Author Archives: rr

The Church of Jesus Christ of Latter-day Saints – General Conference, October 2024 – Themes and Thoughts

The Hand of God by https://yongsungkimart.com

Why Now?

I’ve yet to share about my faith on this site,  but it’s something deeply personal and central to my life. I am a disciple of Jesus Christ -imperfect, but striving. I belong to the Church of Jesus Christ of Latter-Day Saints (https://www.churchofjesuschrist.org/comeuntochrist). (https://www.churchofjesuschrist.org/comeuntochrist).

Why right something now?

 Good question. 

I just watched General Conference with my family. If you don’t know, General Conference is

General conference is the worldwide gathering of The Church of Jesus Christ of Latter-day Saints. Twice a year, during the first weekend of April and the first weekend of October, Church leaders from around the world share messages, or sermons, focused on Jesus Christ and His gospel (see (https://www.churchofjesuschrist.org/feature/general-conference?lang=eng)

Side historical note #1: On June 9, 1830, shortly after the April 6, 1830, organization and establishment of the Church, the first conference was held. Only 27 members were present (https://www.churchofjesuschrist.org/church/news/a-brief-history-of-general-conference?lang=eng)

Side historical note #2: The church of Jesus Christ of Latter-day Saints has published histories of their church as well as the journals of Joseph Smith. Both can be found here: https://history.churchofjesuschrist.org/collection/church-history-publications?lang=eng

I often jot down thoughts and key phrases in my bullet journal (https://bulletjournal.com). This time, I felt inspired to share some of these reflections in a blog post, making it easier to selectively share with others. I was also planning to meet with others to discuss our thoughts and impressions, but couldn’t attend as I am on fall break with my family. So, I will share this posting instead of being there in person. Finally, this process of writing and sharing helps me internalize the impressions and words. These internalized words will lead to action, and conversion.

Of course, I’ll keep some thoughts private, as they’re deeply personal.

Quick Statistics

Yes, I like data. There was a total of 34 talks by 34 speakers (excluding the sustaining of church leaders “talk”).

NameAgeSexBirth CountryOrganization
Elder Neil L. Andersen73MUSQuorum of Twelve Apostles
President Emily Belle Freeman54FUSYoung Women General President
Elder Karl D. Hirst52MUKOf the Seventy
Elder Dale G. Renlund71MUSQuorum of Twelve Apostles
Elder David P. Homer63MUSOf the Seventy
Elder Gregorio E. Casillas49MMexicoOf the Seventy
President Dallin H. Oaks92MUSFirst Presidency
Elder D. Todd Christofferson79MUSQuorum of Twelve Apostles
Elder José A. Teixeira63MPortugalOf the Seventy
Elder Juan Pablo Villar55MChileOf the Seventy
Elder Patrick Kearon63MUKQuorum of Twelve Apostles
Elder David L. Buckner61MUSQuorum of Twelve Apostles
Elder D. Martin Goury60MCôte d’IvoireQuorum of Twelve Apostles
Elder Aroldo B. Cavalcante53MBrazilOf the Seventy
Elder Ulisses Soares66MBrazilQuorum of Twelve Apostles
Elder Gerrit W. Gong70MUSQuorum of Twelve Apostles
Sister Kristin M. Yee43FUSRelief Society
Elder Kyle S. McKay64MUSOf the Seventy
Elder Jorge M. Alvarado53MPuerto RicoOf the Seventy
 Elder David A. Bednar72MUSQuorum of Twelve Apostles
President Jeffrey R. Holland83MUSQuorum of Twelve Apostles
Sister Tracy Y. Browning48FUSPrimary
Elder Brook P. Hales68MUSOf the Seventy
Bishop L. Todd Budge64MUSPresiding Bishopric
Elder Gary E. Stevenson69MUSQuorum of Twelve Apostles
Brother Bradley R. Wilcox64MUSYoung Men 
President Henry B. Eyring91MUSFirst Presidency
Elder Dieter F. Uchtdorf83MCzech RepublicQuorum of Twelve Apostles
Elder Takashi Wada59MJapanOf the Seventy
Elder Ronald A. Rasband73MUSQuorum of Twelve Apostles
Elder Quentin L. Cook84MUSQuorum of Twelve Apostles
Elder Rubén V. Alliaud58MArgentinaOf the Seventy
Elder I. Raymond Egbo50MNigeriaOf the Seventy
President Russell M. Nelson100MUSFirst Presidency
Summary
Average Age66
Percentage Women Speakers9%
Total US born  speakers62%
Total non-US born speakers38%
Total Speakers34

Note – Please see https://newsroom.churchofjesuschrist.org/topic/organizational-structure-of-the-church#:~:text=The%20most%20senior%20apostle%20is,governing%20body%20of%20the%20Church. for more information about each organization listed above.

Word Cloud 

To understand the key themes of General Conference,  I download all the talks and feed them into a word cloud generator like WordClouds. It highlights the top 50 words and their frequencies. 

The top 5 words are:

Here’s what came out of it this time for a word cloud.

I find it beautiful that “hope” and “joy” are also among the top 5 most frequent used words.

If you’re curious whether members of the Church of Jesus Christ of Latter-Day Saints are Christians, just look at the word cloud results: “Christ” was mentioned at least 28 times, making it the 3rd most frequent word in General Conference.  Of course, these are just words, but I would also say that many people I know act like Christ did. I encourage you to search other resources that discuss doctrinal similarities and differences between different sects of Christianity, including the Church of Jesus Christ of Latter-Day Saints.

