usually the companies stop retaining the
customers after this point. This costs them their goodwill. An ethical company remains loyal to its customers as long as the
customer is associated.
Standardizing Business Ethics
5. There are several companies that have raised the standards of business practices in their respective fields by exercising
business ethics and making it an important aspect for running business. Insights Success acknowledges these companies by
shortlisting “The Most Ethical Companies to watch, 2019”.
Featuring as our cover story is Keysight Technologies, a company that has the broadest range of products in the industry to
accelerate deployment of its customers new technologies. Keysight reflects its rich heritage - a direct line from both Hewlett-
Packard’s standards of integrity and innovation and Agilent’s premier measurement business.
Alongside this, the magazine also includes Cementos Progreso, which produces and markets cement and other construction
materials accompanied by services and high quality; BIBICO, a designer firm of beautiful easy-to-wear clothing made from
quality natural & organic fabrics; and Beaumont Organic, an international ethical ladies wear brand that combines signature
styling with contemporary classics.
Also, make sure to flip through articles, written by our in-house editorial team as well as CXO standpoints of notable industry
personalities to have a brief taste of the sector.
Let’s start reading!
“ “
Shubham Khampariya
6. Expert’s Outlook
Living Through Fourth
Industrial Revolution
Leader’s Insights
The Importance of an
Undying Passion in
Budding Entrepreneurs
08Cover Story
Keysight
Technologies
30
Offering World-Class
Electronic Measurement
Solutions and Services
16
7. CONENTS
Beaumont Organic
Providing Meaning to
Sustainable Living!
BIBICO
Offering Quality Clothing
whilst Sustaining the
Environment
Cementos Progreso
Promoting Business
Ethics Globally
Editor’s Prespective
Network Security
Threats and Soloution
BIBICO
Offering Quality Clothing
whilst Sustaining the
Environment
Cementos Progreso
Promoting Business
Ethics Globally
18
3426
Securing Future
Cyber Security
Secure Your Network
with Intelligence
36
Articles
22
12. In an interview with Insights
Success, the CEO and President
of Keysight Technologies, Ron
Nersesian, shares his key insights on
various aspects of the company and
how it contributes towards the industry
by offering cutting edge solutions and
services. He also discusses Keysight’s
attainments and future endeavors.
Below are the highlights from the
interview conducted between Ron and
Insights Success:
Give a brief overview of your
organization, its mission and vision?
Keysight provides world-class
electronic measurement capabilities to
accelerate technology innovations that
make the world more productive and a
safer place to live. We offer an
unmatched breadth and depth of
measurement tools and expertise to
meet the world’s critical requirements
for electronic measurement. Keysight
develops solutions that help bring
electronic products to market faster
from design simulation, to prototype
validation, to manufacturing test, to
optimization in networks and cloud
environments. Our customers span the
worldwide communications ecosystem,
aerospace and defense, automotive and
energy, semiconductor and general
electronics end markets.
What are the cutting-edge
products/solutions offered by
Keysight Technologies?
Keysight is at the heart of innovation
processes in key end markets and
emerging technology trends such as
5G, connected and autonomous
vehicles, E-Mobility, IoT, and high-
speed datacenters. Innovations like
these require considerable technology
reinvention. That’s why at Keysight,
we are innovating the invention
process by streamlining workflows for
software and hardware designers. As
the market leading test and
measurement company in the world,
we offer end-to-end test equipment,
solutions, and services to help design,
validate, manufacture, and optimize
these innovations. Wherever the signal
goes, Keysight is there to accelerate
development lifecycles.
We see a lot of exciting growth areas
across many markets. Let’s start with
the promise of 5G. Like what the
market experienced in 3G and 4G
usage growth, 5G promises to connect
over a billion new devices. That alone
is exciting, but even more exciting is
the attributes of those devices.
Intermixed with more standard users
will be billions of IoT devices each
communicating small amounts of data,
virtual and augmented reality systems
requiring very fast connections, and
connected cars moving at highway
speeds.
Getting there requires use of complex
technologies such as millimeter wave
frequencies for commercial
communication along with dense
waveform modulations, massive
multiple-input multiple-output
(MIMO) antenna techniques, and
antenna beamforming, just to name a
few. To test all this, we not only need
to extend the capabilities of individual
test platforms, but to build entire
system solutions aimed at validating
specific 5G design implementations.
Keysight partners across the 5G
ecosystem, including chipset makers,
device designers, network equipment
manufacturers, and service providers.
We create tests to validate designs of
individual features, specific products,
or end-to-end networks. There are
plenty of exciting technology
challenges to go around in every part
of the 5G ecosystem as each part
pushes the boundaries of technical
innovation.
In terms of automotive, our customers
are pushing the boundaries in battery
manufacturing, power conversion and
power loading in e-Mobility. They are
also innovating longer range, higher-
resolution radar and LIDAR sensors
for autonomous driving and integrating
e-Call services and broadening the data
connections to make a truly connected
car.
In IoT, we are seeing an evolution from
’best effort’ applications to more
’mission critical’ applications that
require higher reliability and more
secure wireless connections. In data
centers, we constantly see
improvements in data connection
speeds which now top 400 Gbps
requiring a new generation of
transceivers. In aerospace and defense,
of course, our customers are always
pushing the boundaries in sensors and
communications.
Describe the experiences or
achievements that have shaped the
journey of the company.
