Skip to main content
×

GE.com has been updated to serve our three go-forward companies.

Please visit these standalone sites for more information

GE Aerospace | GE Vernova | GE HealthCare 

header-image

Inside the mind of a cybersecurity boss

June 01, 2016
As our world grows ever more connected, with data streaming in all directions from tiny devices and massive machines, the security of the information and the machines being controlled via this connectivity is a growing concern. GE’s Industrial Internet is built on data that connects some $1 trillion of its customers’ assets around the globe. The company’s Chief Information Security Officer (CISO) Tim McKnight has spent more than two decades specialising in cybersecurity for industry and government, including with the FBI.
header-image
cyber-security

Tom Jacob and Karen Shellenback: A Growing Cyber Vulnerability And The Competition for Talent

Tom Jacob Senior Partner And Global Leader Of Research Insights In The Information Solutions Group Of Mercers Talent Division
Karen Shellenback Principal Mercer Research And Insights
January 28, 2016

As part of a regular series featuring content from BRINK, Tom Jacob and Karen Shellenback of Mercer discuss the need for companies to invest in cybersecurity talent to maintain competitiveness.

 
header-image

Ian Bremmer: 5 Patterns Disrupting the World

Ian Bremmer Eurasia Group
September 23, 2015

Five forces are shaping political risks, from climate change to conflict. Here’s what to look out for.

We see patterns everywhere — in nature, in physics and in the world we’ve created — economic booms and recessions; market spikes and crashes; social stability and revolution. But I’ve never accepted George Santayana when he said, Those who cannot remember the past are condemned to repeat it.” Recognizing patterns is one thing. Thinking they’re repeating themselves, that’s something else entirely.
header-image

Pamela Passman: How To Mobilize Risk Management Tools Against IP Threats

Pamela Passman Create Org
December 01, 2014
In an increasingly competitive global economy, information and ideas are the fuel that makes companies viable, allowing them to grow and create jobs.
 

Intellectual property (IP) — that covered by patents, trademarks, copyrights and harder-to-protect trade secrets — is now worth as much as 75 percent of the total value of major companies. But while the importance of these assets has grown, many businesses lag in their efforts to protect IP.
Categories
header-image

Protecting Infrastructure with Smarter CPS

Mit News
October 24, 2014

Saurabh Amin builds resiliency in essential infrastructure networks for transportation, energy and water distribution.

Security of IT networks is continually being improved to protect against malicious hackers. Yet when IT networks interface with infrastructures such as water and electric systems to provide monitoring and control capabilities, they often introduce new vulnerabilities that increase the risks of service disruptions.

 
header-image

William Ruh: What the Rise of Industrial Internet Means for Cyber Security

William Ruh GE
October 23, 2014
Security isn’t what it used to be. Thirty years ago, it was a fence with a locked gate and a guard posted outside a data center. Today, it’s a multi-layered strategy encompassing people, processes, devices, sensors, machines, systems and networks.
 

As the world’s markets rapidly evolve into complex hybrids of physical and digital assets, cyber security is increasingly critical as a stabilizing force. It is no longer an esoteric art practiced mainly by rival intelligence agencies and giant corporations — it has become a basic necessity of everyday life for any business.
header-image

Jennifer Brant: Protecting Trade Secrets to Stimulate Knowledge Flows

Jennifer Brant Innovation Insights
September 04, 2014
As part of a debugging project, an employee of an Indian company, Geometric Ltd., was given access to software source code owned by SolidWorks, a U.S.-based client of the firm.
 

After leaving Geometric, the employee was caught trying to sell the software code to SolidWorks’ competitors. Because Indian law does not recognize the misappropriation of trade secrets, it was not possible to sue the individual. Since the source code belonged to SolidWorks — not Geometric — he technically had not stolen from his employer.
header-image
Perspectives

Companies Mobilizing Against Trade Secret Theft — Q&A with Pamela Passman of CREATe

Pamela Passman Create Org
August 14, 2014
There was a time when the theft of a trade secret elicited a seemingly counterproductive response from the corporate victim — keeping the theft a secret. On one level, such a reaction was understandable, given the risk that going public about the compromise of a key piece of intellectual property (IP) could cause further harm to the bottom line.
 
Categories
header-image

U.S. Giving Up Its Internet ‘Bodyguard’ Role

Robert D Atkinson Information Technology And Innovation Foundation
March 17, 2014
Last Friday the U.S. government indicated it’s giving up its traditional “bodyguard” role of Internet governance.
header-image

Report: Failure to Deal With Cybersecurity Could Cost Global Economy Trillions

January 21, 2014
Failing to deal with the ever increasing global cybersecurity threat could cost the global economy $3 trillion by 2020 and plunge international relations to levels not seen since the Cold War, according to report released by the World Economic Forum just ahead of its annual meeting in Davos, Switzerland.
Subscribe to cybersecurity