Here are some examples of sources that explain doctrinal differences.

https://newsroom.churchofjesuschrist.org/article/christian#:~:text=As%20evidenced%20by%20its%20name,the%20divinity%20of%20Jesus%20Christ

https://rsc.byu.edu/latter-day-saint-essentials/catholicism-mormonism

Other statistics about the Church

https://www.pewresearch.org/religious-landscape-study/database/religious-tradition/mormon/

https://newsroom.churchofjesuschrist.org/facts-and-statistics

“Ask, and it shall be given you; seek, and ye shall find; knock, and it shall be opened unto you” (Luke 11 ver. 9 and 10)

One way I prepare for General Conference is by jotting down 6-10 significant questions that weigh on my mind. These are big, important questions. During each talk, I note thoughts and actions relevant to each question. You could see this as a kind of test, or even applying the scientific method. Each year, I hypothesize that all my questions will be answered either directly or indirectly. Over the past four years of practicing this act of faith, I’ve found answers to every one of my questions. This time, five out of my six questions were answered, and the one that wasn’t had already been addressed previously.

One reason that I am member of Church of Jesus Christ of Latter-Day Saints is because the talks at General Conference help me becoming a better father, citizen, husband and person. I would stop going to Church if the doctrine taught and acted on did not accomplish this in my life.  

In this General Conference, the following ideas came to mind about being a better dad and person: 

Being a Better Dad:

  1. Encourage them to ask questions.
  2. Share the doctrine of Jesus Christ whenever possible in simple terms. Show Christ’s doctrine through actions and use words when necessary.
  3. Give them opportunities to be still and go into nature, especially amid so many digital distractions.

Being a Better Person:

  1. Place more effort into growing spiritually. How to measure spiritual growth? Physical growth can be measured in strength and body fat percentage, but for spiritual growth:
    • Is it the number of impressions?
    • Is it the number of impressions that I acted on?
    • Is it the number of things I learned?
  2. Be still. Make time for quiet reflection and focus on Christ.
  3. Be consistent with temple attendance.
  4. Continuously pray for my family to help them navigate the world and resist real temptations of Satan.

General Themes with Associated Quotes from Various Speakers.

*Note – I missed talks on Saturday. The sections below are organized by themes that stood out to me based on words spoken by the speakers. I captured some of these in my journal while others I discovered after re-reading the talks. Each section is followed by a favorite or relevant quote that supports this theme.

Stay the Course and There is Real Opposition (by Elder Holland)

Elder Holland is my favorite apostle.  

Elder Holland has a powerful way with words. His messages about perseverance and recognizing the forces that oppose good resonate deeply. What was the quote that stood out to you the most? Here is mine:

So, if sometimes the harder you try, the more difficult it seems to get; if, just as you try to work on your limitations and your shortcomings, you find someone or something determined to challenge your faith; if, as you labor devotedly, you still feel moments of fear wash over you, remember that it has been so for some of the most faithful and marvelous people in every era of time. Also remember that there is a force in the universe determined to oppose every good thing you try to do.

Asking questions is normal, should be encourages, and helps us grow (by Sister Browning)

Didn’t Joseph Smith journey begin by acting on the question found in James? 

If any of you lack wisdom, let him ask of God, that giveth to all men liberally, and upbraideth not; and it shall be given him (James 1:5). 

We should not discourage people from asking hard spiritual or historical questions about our faith.   This is one of my favorite talks and this quote is really good: 

Asking questions and searching for meaning are a natural and normal part of our mortal experience. At times, not readily having complete answers can bring us to the edge of our understanding, and those limitations can feel frustrating or overwhelming. Wondrously, Heavenly Father’s plan of happiness for all of us is designed to help us progress despite our limitations and accomplish what we cannot accomplish on our own, even without a complete knowledge of all things. God’s plan is merciful toward the limitations of our humanity; provides us with our Savior, Jesus Christ, to be our Good Shepherd; and inspires us to use our agency to choose Him. 

Failure Is Not an Option: Life Helps us Practice True Charity and Patience (by Elder Hales)

One of my favorite quotes:

We will encounter situations that try us and people who enable us to practice true charity and patience….Brothers and sisters, mortality works! It is designed to work! Despite the challenges, heartaches, and difficulties we all face, our loving, wise, and perfect Heavenly Father has designed the plan of happiness such that we are not destined to fail. His plan provides a way for us to rise above our mortal failures. T

Too many distractions. Too much and constant flood of noise. Unplug. Be still (by Elder Budge)

My favorite quotes:

Being still, however, requires more than just making time for the Lord—it requires letting go of our doubtful and fearful thoughts and focusing our hearts and minds on Him…Being still is an act of faith and requires effort. Lectures on Faith states

God desires that we approach our time with Him with the same kind of heartfelt devotion. When we do so, our worship becomes an expression of our love for Him. He yearns for us to commune with Him

On the Sabbath, which in Hebrew means “rest,” what if we were to rest from other cares and to take time to sit quietly with the Lord to pay our devotions unto Him? During our temple worship, what if we were to make a more disciplined effort to pay attention or lingered a little longer in the celestial room in quiet reflection? When our focus is less on doing and more on strengthening our covenant connection with Heavenly Father and Jesus Christ, I testify that each of these sacred moments will be enriched, and we will receive the guidance needed in our personal lives.