I would say our biggest achievement
was the rapid transformation from
hardware-centric products to software-
centric solutions. We realized that at
each stage of development – design
simulation, prototype validation, and
production optimization – different
teams create their own test parameters
and analysis points. Traditionally,
design simulation software tends to
operate independently from prototype
validation lab systems, which tend to
operate independently from production
test systems. With Keysight’s software
platform, PathWave, design, test and
analysis work from each stage can be
shared with the next. This not only
improves the design but saves a lot of
time used to reinvent tests typical in
most developments.
PathWave allows our customers to
accelerate innovation and product
development from concept through
manufacturing and deployment. It’s the
industry’s first software platform to
integrate design, test, measurement and
analysis in a completely programmable
environment. It combines design
14. software, instrument control, and application-
specific test software in an open development
environment allowing users to create high-
performance solutions fast.
Keysight’s strong products combined with its
talented employees and culture makes me
incredibly excited for what the future holds, not
only for our company but also for the
technologies that advance the world.
What influence over the company have you
had as the CEO?
I feel strongly that customers think in terms of
finding solutions to their unique business and
technical problems. They don’t think in terms of
products to purchase. We transformed the
company to address real-world business
requirements in our customers’ target industries
to deliver integrated solutions. This entailed a
major transformation in how we were structured,
how we engaged with customers, and in our go-
to-market strategy.
“Keysight’s vision is to
build a better planet by
accelerating innovation
to connect and secure
the world.”
15. For example, in the past, we were organized around our
products and internal capabilities. We shifted that to reflect
the focus on our customers end ecosystems. This has
allowed us to think about our customers first, about solving
their challenges, and getting them to market faster.
And for those customers who need expert assistance or
want to outsource test altogether, we offer multiple services,
including test-as-a-service locations around the world. The
number of early engagements and partnerships we have
forged with market-maker companies demonstrates that this
strategy is working for us and for our customers.
Does having an ethical approach affect your business
strategies or growth of your company?
Absolutely, at the highest level, our standards of business
conduct, which every employee receives annual training on,
provide a guidepost for managing our ethical governance
across the company. From there, our environmental
policies, employee benefits and diversity, responsible
sourcing efforts, community philanthropy and volunteerism,
as well as our solutions, support an end-to-end ethical
workplace at Keysight.
From individual employee responsibilities through
corporate governance, our strategic and operational
business management policies, procedures, and values
provide operational transparency and business sustainability
while meeting compliance requirements.
I view this approach as having a direct impact on our
incredible growth. We enable faster acquisition integration
and new market entry through consistent programs and
policies that meet global regulations and requirements
across the company. We support employee hiring and
development in growth areas, with future engineer
development, employee diversity and benefits that also
include philanthropy, volunteerism, STEM programs in
elementary, middle, and high schools, and university
relations in support of future workforce development.
University research grants and engagements ensure we are
positioned well for innovation. In addition, our remarketing
solutions and used product sales through product quality
and take-back programs support environmental
sustainability while offering new revenue streams.
How do you plan to sustain the ethical nature of your
organization in the near future?
Well, quite simply, to keep doing what we have been doing
through our entrepreneurial and continuous improvement
mindset. For 80 years as of January 2019 – first as part of
Hewlett-Packard, then Agilent, and now Keysight, we have
acknowledged our responsibility to deliver through ethical
governance practices and help address global social and
environmental challenges. Beyond just being the right thing
to do, it is part of our company DNA going back to HP
founders Bill Hewlett and Dave Packard.
Our Keysight Leadership Model – which defines how the
company continuously delivers greater value to customers,
shareholders, and employees – has the same defined value
set of social responsibility, accountability and
uncompromising integrity. It is the philosophy that
permeates every aspect of our operations and drives our
innovation, speed, and excellence in execution.
Beyond that, we support a continuous improvement
mentality. So, while we will continue to do the great things
we have always done, it is our mindset to improve wherever
we can. From our Corporate Social Responsibility program
that monitors opportunities in these areas, to every
employee that looks to their own roles and functions for
how to do things better through operational excellence and
innovation.
16. Address :
Country :City : State : Zip :
Global Subscription
Date :Name :
Telephone :
Email :
READ
IT
FIRST
Never Miss an Issue
Yes I would like to subscribe to Insights uccess Magazine., S
SUBSCRIBE
T O D A Y
Che should be drawn in favor of:ck INSIGHTS SUCCESS MEDIA TECH LLC
Insights Success Media Tech LLC
555 Metro Place North, Suite 100,
Dublin, OH 43017, United States
Phone (614)-602-1754,(302)-319-9947:
Email: info@insightssuccess.com
For Subscription: www.insightssuccess.com
CORPORATE OFFICE
18. The Importance of an
Undying Passion
in Budding Entrepreneurs
Iwas at an event in San Francisco in 2014, when I
heard a piece of advice that stuck in my mind ever
since. At the time, when I considered the advice, I
really wasn’t sure whether I was actually following it.
However, since then, I have come to understand the
significance of it. The speaker said, in relation to
choosing what you work on:
“If you’re going to climb a mountain, make sure it’s the
right one”
You spend much of the best part of your early life trying
to understand yourself well enough to find the right
mountain for you. You look for indicators; subjects you
like at school, mentors whose advice particularly
resonates, which exams you do well in, the clubs you
join at university, the career paths of those more senior
than you in our first job. But it’s hard – I rarely come
across people who really have the conviction to
absolutely know their mountain to climb through
forward looking indicators alone.
I started my career as an engineer. I joined a world
leading Engineering and Project Management company
which took me to projects in London, the US and the
Middle East. I worked on some of the largest and most
cutting edge mega-projects in the world. I quickly
became a chartered civil engineer and project manager
and it seemed like I was destined for a long and
successful career in the industry. However, I wasn’t
happy. Despite all the indicators pointing in a positive
direction, I knew something wasn’t right.