Hold on tight. The next 10 years are going to be exciting (by Elder Stevenson)

Favorite quotes:

Between now, 2024, and 2034, we will experience seminal events that will result in extraordinary opportunities to serve, to unite with members and friends, and to introduce The Church of Jesus Christ of Latter-day Saints to more people than ever before.

For you personally, this will be a decade never to be forgotten. But it will be doubly so if you actively strive to become a light unto the world of how the glad tidings of the gospel of Jesus Christ can enrich and enhance not only your lives but also those of your family, friends, and social media followers. You may be wondering how to do this. Prophets of God have taught us this is done through four simple activities, referred to as divinely appointed responsibilities: first, living the gospel of Jesus Christ; second, caring for those in need; third, inviting all to receive the gospel; and fourth, uniting families for eternity. Remarkably, each can be done in the most normal and natural ways.

Teach the Doctrine of Jesus Christ in simple ways  and start now since time is so short (by President Eyring)

This is my favorite talk of the entire general conference.  There are so many inspirational words.  

I thought of every teacher when I heard President Eyring say the following:

As we do our best to teach those we love about the doctrine of Jesus Christ, some may still not respond. Doubts may creep into your mind. You might question whether you know the Savior’s doctrine well enough to teach it effectively. And if you’ve already made attempts to teach it, you may wonder why the positive effects aren’t more visible. Don’t give in to those doubts. Turn to God for help.”

As a father these statements resonated with me:

Some of you may wonder whether it might be better to draw your children closer to you through having fun, or you may ask whether the child may start to feel overwhelmed by your teachings. Instead, we should consider, “With so little time and so few opportunities, what words of doctrine can I share that will strengthen them against the inevitable challenges to their faith?” The words you share today could be the ones they carry with them, and today will soon pass.

Teaching simply allows us to share the saving doctrine early on, while children remain untouched by the deceiver’s temptations that will later confront them, long before the truths they need to learn are drowned out by the noise of social media, peers, and their own personal struggles. We should seize every opportunity to share the teachings of Jesus Christ with children. These teaching moments are precious and far fewer compared to the relentless efforts of opposing forces. For every hour spent instilling doctrine into a child’s life, there are countless hours of opposition filled with messages and images that challenge or ignore those saving truths.

It is tempting to try something new or sensational. But the Holy Ghost will reveal the spirit of truth only as we are cautious and careful not to go beyond teaching true doctrine. One of the surest ways to avoid even getting near false doctrine is to choose to be simple in our teaching. Safety is gained by that simplicity, and little is lost.

Faith Needs to Be Nourished and Rooted in Christ Not Traditions (by Elder Uchtdorf)

The Church has many traditions and a rich culture. Sometimes, I wonder why we do certain things whether there’s doctrine behind the actions or events. My wife often brings this up as well. Elder Uchtdorf’stalk is a great reminder not to confuse Christ’s doctrine with tradition or to mix up what is eternal with what is not.

Here is a good quote

Faith is strong when it has deep roots in personal experience, personal commitment to Jesus Christ, independent of what our traditions are or what others may say or do.

I also created this simple drawing in my journal after listening to Elder Uchtdorf

Pray always and be uplifting (by Elder Rasband)

Two favorite quotes: 

President Nelson has also said: “There has never been a time in the history of the world when knowledge of our Savior is more personally vital and relevant to every human soul. Imagine how quickly the devastating conflicts throughout the world—and those in our individual lives—would be resolved if we all chose to follow Jesus Christ and heed His teachings.”

Brothers and sisters, we need to do more lifting and less murmuring, more upholding the word of the Lord, His ways, and His prophet, who has said: “One of our greatest challenges today is distinguishing between the truths of God and the counterfeits of Satan. That is why the Lord warned us to ‘pray always, … that [we] may conquer Satan, and … escape the hands of the servants of Satan that do uphold [the adversary’s] work’ [Doctrine and Covenants 10:5; emphasis added].”

Reading Bible and Book of Mormon are central to conversion and remaining faithful (by Elder Cook).

Favorite quotes: 

We cannot underestimate the significance of sacred scriptures both in conversions and in remaining faithful in the gospel. The ancient prophets described in the Book of Mormon knew about the mission of Jesus Christ and taught His gospel. The Book of Mormon helps us draw closer to God as we learn, understand, and apply its teachings. The Prophet Joseph Smith taught, “A man [or woman] would get nearer to God by abiding by [the book’s] precepts, than by any other book.”

In many significant respects, the Book of Mormon provides fundamental doctrine that enhances and builds upon the Bible. The doctrine of the Atonement of Jesus Christ is a profound example. The Bible provides an accurate account of the mortal ministry of Jesus Christ, including His death and Resurrection. The Book of Mormon is more explicit about the Atonement of Jesus Christ, something prophets explained in detail prior to His death.

President Russell M. Nelson has said, “I promise that as you prayerfully study the Book of Mormon every day, you will make better decisions—every day.” He also promises that if “you daily immerse yourself in the Book of Mormon, you can be immunized against the evils of the day.

… the internet the equivalent of the box full of written material critical of the Church I described earlier, intended to draw you away from God’s truth.