It was then that I got a call from my brother, to ask for
help on a little project he was working on with some
teacher friends of his. Fast forward a couple of years and
I had left the Middle East, left my career, and founded a
company called Pobble that would go on to change the
lives of thousands of children all over the world.
Now, every indicator would have told me that this was a
risky, even crazy thing to do! In fact, the next 6 years
that bought me to now, have been the most wonderful,
painful, challenging, and rewarding years of my life.
Entrepreneurship is truly a rollercoaster ride! When I
reflect on that decision point 6 years ago though, it
would have been impossible to have rationally decided
to leave everything and start on a new path – I just knew
in my gut that I had to do it!
4 years on I look back on that piece of advice and realise
that I did pick the right mountain to climb. And there’s
one indicator that I see above all else that convinces me
that this is the case. The fact that I didn’t give up. When
you are working on something that truly aligns with your
passion, every challenge is just the next one to overcome
as you progress along your journey to achieving your
mission, giving up just isn’t an option!
I’m often asked about the secret to successful
entrepreneurship and I say two things; focus and
resilience. When you are doing something that you love
and that you believe in, no matter what the challenge,
you keep going and make it happen. You keep going,
when others would just give up. Also, despite all the
chaos and challenge, you find the way to focus on taking
the next best step forward in a sea of uncertainty. When
you have the clarity of knowing where you are going on
your journey you are able to focus on the right things.
When I meet with new ideas and startups, it’s relatively
16 |May 2019
19. easy to verify the market, the need and the solution – but
much more important in my opinion is the reason for the
founding team to be doing what they are doing. If this
project aligns with their life’s mission, their “mountain”,
then no matter how hard the challenge is, they will find a
way to create the best path forward. Maybe they’ll fail
for the many other reasons that startups fail, but they
have the best chance if they have that personal
commitment and passion to achieve success.
Pobble has won many awards, gained significant
investment, and continues to attract fantastic partners.
However, at the end of the day all these things are by-
products of one thing; every member of our amazing
team has an incredibly strong belief in our mission and is
passionate about giving teachers tools that will make
their life easier and inspire and engage their children to
make writing ridiculously exciting for them in school!
Without this passion and our commitment to climb our
mountain, none of this impact or achievement would be
possible.
Jon is Co-founder and CEO of
award winning edtech venture
Pobble. Pobble is used by tens of
thousands of teachers each day to
nd the best teaching resources, give
pupils a global audience for their
work, and to assess writing.
Pobble has global acclaim, gaining
endorsements from famous authors
such as Michael Morpurgo,
partnerships with organisations like
the BBC, OUP and Microsoft, and
investment from some the world's
most prolic education focussed
angel investors.
After graduating with a Masters in
Engineering Science from Trinity
College, Oxford, Jon because a
chartered Civil Engineer and Project
Manager. Jon started Pobble with his
brother and two other teachers in
their spare time. They then went on
to incubate Pobble whilst Jon studied
for his MBA at London Business
School. The fth co-founder
(technical) joined Pobble from Jon's
stream at London Business School.
About the Author
Jon Smith
Founder & CEO
Leader’s Insights
17|May 2019
20. Paving the way
for fashion to
have a more
sustainable future.
“
“
Providing Meaning to Sustainable Living!
Hannah Beaumont Laurencia
Founder & Director
The Most
to watch 2019
18 |May 2019
21. Sustainable living describes a
lifestyle that attempts to reduce
an individual’s or society’s use
of the Earth’s natural resources, and
one’s personal resources.- Wiki
Founded in 2008, Beaumont Organic
is a pioneering conscious clothing
brand that combines signature styling
with contemporary classics using
luxury organic, fair trade and eco
fabrics. As a clothing brand, Beaumont
is paving the way for fashion to have a
more sustainable future. The
organization does this by creating
contemporary conscious clothing for
the modern woman. Its vision is to be a
brand people are proud to be wearing
and be associated with, producing
timeless clothing that will last a
lifetime with care from its customers.
Beaumont is inspired by the thought of
making changes and paving a way for
fashion to have a more sustainable
future. The brand execute this by
asking questions, producing ethically,
reducing wastage, using off-cuts where
it can for sampling and keeping
consumption low.
Making Sustainable Living
Mainstream
Beaumont Organic was founded before
the term ‘sustainable living’ was so
commonly discussed. Hence, during its
initial period building the brand was
challenging and the leaders had to
educate clients on the need for
conscious clothing. When it comes to
achievements, Beaumont has already
been received various awards,
recognitions and signed agents in
countries that believe in sustainable
living, and are passionate about the
product and capabilities.
Also when it comes to preserving the
intactness of organizational ethics,
Beaumont Organic has made sure that
it uses GOT’s certified organic cotton
in order to produce its clothing. Being
responsible is also part of the process
to preserve its ethics. Working towards
reducing waste by using off-cuts for
sampling and holding sample sales, to
make use of its waste wherever
possible Beaumont ensures its ethics
are preserved.
Advocating Sustainability
The Director and Founder of
Beaumont Organic Hannah
Beaumont Laurencia is an advocate
of sustainability. She passionately
believes in slow sustainable living. She
claims the mindset of slow conscious
living must be transmitted through
every part of her and Beaumont
Organic’s business philosophies. It is
important to believe in something
yourself, when trying to encourage
others to follow the same path, and
particularly for the business to
continue to grow and remain ethical.
Since the day she could walk, Hannah
loved to travel and was spoiled with
wonderful holidays, including cultural
trips to Washington DC, magical weeks
at Disneyland, etc. In her late teen days
Hannah visited a truly developing
country for the first time. Living in a
hut with corrugated metal roof,
infested with all kinds of insects and
wildlife, no hot water and an outside
toilet helped Hannah to understand the
value that travel can bring to a person.
During her tenure in Fiji, she became
more grounded and self-sufficient.
For Hannah it was a life changing
experience but the thing that has stayed
with her the longest is not the living
standards, it is the love and happiness
that the people of Fiji have and the
gratitude they have for the simplest
things.
Encouraging Others to Follow Steps
When it comes to sustaining the ethical
nature of the organization, Beaumont is
writing new policies within the
company at the moment to ensure as it
grows and takes more staff onboard,
that the correct training is given to
them and they knows what Beaumont’s
value and ethics are. With the
continuous growth of the organization,
it is continuing to build on its
relationships with suppliers, as well as
forming new relationships who all
believe in sustainability and will
continue working with Beaumont in
the future.
The company also believes that, having
an ethical approach doesn’t affect
anything within the business; it is just
the way it works. It is normal for
Beaumont Organic to do things in an
ethical way and encourage others to
follow in its steps; it allows the
company to educate its customers and
gives them the choice to be sustainable
and conscious with their clothing.
Client Feedback
“Beaumont Organic offers consistently
outstanding quality, beautiful fabrics
and excellent customer service.
Hannah is brilliant at listening to
feedback and using this to move the
collections forward in the right
direction season after season.”
(Vanessa Collen – Managing Director
of Collen & Clare)
“We have been working with Beaumont
Organic for many years now and
admire how Hannah has grown her
brand whilst remaining true to her
vision throughout. The clothes offer
timeless soft wear ability and have a
clear handwriting. A personal and
proper brand.” (Amy Hall – Director
of Hall & Co)
“It has always been a pleasure
working with Hannah and her team at
Beaumont Organic. The fabrics are
really beautiful and the designs are
consistently unique, showcasing
modern cuts.” (Anna Atwal – Director
of PAD Lifestyle)
19|May 2019
25. At present, cyber security is
playing a vital role in the
digital world and it is also
known as a standard technology use
for the protection of cyber
environment of an individual or any
organization. It is mainly known for
security culture which includes user
network, drives, software process,
information storage, application
security and system support which is
directly or indirectly connected to the
network. The prime objective of
cyber security is to reduce
continuously growing cyber risks and
cyber threats.
Cyber security technology consists of
a collection of tools, policies,
security concepts, risk management,
actions, and training. The technology
tracks protected networks, data
security from data attack, along with
cyber security and physical security.
The core functionality of cyber-
security is based on techniques
involved protecting information and
system from cyber threats.
How Cyber Security came into
Existence?
As with the history, cyber security
has huge network background with
its own findings and technology
aspects. In the early 1990s, a
research on information security and
policy was been introduced where
information was in the form of
accuracy and based on system
awareness. Under 2016 survey, 70%
of the organizations in the US were
adopted by US Security survey
which is comprised of NIFT
(National Institute of Standards
and Technology)
Cyber-security framework.
Origins of Cyber Security Platform
Cyber security is defined as a
package of safety solutions which
provides major security processes.
There are many sectors which are
consuming cyber security platform as
its major functionality for web
service network. The fundamentals
of cyber security process are,
Ÿ Application Security
Ÿ Information Security
Ÿ Network Security
Ÿ Operational Security
Ÿ Application security is covered
with technology that measures the
feasibility of the application by
finding, fixing and preventing
security exposers. There are
different techniques which are
being used as security platform to
emphasize safety at different
stages of the application cycle.
Application cycle includes
different segments such as design,
development, deployment,
upgrade, and maintenance. The
standard of security process is
consequently changing and
application cycle has also a
different process with different
standardization.
Techniques used in application
security are mainly focused on
its exposer of the application
security. Whitebox security is
used for reviewing the source
code and noticing security flaws
of the application through
manual functionality. Blackbox
security audit is used for testing
security functions where source
code is not needed.
Design review is used as an
application of threat model, and
works before the code is written.
And Tooling is the technique
which includes automated tools
that test security flaws with
higher positive rate.
Ÿ Information security is a core
source of information which is
confidential, integrated and easily
available. The primary focus of
this security process is to the
stable data protection while
maintaining a focus on efficient
policy application. Risk
management process is achieved
by identifying assets, threat
sources, and vulnerabilities and is
also followed by the effectiveness
of the risk management plan.
Information security mainly
works on confidential information
which is highly entitled to the
process.
Ÿ Network security sets a variety
of computer networks, used in
both public and private sector. It
also includes conducting
transactions and build
communications among
businesses, government agencies,
and individuals. All networks are
divided into two sections, private
network and public network.
Private networking is used
within the company and public
network access relates to the
open source network. This
security culture is highly
involved in most of the
companies, enterprises, and other
types of institutions. It is mainly
used for protecting and
overseeing the operations. The
Securing Future
23|May 2019
26. network resource is relatively protected by assigning
a unique name and a corresponding password. The
process is concerned with authentication of
username and password which implements its
security concept.
Ÿ Operational security is a process that identifies
information which is critical and easy to determine by
competitor intelligence. It protects individual piece of
data that could be grouped together to give a proper
set of information. It includes critical information
essential for military commanders, senior leaders, and
higher management. The whole process also includes
technical and non-technical measures such as, use of
email encryption software, taking precautions against
spying data and securing confidential information not
to be shared on social media platform.