Both long-term members and those newly studying the gospel need to be intentional about what they view. Do not entertain immoral, dishonest, or unrighteous material. If you do, algorithms can lead you down a path that destroys faith and impairs your eternal progression. You can be acted upon positively or negatively. Seek righteousness and avoid dark internet rabbit holes and doomscrolling. Fill your life with positive, righteous ideas; be joyful; have fun but avoid foolishness. There is a difference. The thirteenth article of faith is a marvelous guide. Above all, immerse yourself regularly in the Book of Mormon, which will draw the Spirit into your life and help you discern truth from error.

Ignore the distractions and Focus on Christ (by Elder Egbo)

One favorite quotes: 

In a similar way, when we ignore the distractions of the world and focus on Christ and His gospel, we are guaranteed success beyond what we can fully imagine and can feel great joy. President Russell M. Nelson taught: “When the focus of our lives is on … Jesus Christ and His gospel, we can feel joy regardless of what is happening—or not happening—in our lives.”

A Message from A Prophet and Person That is 100 Years old –  Study Messages from Conference, Go to the Temple, Rely on Christ and Leverage the Atonement

There are so many memorable  statements by President Nelson

Brothers and sisters, now is the time for you and for me to prepare for the Second Coming of our Lord and Savior, Jesus the Christ. Now is the time for us to make our discipleship our highest priority. In a world filled with dizzying distractions, how can we do this?.. Regular worship in the temple will help us.

Study Conference talks:

In this conference, the Lord has spoken to us through His servants. I urge you to study their messages. Use them as a litmus test of what is true and what is not during the next six months.

Promise of a living Prophet:

Here is my promise to you: Every sincere seeker of Jesus Christ will find Him in the temple. You will feel His mercy. You will find answers to your most vexing questions. You will better comprehend the joy of His gospel. I have learned that the most crucial question we each must answer is this: To whom or to what will I give my life? My decision to follow Jesus Christ is the most important decision I have ever made…. Since then our Savior has been the rock upon which I have built my life. That choice has made all the difference! That decision has made so many other decisions easier. That decision has given me purpose and direction. It has also helped me weather the storms of life. 

This comment surprised me:

When Wendy and I were on assignment in a distant land, armed robbers put a gun to my head and pulled the trigger. But the gun did not fire. Throughout that experience, both of our lives were threatened. Yet Wendy and I felt an undeniable peace. It was the peace “which passeth all understanding.”

Amazing promises by Christ to all of us:

Please listen to this promise of Jesus Christ to you: “I will be on your right hand and on your left, and my Spirit shall be in your hearts, and mine angels round about you, to bear you up.

Devote time to understand the Atonement

I urge you to devote time each week—for the rest of your life—to increase your understanding of the Atonement of Jesus Christ. 

Give your afflictions to Christ

Jesus Christ took upon Himself your sins, your pains, your heartaches, and your infirmities. You do not have to bear them alone! He will forgive you as you repent. He will bless you with what you need. He will heal your wounded soul.As you yoke yourself to Him, your burdens will feel lighter.If you will make and keep covenants to follow Jesus Christ, you will find that the painful moments of your life are temporary. Your afflictions will be “swallowed up in the joy of Christ.”

Dedicated your life to Christ

I call upon you to rededicate your lives to Jesus Christ. I call upon you to help gather scattered Israel and to prepare the world for the Second Coming of the Lord. I call upon you to talk of Christ, testify of Christ, have faith in Christ, and rejoice in Christ!

The Secret to Joy by 100 year old

Come unto Christ and “offer your whole [soul]” to Him.This is the secret to a life of joy!

Best is still coming

The best is yet to come, my dear brothers and sisters, because the Savior is coming again! The best is yet to come because the Lord is hastening His work. The best is yet to come as we fully turn our hearts and our lives to Jesus Christ.

Bonus – Messages from Leadership Training during General Conference.

If you wonder what the Church of Jesus Christ of Latter-Day saints core tenants are, the images below summarizes them (by Elder Patrick Kearon). Each tenant is 

as a strand in a cable woven together. Each strand is strong on its own, but as each of these areas works together, there is a combined spiritual strength. There should be a balanced effort in each area as they weave together. Those strands help to sustain and lift a bridge of faith. That bridge helps each member and friend of the Church in their faith journey

The work of the Church is one work centered in Jesus Christ. This one work consists of the five following areas:

  1. Missionary Work
  2. Ministering
  3. Rising Generation
  4. Temple
  5. Welfare

What does Lego have to do with Cybersecurity Architecture?

Great question!  Despite the risk of spoiling future “ice breakers,” let me share an exercise that answers the question through action. Enough talking—no academic architects needed today!

  1. Purchase 3-4 identical LEGO kits, each containing between 100-200 pieces. Choose a set that aligns with your organization’s field. For instance, if you’re in healthcare or manufacturing, opt for a car model.
  2. Unbox all the kits, combine all the pieces into a single bag, mix them thoroughly, and then pour them into a pile.


3) Show a “rules” slide. Below is an example from the last exercise.

4) organize the participants into group of 2-3 people

5) tell people to start.

So, what typically happens next? Well, people love building with LEGO bricks—who doesn’t, right? In every instance I’ve run this exercise, everyone immediately starts grabbing pieces and building something. Why do they do this? Maybe they’re eager to relive fond childhood memories. Perhaps they’re doers who just want to complete the task. Or maybe they feel the competitive pressure of the timer. Regardless, the architects communicate with each other and have a great time. While no one has burst into singing “Everything is Awesome” (see this https://youtu.be/9cQgQIMlwWw?si=ODUGkwCohYu8eeuK), I usually walk around, taking pictures to capture their progress and final creations. 