Operational security is a five-step process which
assists any organization to specify required
information,
Ÿ Identification of critical information
Ÿ Analysis of threats
Ÿ Analysis of Vulnerabilities
Ÿ Assessment of Risk.
Securing Organization Processes
Cyber security process plays a crucial role to impact
information security of the organization. It also explores
the “Relationship between Organization Culture and
Information Security Culture” and contributes into the
organization’s protection as well as maintains all kind of
information. Security process is a never-ending process
in which information is used as a resource tool to
manage statistics security culture.
The security process served five-step processes including
pre-evaluation, strategic planning, operative planning,
and implementation. The pre-evaluation process
identifies the awareness of information security within
employees in the organization. Strategic Planning offers
healthier awareness program where target gets sets
according to the grouping of people. Operative Planning
provides good security process which can be established
based on internal communication, security awareness,
and a training program. Implementation is four stage
process used as security process to implement
information. The process is used for management,
communication with organizational members, and
current employees.
Enhancing Future with Cyber Security
Cyber security is aggressively contributing to the IT field
concerned with reducing organization’s risk and data
break. According to research in 2016, 46% of
organizations carry problematic shortage of cyber
security, and is increased by 28% compared to 2015.
Also, government, commercial and non-governmental
organizations use cyber security for better and secure
platform.
The demand for cyber security is increasing rapidly as
professional security worker in all industries are
managing the volume of consumer data of finance,
healthcare, and retail. However, the use of the term
“cyber security” is more popular in all industrial areas
that will help organizations with security process culture.
Conclusion
Cyber security is equally important for local, state, and
central government as these organizations maintains a
huge amount of confidential data and records concerning
the country and its citizens. Yet there are many
government and commercial organizations that face
difficulties in protecting the confidential data due to lack
of inadequate secured infrastructure, and lack of security
awareness.
24 |May 2019
28. “ “We have the power
to change the world for
the better by just being
careful in what we buy.
Choose slow fashion.
Offering Quality Clothing whilst
Sustaining the Environment
Nieves Ruiz Ramos (Snow)
Founder
BIBICO
26 |May 2019
The Most
to watch 2019
29. ounded in 2009, BIBCO is an award winning
Fwomen’s ethical clothing label that specializes
designing women’s clothing made from quality
natural materials. Bibico’s collection is produced in fair
trade certified cooperatives. Designed by Nieves Ruiz
Ramos (Snow), the Founder of BIBICO and made
ethically by producers she knows and trust. The company’s
vision is to push the fashion industry in a more sustainable
and ethical direction, where success is based on more than
just offering the cheapest price, a direction that not only
values beautiful designs, but the producer and the planet
just as much as the end consumer.
BIBICO values the safety and well-being of its producers
and takes seriously its environmental impact. Its two main
producers are certified by the WFTO (World Fair Trade
Organization) who audit its members regularly, checking to
see if the suppliers are meeting with the 10 Fair Trade
principles set out by the WFTO including fair payment,
good working conditions, no child or forced labor. In
addition, the company meets with its suppliers once a year
to check that these principles are being upheld.
Sustaining Quality
In terms of its commitment to the environment BIBICO
always tries to use sustainable fabrics where it can. For
example it uses GOTS certified organic cotton which means
no chemicals are used in its production. The company has
recently added Tencel to its collections, a fabric made from
regenerated wood cellulose.
In order to highlight the impact of fabric choices on
environment, Snow refers to an important statement from
the report of International Union For Conservation Of
Nature, that is, “Clothes and textiles are a major source of
primary micro plastic to the oceans, accounting for 35% of
the global total.”. These micro plastics come from the
synthetic fibres used to make clothes. Fast fashion has
heralded a huge growth of cheaper clothes that use
synthetic fabrics which in turn has heavily contributed to
the influx of micro plastics in the oceans. At BIBICO less
than 5% of all of the collections include synthetic fabrics
and the rest is made from natural, biodegradable fabrics.
The company’s aim is exclude all synthetic fibres from our
clothing thereby becoming plastic free by 2020.
From the first Sketch
The Idea behind BIBICO originated by Snow when walked
through the door of the women’s cooperative in Mumbai.
She realized that her idea of creating a more sustainable
clothing company was going to be possible. Inspired by the
things that matter to her the most including her love of the
outdoors, simple, family pleasures and her home in
Northern Spain, she sat down to sketch her first Bibico
collection.
However, the journey of BIBICO started a year before
when Snow and her husband Tim had taken a holiday in a
small farmhouse in Menorca, Spain. She had been
designing for major clothing brands for over 10 years and
had become disillusioned by the industry and how it had
changed in 10 years from producing 4 collections per year
to churning out new collections every week. The clothes
were cheaper but the quality was worse and there was no
consideration for the people producing these clothes.
Snow’s background designing for some of the world’s
leading high street retailers has allowed her to create
collections that appeal to so many customers. She also
maintains close relationships with suppliers and as
mentioned above, visits them at least once every year.
Overcoming Adversities
Adapting the ethical approach of production has been quite
challenging for BIBICO. The company is aware of the
consequences of producing certain items at a cheaper price
with other suppliers, or by using cheaper synthetic materials
that are bad for the planet rather than sustainable or natural
fabrics. Hence it is not interested in short term gains.
BIBICO describes itself as a “slow fashion company”
which means it is focused on producing clothing in a more
sustainable way. This may mean producing less but it also
means producing better quality garments. Consumers are
starting to wake up to the fact that over consumption is
having a huge effect on the planet.