Now, you might be curious about how I handle questions. For this exercise, I used Microsoft Copilot to create a fictional press release between onsemi and Waymo. Depending on the question, I would share this press release.. I have highlighted some key “attributes” within the press release. If you noticed the quotes around “attributes,” you’re right—they refer to SABSA business attributes.

Fictional Press release by Microsoft Co-pilot–

Press Release

onsemi and Waymo Announce Strategic Partnership to Develop Solar-Powered Autonomous Vehicles with Open Design Access

Phoenix, AZ – September 21, 2024 – onsemi (Nasdaq: ON), a leader in intelligent power and sensing technologies, today announced a strategic partnership with Waymo, an autonomous driving technology company, to develop a new generation of solar-powered autonomous, 1 person automobile. This collaboration aims to integrate onsemi’s advanced semiconductor solutions with Waymo’s state-of-the-art autonomous driving systems to create a sustainable and efficient transportation solution. Additionally, the partnership will make the vehicle design available to the public, encouraging innovation and collaboration within the industry.

Hassane El-Khoury, CEO of onsemi, stated:

“We are thrilled to partner with Waymo on this groundbreaking project. This partnership not only represents a significant advancement in sustainable and autonomous transportation but also embodies our commitment to open innovation. By making the design of our solar-powered vehicle available to the public, we aim to foster a collaborative environment where innovators and enthusiasts can contribute to the future of mobility.”

Key Requirements of the Partnership:

  1. Integration of Solar Technology: The vehicles will be equipped with advanced solar panels to harness renewable energy, significantly reducing the reliance on traditional fuel sources.
  2. Advanced Semiconductor Solutions: onsemi will provide high-efficiency power management and sensing technologies to optimize the vehicle’s performance and energy consumption.
  3. Autonomous Driving Systems: Waymo will integrate its latest autonomous driving technology to ensure safe and reliable operation of the vehicles.
  4. Sustainability Goals: Both companies are committed to achieving significant reductions in carbon emissions and promoting the use of renewable energy in the automotive sector.
  5. Open Design Access: The partnership will release the vehicle design to the public, allowing engineers, developers, and hobbyists to access and contribute to the development of solar-powered autonomous vehicles.

Innovation and Development: The partnership will focus on continuous innovation and development to push the boundaries of what is possible in autonomous and sustainable transportation.

About onsemi: onsemi (Nasdaq: ON) is driving disruptive innovations to help build a better future. With a focus on automotive and industrial end-markets, the company is accelerating change in megatrends such as vehicle electrification and safety, sustainable energy grids, industrial automation, and 5G and cloud infrastructure. onsemi is headquartered in Phoenix, Arizona, and has a global network of manufacturing facilities, sales offices, and design centers.

About Waymo: Waymo is an autonomous driving technology company with a mission to make it safe and easy for people and things to move around. Since its inception as the Google Self-Driving Car Project in 2009, Waymo has been focused on building the world’s most experienced driver and making it available to everyone.

————————————————————————————————

In this particular exercise, I would have provided the instructions that come with the LEGO set if participants had asked to see the published “open design.”

After the time has elapsed, I ask the following question:

  1. What does LEGO have to do with cybersecurity architecture?

Here are some answers:

  1. Efficient, reusable building blocks
  2. Modularity of the blocks
  3. Scalability of the blocks.
  4. Interconnected nature of blocks allow adaptable and efficient models

All of these answers are accurate. However, the key answer is requirements gathering. How do you know what your customer wants, in this case, the CEO of onsemi, if you don’t ask them? If participants had asked “great questions,” as Andrew Townley always advocates, I would have given them pieces of paper with attributes important to Hassane in this fictional scenario.

Of course, you can potentially guess some of the things the customer wants. For example, in this instance, each team created a solar-powered car and a one-person car. You can see the check marks beside the attributes in the picture. However, the teams missed the business objectives of the Waymo partnership: safety and autonomy. How does the final product compare to the imaginary one that Hassan had in mind?

What does this mean? We should always help our customers deliver value. We cannot be roadblocks, even ones made of LEGO bricks. We must always prioritize safety. One way to keep them safe is by ensuring we ask and understand their requirements. This increases the likelihood that the operationalized solution meets the needs of the organization. Don’t get too caught up in the pressure of a “timer.” Don’t get me wrong. We got to deliver and timelines need to be met. Pause, do your homework, ask great questions, and get those requirements documented.

Business Contextual Architecture – Keelson Management, a wholly owned subsidiary of CMA CMG

Figure 1 – Business Contextual Architecture for Keelson Management

This is a follow up post to another one that focuses on Port and Terminal Cybersecurity in general. This post focuses on the business contextual architecture of a company responsible for maritime terminal cybersecurity, Keelson Management. This is another use case for The Agile Security System by @Andrew Townley.

Please refer to others postings on The Agile Security System: 1) Overview of The Agile Security System; 2) Overall approach for producing the output for business contextual architectures and initial observations; 3) the efficiency gains via re-use, iterations, and time boxing of this approach; 4) value of this approach – why and help prioritize tactics; and 5) Developing a cybersecurity objectives or business attributes for a cybersecurity strategy based on mitigations to risks to business objectives.

Let me know what you think! 

~R&R, 
Everyone Needs Some!

Initial Observations

  1. In the realm of Maritime Transport Systems (MTS), it’s imperative for organizations to designate a Cybersecurity Officer (CySO). The CySO’s key responsibility revolves around developing, revising, and disseminating a “Cyber Annex” to Facility Security Officers. This annex serves as a guarantee that the cybersecurity measures and risk mitigation efforts pertaining to the facility’s physical security and safety are pertinent and adequate. Essentially, it serves as a strategic roadmap to tackle the cybersecurity challenges inherent in MTS. You can find more details about the Cyber Annex at this link: Cyber Annex Guide. It’s worth noting that while the Cyber Annex is a robust strategy, it may not encompass all potential cybersecurity vulnerabilities or remedies. Some might wonder about the necessity of introducing the “CySO” role (vs “CISO” by the US Coast Guard). Nevertheless, for MTS organizations like Keelson, ensuring a cybersecurity strategy aligns with the security objectives of being “Assured” and “Compliant” are paramount.
  2. Like organizations in other industries, effective management of cyber risk is critical to the success of an MTS organization. A successful cyber-attack can lead to several risks for US ports and terminals. Refer to the CISA diagram, the Port Facility Cybersecurity risk,  for a list of cybersecurity risk.  “Risk-Managed’ and “Integrity-Assured” are critical security objectives of any cybersecurity strategy.
  3. Maritime ports are a rich environment for cyber-attacks. For example, a recent study from Rutgers shows various scenarios of physical and cyber-attacks against MTS organization. MTS organizations need to recognize that cyber-attacks translate to real business risk and need to manage it. MTS organizations need to understand that threat actors are “burrowing” into their environments in preparation for future conflicts (refer to minute 30 [ish] of the US House Select Committee on the CCP, “The CCP Cyber Threat to the American Homeland and National Security,” dated 01/31/2024) “Risk-Managed,” and  “Educated” (about cyber-attacks on their operating environment) are key objectives. 
  4. The MTS is an industry that has a very visible intersection between the physical and cybersecurity worlds.  The compromise of operational technology (OT) ships or systems ashore can result in considerable harm to personal safety and security of ships, ports and marine facilitiesFacility Security Assessments (i.e., physical security risk assessments) , as required by the US Coast Guard as part of their Navigation and Vessel Inspection Circular No. 01-20 (NVIC 01-20), includes a review of computing systems and networks; the goal is to understand if cybersecurity vulnerabilities can be exploited to compromise physical controls.  As such,  US Coast Guard provides recommendations that MTS organizations create a traceability matrix between cybersecurity vulnerabilities and their associated physical security vulnerabilities. US Coast Guard also recommends a traceability matrix between cybersecurity protections and the cybersecurity vulnerabilities they remediate. “Safe” and “Compliant” are  important security objectives that need to be part of cybersecurity strategy. 
  5. Practice. Practice. Practice. Incident Response, Business Continuity plans and alert triage playbooks all need to practiced on a regular basis. IR plans must include contacting the FBI, US Coast Guard (i.e., Captain of the Port),  and CISA. “Usable,” “Documented”, “Maintained” and “Governed” are critical objectives for any cybersecurity program.  
  6. MTS organizations should use the NIST Cybersecurity Framework to measure effectiveness via a maturity assessment and benchmarking with peers.  I recommend hiring a 3rd party to complete an initial maturity assessment and require them to provide a benchmark of the MTS sector.  It is critical that any target maturity needs to be calibrated with the risk management and governance of the organization (i.e., NIST CsF Profile). The US Coast Guard recommends using the NIST Cybersecurity Framework (CSF) as the preferred framework for aligning cybersecurity protections, which includes a baseline with various maturity levels. To simplify implementation, I suggest mapping the NIST CSF to CIS Critical Security Controls, incorporating the CIS Controls ICS Implementation Guide for more practical guidance on control implementation. It’s crucial to extend this mapping to the MITRE ATT&CK framework and ensure that assessments encompass the scope of technology deployment, procedures, and staffing levels/skills. Technology is at best ineffective at worst useless without process, correct staffing levels and skill sets. I also recommend reviewing NIST’s website for latest information on NIST CsF 2.0, including the new “Govern” function and Informative References. Today, there is no Community Profile specific to MTS, although there is one for the PNT. MTS organizations heavily use PNT. As such, “Compliant” “Usable”  “Governed” and “Effective” are key attributes or security objectives. 
  7. Threat intelligence and collaboration is critical between organizations and entities in the MTS; this also applies between CMA CMG corporation and their subsidiaries.  MTS organization should participate in and contribute to the Maritime Transportation System Information Sharing and Analysis Center and the annual Maritime Cybersecurity Summit .  The MTS-ISAC publishes an annual report outlining trends that MTS should be aware of. For example, the 2023 report provides the following reasons for increased risk for MTS organizations:  a) geopolitical tension; b) inability for MTS organizations (or governments) to counter or pushing nation states or criminals for cyber-attacks. c) economy is driving underemployed or unemployed to cybercrime; d) MTS organizations lag behind in technology and require modernization; and e) an increase in 3rd party integrations.  CMA appears to have a threat intelligence capabilities based on their advisories regarding  conflicts in world. “Threat-Managed” is an important security objective of Keelson Management cybersecurity strategy.
  8. Due to the heavy use of OT, OT Cybersecurity needs to be prioritized in terms skill set and process. Need specialization and support for Operational Technology.  NIST has published a guide on OT Security (NIST SP 800-32r, According to attacks on OT systems in the maritime industry has increased by 900% since 2017 (in 2021; see https://sustainableworldports.org/wp-content/uploads/IAPH-Cybersecurity-Guidelines-version-1_0.pdf).
  9. It is imperative for MTS organizations to ensure the defensibility of their cybersecurity programs. I recently engaged in a conversation with a former Chief Information Security Officer (CISO) from a chip manufacturing company. Despite having a budget that surpassed many other organizations, he acknowledged that his organization still faced successful cybersecurity incidents. Every MTS organization must acknowledge the inevitability of compromises. These organizations cannot solely rely on outspending or outskilling threat actors, particularly those backed by nation states. For instance, according to Chris Way, the Director of the FBI, the People’s Republic of China (PRC) boasts the largest hacking program globally, surpassing the combined efforts of all major countries and outnumbering U.S. government hackers 50 to 1 (refer to minute 20 of the Select Committee on the CCP, “The CCP Cyber Threat to the American Homeland and National Security,” dated 01/31/2024). Furthermore, a 2023 MTS-ISAC report highlighted a concerning trend where countries tend to police MTS victims of cyber-attacks and attribute blame to them, rather than holding accountable the threat actor groups responsible. A critical cybersecurity objective of any cybersecurity program is “Auditable.”
  10. Network segmentation is critical for MTS organizations. The US Coast Guard published a simple network architecture that highlights an approach to this segmentation. 
Figure 2 – Basic Architecture for Segmentation Based on System Category