Aspiring a Better Future
BIBICO believes that there is a growing consumer
movement for brands to become more transparent. Recent
changes in the industry have highlighted the need of brands
and retailers to improve working conditions for the people
who make their clothes. Since its launch BIBICO has been
one of the main supporters of improving the lives and well-
being of garment workers so its long term growth is
nurturing and growing this transparency. This will also
enable growth of brands that are doing the right thing.
Emblem of Excellence
“Love your company’s ethics and will keep being repeat
customer.” – Tanya
“Your clothing range is exactly what I’ve been looking for.
It’s smart, classic designs and supports fair trade. I’m past
this fast fashion mentality. I want my clothing to last more
than one season.” – Louise
27|May 2019
32. Dr Danil Korchagin is an
innovator and senior expert in
ICT. He specialises in signal
processing, data analysis and
software engineering. Having
worked for industries,
organisations and academia,
Danil Korchagin has
comprehensive experience in
both the industrial and
academic worlds. He has
managed many ICT projects
with outstanding performance
outcomes. He is founder of
Aicue.
About the Author
Dr Danil Korchagin
Founder
Aicue
30 |May 2019
33. Danil Korchagin set up Aicue,
a technology company that
targets to change the way
audience videos are consumed on the
web, in 2011. In this article, he
shares his point of view on ongoing
fourth industrial revolution and its
impact on everyday life.
We live in amazing time of fourth
industrial revolution. The industrial
revolution surpasses the scope of
ICT, transforms the world and
businesses, jobs and life styles. The
concepts such as digital
transformation, artificial intelligence
and connected objects, incarnated
into smartphones, are already hiding
in our pockets. The self-driving cars
leave science fiction and arrive into
reality. The old professions go into
oblivion and get replaced by new
exciting jobs.
The artificial intelligence based
solutions are already present in many
cross-domains and quite often used
by professionals and businesses to
smarter use time and improve
productivity. These solutions can
manage financial portfolios and
decrypt genetic code, pilot robots and
drive cars, entertain people and even
be creative. As an example, the
cliperie.com platform creates new
compelling clips by automatically
linking audience videos all together
from big data cloud.
The big data becomes de facto fuel
of XXI century and industrial
revolution. The amount of
information, which is being gathered
and transmitted by digital gadgets,
sensors and internet of things,
surpasses any imagination.
Constantly increasing and improving
population of digital objects results
in constantly improving quantity and
quality of data, while the next 5G
mobile networks are going to take
care about increasing digital data
traffic. The big data surrounds us and
helps to come up with efficient
solutions.
There are already more than fifteen
billion connected objects worldwide.
The population of connected devices
will surpass fifty billions in less than
five years. The internet of things,
network of connected devices, is
already present in commercial and
LivingThrough
Industrial
Revolution
Fourth
Expert’s Outlook
31|May 2019
34. industrial, consumer and infrastructure areas: from
connected wearable heart monitor wristbands to
connected pullovers, from connected security cameras to
connected alarms, from connected parking lot sensors to
connected displays of available places.
The internet of things in turn enables smart tiers of
technologies as smart homes, smart parking, smart traffic
control and smart cities. The smart home hubs control
communication among connected thermostats and stores,
heating systems and other connected objects to enable
home automation, energy savings and higher quality of
life. The smart cities enable to reduce traffic jams and
adjust public transportation in real-time, tighten security
control and predict unforeseen events, reduce noise
pollution and improve air quality.
Constantly connected digital gadgets continue to pull
further more people from reality to social networks and
virtual worlds. The choice of remote communication
still outfights real life communication. The picture of the
family together with each member navigating within its
own virtual world on smartphone starts to be everyday
occurrence. The same picture can be observed in the
trains, airports and other places. However, some people
started to apply reasonable moderation.
Even when people put away connected gadgets and back
to physical world, the following interaction might be
with nearby humanoid robot. Powered with same
artificial intelligence as their virtual compatriots, they
can follow conversations, understand individual social
signals and respond appropriately. Their social
interaction ability keeps improving, making future
humanoid robots irreplaceable companions and assistants
in nursing homes and hospitals, hotels and
commercial stores.
The industrial robots are separate topic. The global
robot density in the manufacturing industries is
accelerating around the world and there is already at
least one industrial robot per 100 working people in
more than 20 countries worldwide. The ongoing trend to
automate production helps industries to be more
competitive on the global market and has positive impact
on job market in many countries due to manufacturing
stays at home instead of being moved overseas.
The tangible shift in professions happens with all
industrial revolutions. The current one is not an
exception. Some professions get automated, freeing up
people to do new tasks: data management, data
interpretation, digital marketing management, robot
supervision, process control, process moderation,
intervention in unforeseen situations, quality control and
so on. The automated places can enable work week
reduction and equilibrate shift in social insurances
caused by increasing life expectancy.
The advances in technologies enable to process more
data with less energy and smarter use available
resources. The paradox in our society is that the focus
still stays on profitability and growth over durability and
climate sustainability. As consequence, the digital
footprint on global energy consumption keeps
increasing from year to year and can reach one fifth by
2030, regardless it is feasible to pursue industrial
revolution at moderate pace within fixed energetic
envelope until there is an excess of renewable energy.
The years will pass. The artificial intelligence, big data
and internet of things will become ordinary tools in
many areas of our life just like electricity and telephones,
internet and personal computers did during previous
industrial revolutions. No one will be questioning them
anymore. They stay under human control. The human
society is free to decide up to which extent new
technologies and innovations have to be validated,
regulated and certified for future everyday use.
32 |May 2019
36. serves as the foundation to its Leadership Agenda.
Everyone who wants to form part of its corporate family
should voluntary commit to live by these values, both in
and out of the company. Cementos uses compliance
management software called Convercent that helps it
integrate compliance risks, disclosures, and policies with
day to day operations. Annually, its employees reaffirm
their commitment to its COVEC through Convercent.