Initial Questions

  1. Is the business contextual architecture correct?  What is missing? 
  2. Where do requirements for Keelson come from? Below is a listing of sources for potential requirements for a company, like Keelson, operating seaport container terminals in the US. It is imperative for a company to assign a role to consistently review these sources along with others to draft company specific policies and standards and training material.  Cybersecurity staff would have to collaborate with legal and compliance teams. Here is a quick list of potential sources:  a) International Association of Ports and Harbors (IAPH); b) US Coast Guard (USCG). US Coast Guard has published several guidance documents: i) Navigation and Vessel Inspection Circular (NVIC 01-20) ; ii) Maritime Cybersecurity Assessment and Annex Guide (MCAAG); c) Cybersecurity and Infrastructure Security Agency (CISA); d) Baltic and International Maritime Council (BIMCO); e) International Maritime Organization (IMO).; f) Jones Walker Survey ; g) ISO/IEC 27001; h) Executive Order on Amending Regulations Relating to the Safeguarding of Vessels, Harbors, Ports, and Waterfront Facilities of the United States; h) NIST Cybersecurity Framework (version 2.0); i) Corporate CMA CMG Policies and Standards.
  3. Are the roles and responsibilities been clearly defined by CMA and Keelson? Why was Keelson originally setup as a wholly owned subsidiary of CMA? 

Port and Terminal Cybersecurity

Following President Biden’s recent executive order on “Amending Regulations Relating to the Safeguarding of Vessels, Harbors, Ports, and Waterfront Facilities of the United States” I quickly delved into some research and discovered four valuable resources. Side note, one thing that I love about the cybersecurity field is the opportunity to use your expertise to contribute and make a positive impact across various industries.

Port Facility Cybersecurity Risks Infographic

Jones Walker 2022 Ports and Terminals Cybersecurity Survey

International Association of Ports and Harbors (IAPH) 

US Coast Guard – Domestic Ports Division

Business Contextual Architecture – SC Johnson & Son, A Manufacturer and the Value of Re-Usable Architecture

Figure 1 – Business Contextual Architecture (i.e., Domain Impact Worksheet) – SC Johnson

Greetings, fellow architect or cybersecurity strategist! Imagine if you had a looming deadline and a meeting scheduled with a stakeholder in just two hours, especially as a newcomer to the company or potentially a new customer, preparation is key.

In tackling this challenge, consider leveraging the Agile Security System (TASS) for a streamlined approach. 

Note: for a deeper understanding of the methodology, refer to the insights provided in the Rogers post

This article, however, won’t introduce new techniques; instead, it underscores the efficacy of TASS, particularly in swiftly delivering a business contextual  architecture. The swiftness of TASS is attributed to key factors: simplicity over complicated models in software, a focus on iterations over perfectionism, and a commitment to re-usability.

In terms of re-usability (#3), it’s noteworthy that the domain impact worksheet incorporates elements from another manufacturing company, ON. This re-usability extends beyond the worksheet itself to encompass requirements, risks, mitigations, and even initial observations and questions specific to a particular domain. The versatility of TASS lies in its ability to adapt and apply proven elements across various aspects, facilitating a more efficient and effective approach to cybersecurity strategy. A word of caution though: do not the let beauty of this approach turn you into a “lazy” (not in smart way) and “autopilot architect.”

I prefer to “practice what I preach,” hence I’ve established a two-hour time limit to complete this post. This includes conducting research, developing the domain impact worksheet, formulating observations and questions, and finally, posting the content on the blog. And yes, I leverage ChatGPT to help improve how some of the content is written. Hopefully, ChatGPT doesn’t completely eliminate my personality from the writing!

Let me know what you think! 