To encourage a safe environment and protect employee
wellbeing, the company has a completely anonymous
complaint line for those who wish to report incidents
without placing their privacy at risk. This model of
anonymous reporting applies to everyone in the company,
from the CEO to the entry level employee.
An All Encompassing CEO
Jose Raul Gonzalez is the CEO of Cementos Progreso.
Before joining Progreso he had a 17 year career as CFO of
CBC, the Pepsi Cola anchor bottler for Central America and
the Caribbean where he participated in the design and
execution of the regional expansion of the company. He is a
member of the Board of Trustees of Universidad Francisco
Marroquin where he lectures in economics and is a former
Dean of the School of Economics and the Business School.
He serves in the Board of Directors of the National Center
for Economic Research, a Guatemalan think tank dedicated
to implement social and economic policies and also serves
in the Board of Directors of FICEM, the Ibero-American
Federation of Cement. Jose holds a B.A. in Business
Administration from Universidad Francisco Marroquin in
Guatemala and an MBA in Finance and Economics from
the University of Rochester, N.Y.
ementos Progreso
C
is a Guatemalan
company that endeavors to be
exemplary in the construction
industry. Since it’s founding the organization
has been managed according to strong family
values including ethical behavior and
leadership, solidarity with the community and
a commitment to long term sustainability.
Cementos is characterized by its high-quality
standards in the production and
commercialization of cement, lime, and other
construction materials and services.
Additionally, it partners with communities to
participate in the development and
implementation of projects that improve their
quality of life. Environmental programs that
foster conservation in the areas the company
serves are a key component of its social
responsibility.
Values are Blueprints
Cementos Progreso has a Code of Values,
Ethics and Conduct (known as COVEC),
which represents the values which have guided
the company since its establishment over a
century ago. Every employee should
demonstrate full commitment to achieving its
operational and financial goals with
accountability and minimum tolerance to
failure.
The company believes that its values are the
blueprints by which it measures its actions and
Cementos
Progreso
Promoting Business Ethics Globally
The Most
to watch 2019
34 |May 2019
37. Leading the Industry Since 1899
Cementos Progreso was founded by Carlos F.
Novella, the son of Italian and German
immigrants, in 1899. After graduating as an
engineer in Belgium, he returned to his home
country of Guatemala and decided to
manufacture and sell a product not yet known
in the country, cement. At first, he struggled to
demonstrate the relevance and advantages of
using this new product, but succeeded after
this new product became the cornerstone for
construction.
Long before Corporate Social Responsibility
became popular, his company made significant
contributions to the development of
Guatemalan society by providing medical
services for his workers and their families,
schools for their children, above average
salaries, training in occupational safety and a
deep sense of ethics. Such is the heritage of
those who have the privilege to belong to this
organization.
A century later, Cementos Progreso is an
industry leader renowned for its sound
corporate practices, and a commitment to
safety and the environment. Those efforts have
been recognized by different organizations
such as the British Safety Council or the Great
Place to Work Institute. Furthermore,
Cementos Progreso made history as the first
Guatemalan company to join the UN Global
Compact.
Global Recognition
Cementos Progreso’s Code of Values, Ethic
and Conduct dates back to its origins and
represents the values with which its founder
lived. This has allowed the company to forge a
corporate culture that has led it to stand out for
its ethics. Since 2014, the Ethisphere Institute,
an independent center of research promoting
best practices in corporate ethics and
governance, has recognized Cementos
Progreso as one of the World´s Most Ethical
Companies for exemplifying and advancing
corporate citizenship, transparency and the
standards of integrity. This accolade is the
result of years of commitment at all levels of
the company.
Ethical Approach
According to Cementos Progreso, in this modern financial world where
shareholders own and sell companies at the speed of light, family owned
companies are a rare species and interesting sociological phenomena. In
the troubled environment in which Latin America now finds itself,
privately held companies also perform a valuable yet little known and
seldom appreciated function as they work as a “moral reserve”.
Since the company expects its employees to practice the COVEC in all
areas of their life, it believes that there is an important multiplier effect in
its society. Its colleagues are encouraged to share this behavior code with
their families, their communities and their leaders. It is not unusual for a
Cementos Progreso worker to be identified with these values and become
a moral leader in his or her community.
Together we build
the country where
we want to live in.
Jose Raul Gonzalez
CEO
Cementos Progreso
35|May 2019
38. ovember 3, 1988, is considered as a turning point
Nin the world of Internet. 25 Years ago a Cornell
University graduate student created first computer
worm on the Internet, “Morris Worm.” The Morris worm
was not a destructive worm, but it permanently changed the
culture of the Internet. Before Morris unleashed his worm,
the Internet was like a small town where people thought
little of leaving their doors unlocked. Internet security was
seen as a mostly theoretical problem, and software vendors
treated security flaws as a low priority.
Today, there is a paradigm shift, Morris worm was
motivated more by intellectual curiosity than malice, but it
is not the case today. According to a 2015 Report, 71% of
represented organizations experienced, at least, one
successful cyber attack in the preceding 12 months (up
from 62% the year prior).
According to survey report, discloses that, among 5500
companies in 26 countries around the world, 90% of
businesses admitted a security incident. Additionally, 46%
of the firms lost sensitive data due to an internal or external
security threat. On average enterprises pay US$551,000 to
recover from a security breach. Small and Medium business
spend 38K.
Incidents involving the security failure of a third-party
contractor, fraud by employees, cyber espionage, and
network intrusion appear to be the most damaging for large
enterprises, with average total losses significantly above
other types of the security incident.
Let’s Take a Look at Recurrent Security Threats Types-
Denial of Service Attacks
A denial of service (DoS) attack is an incident in which a
user or organization is deprived of the services of a resource
they would normally expect to have. These attacks are very
common, accounting for more than one-third of all network
attacks reviewed in the report. A standard approach is to
overload the resource with illegitimate requests for service.
Brute Force Attacks
Brute force attack tries to kick down the front door. It’s a
trial-and-error attempt to guess a system’s password. The
Brute Force Attack password cracker software simply uses
all possible combinations to figure out passwords for a
computer or a network server. It is simple and does not
employ any inventive techniques.
Identity Spoofing
IP spoofing, also known as IP address forgery. The hijacker
obtains the IP address of a legitimate host and alters packet
headers so that the regular host appears to be the source. An
attacker might also use special programs to construct IP
packets that seem to originate from valid addresses inside
the corporate intranet.
Browser Attacks
Browser-based attacks target end users who are browsing
Threats
NETWORK SECURITY
Threats
SolutionsSolutions
March 2019|36
39. the internet which in turn can spread in the whole enterprise
network. The attacks may encourage them to unwittingly
download malware disguised as a fake software update or
application. Malicious and compromised websites can also
force malware onto visitors’ systems.
SSL/TLS Attacks
Transport layer security (TLS) ensures the integrity of data
transmitted between two parties (server and client) and also
provides strong authentication for both sides. SSL/TLS
attacks aim to intercept data that is sent over an encrypted
connection. A successful attack enables access to the
unencrypted information. Secure Sockets Layer (SSL)
attacks were more widespread in late 2014, but they remain
prominent today, accounting for 6% of all network attacks
analyzed.
Network Security is an essential element in any
organization’s network infrastructure. Companies are
boosting their investments in proactive control and threat
intelligence services, along with better wireless security,
next-generation firewalls and increasingly advanced
malware detection. The U.S. Federal Government has
spent $100 billion on cyber security over the past decade,
$14 billion budgeted for 2016.
Increased use of technology helps enterprises to maintain
the competitive edge, most businesses are required to
employ IT security personnel full-time to ensure networks
are shielded from the rapidly growing industry of cyber
crime. Following are the methods used by security
specialists to full proof enterprise network system-
Penetration Testing
Penetration testing is a form of hacking which network
security professionals use as a tool to test a network for any
vulnerabilities. During penetration testing IT professionals
use the same methods that hackers use to exploit a network
to identify network security breaches.
Intrusion Detection
Intrusion detection systems are capable of identifying
suspicious activities or acts of unauthorized access over an
enterprise network. The examination includes a malware
scan, review of general network activity, system
vulnerability check, illegal program check, file settings
monitoring, and any other activities that are out of the
ordinary.
Network Access Control
Network Access Controls are delivered using different
methods to control network access by the end user. NACs
offer a defined security policy which is supported by a
network access server that provides the necessary access
authentication and authorization.
Network Security is a race against threats, and many
organizations are a part of this race to help enterprises to
37|May 2019
Editor’s Prespectives
40. secure their network systems. Organizations like IBM, Symantec, Microsoft have created solutions to counter the global
problem of network security threat. These cutting-edge products show genuine promise and are already being used by
enlightened companies.
Good Network Security Solutions Traits
A real security solution should have four major characteristics;
Detect Threats
Targeted attacks are multi-faceted and specially designed to evade many point technologies attempting to identify and
block them. Once they are inside, the only way to find these cyber threats is to understand the behavior of the individual
attack components and use analytics to understand their relationships.
Respond Continuously
Today it is not important that an organization will be attacked, but important and more crucial is to identify when and
how much they can limit the impact and contain their exposure. This means having the capability to respond quickly
once the initial incident has been discovered.
Prevent Attacks
Malware is gettings quick-witted day by day. They utilize heuristics to change their code dynamically. A capable
solution should have an adaptive architecture that evolves with the changing environment, and threats today’s business
faces.
Integration
Today’s threats have multiple facets, and a single software or solution is not sufficient. Protection system should have
the capability to integrate with other security tools from different vendors to work together as a single protection system,
acting as connective tissue for today’s disjointed cyber security infrastructure.
Solutions In Market
Like infectious diseases, cyber threats will never be eradicated entirely, but they can be better contained and understood,
and their effects minimized. How can this be achieved? IBM has built an enterprise-level “immune system,” an adaptive
security architecture to battle today’s cyber pathogens. IBM has developed a vast fleet of products, QRadar, X-Force
Threat Intelligence, Trusteer Pinpoint Malware Detection, IBM Threat Protection System a dynamic, integrated system
to meddle the lifecycle of advanced attacks and prevent loss.
The IBM Threat Protection System integrates with 450 security tools from over 100 vendors acting as connective tissue
for today’s disjointed cyber security infrastructure.
Symantec is another major player in catering enterprise network security systems with Symantec Advanced Threat
Protection. Symantec ATP operates via a single console and works across endpoints, networks, and emails, integrating
with Symantec Endpoint Protection (SEP), and Symantec Email Security cloud, which means organizations do not need
to deploy any new endpoint agents. Symantec says, ATP is the only threat protection appliance that can work with all
three sensors without requiring additional endpoint agents. With ATP, Symantec’s goal is to deliver end-to-end threat
protection, prevention, detection, and response in a single pane of glass, offering more value to businesses than
individual point products can provide. Symantec Advanced Threat Protection combines multiple layers of prevention,
detection, and response.
March 2019|38