~R&R,
Everyone Needs Some!

Initial Observations

ObservationRe-useableDetailed Information
SC Johnson must protect their intellectual property (IP Yes See ON Semiconductor posting
SC Johnson must have advanced capabilities in intrusion detection, web security, threat intelligence, and trainingYesSee ON Semiconductor posting
SC Johnson security, encompassing both facility and infrastructure, including cybersecurity, is crucial for ensuring safety, operational effectiveness and profitability.YesSee ON Semiconductor posting
SC Johnson must gather and keep up with laws and regulations and translating them into physical, administrative, and technical controlsYesSee ON Semiconductor posting Note – one unique source of requirements is the US Environmental Protection Agenda List of Lists – Consolidated List of Chemicals
SC Johnson must establish an Enterprise Architecture (EA) capabilityYesSee ON Semiconductor posting
Note – EA function is even more important in light of SC Johnson strategy to make the world a better place through various initiatives (like Base of the Pyramid Team, Blue Paradox)
SC Johnson cybersecurity capabilities must encompass attack surface management and threat intelligenceYesSee ON Semiconductor posting
SC Johnson must have a strategy for cloud governance, process, people and technology.YesSee Rogers Posting
Table 1 – Re-usable Observations

Initial Questions

Re-useable questions for another manufacturer organization 

  1. Is the accuracy of the business architecture confirmed, and is there any essential component missing?
  2. Does a reference architecture exist for a specific plant that includes cybersecurity requirements? How is the integration handled in the event of a merger with a new company? 
  3. What role does IT and Cybersecurity play in the expansion or installation of a new manufacturing facility?
  4. In what ways can Cybersecurity support and safeguard Research and Development (R&D) efforts? 
  5. Is there a defined policy or stance regarding Generative AI, and does SC Johnson have an Emerging Technology Committee in place?

Unique Questions

  1. What critical applications are needed for the key processes identified? 
  2. How integrated are SC Johnson’s partners in terms of their networks or data sharing?
  3. Has the executive leadership team written a “risk factors” report (like the risk factor section of a SEC filing)?

Patagonia cave paintings – 8200 years old

A cave in northwestern Patagonia, Argentina, contains 895 painted designs

I read this article today, “ These South American cave paintings reveal a surprisingly old tradition” in sciencenews.org. An archaeologist cited in the article states that the “Paint pigments used in the Argentinian cave designs provided the oldest direct dates for rock art in the Americas.” Very cool.

Data Brokers – Consumer Data and Analytics Industries

Figure 1 – Types of consumer data and data companies (source – FastCompany.com)

Recently, I came across a LinkedIn post (see Figure 2 below for visual representation) that delved into the intricate journey of data from its inception to consumption.

Figure 2 – Journey of data (source Manisha Lodha)

While it was interesting, it triggered my contemplation on the analogous process concerning our personal data – its collection, analysis, sale, and exploitation for various purposes, notably in marketing. Yes, I’m referring to the realm of the data broker economy. The current estimated size of this economy is $280 to $319 billion depending on source, and is forecasted to go to $545 billion by 2028 according to one source. A relatively recent study concluded that “people don’t understand what marketers are learning about them online and don’t want their data collected, but feel powerless to stop it.” The accompanying graphic (Figure 1) shed some light on the subject, prompting me to delve deeper through additional research into this area.

Business Contextual Architecture – Another Manufacturer Use Case (ON Semiconductor)

Figure 1 – Business Contextual Architecture – ON Semiconductor

Delve into another instance of harnessing the Agile Security System. This time the focus is on ON Semiconductor. For insights into the methodology, kindly consult the Rogers post. This article will spotlight a couple of ways in which this approach can prove beneficial for individuals in these specific functions:

  1. Security Operations Center (including cloud)
  2. Incident Response
  3. Security Technology Management (i.e. firewall, email, EDR, cloud-native tools etc.)
  4. Identity Access & Management
  5. Identity Operations
  6. Threat hunting & Intelligence
  7. End point management.
  8. Forensics
  9. Detection Engineering
  10. Data Protection Engineering
  11. Vulnerability Management

Value of Agile Security System “Artifacts” for Non-Architecture Functions

  1. It addresses the fundamental “why” behind your role, serving as a source of inspiration. If you haven’t already, consider watching Simon Sinek’s older, but insightful video on this topic (https://youtu.be/Jeg3lIK8lro?si=K9xJGldk1AfQ-zMT) or read his book, “Start with Why.” Utilizing the business contextual architecture enables you to connect your role with the organization’s value. This approach reminds you that your role is an integral part of a larger system or context. Despite the allure and “coolness” of your role (e.g., Penetration Tester, Digital Forensic Examiner, Cloud Security Architect, or Threat Intelligence Analyst), cybersecurity doesn’t operate in isolation; it exists to deliver value. In your role, you contribute to the organization’s success by providing value that aligns with its goals. To put it another way, your role exists to the help the company “win” by helping them managing risk, so they “score points,” “win the game,” “win the championship or season” and be “winners” over decades of time (e.g. IBM, AT&T, GE etc.)  What happens to players that don’t help their teams’ win? Yep, they get traded (here is video by Reed Hasting that talks about this analogy).

Side note – I also like Sinek’s view on high performing teams too (https://www.youtube.com/watch?v=zP9jpxitfb4 and https://www.youtube.com/watch?v=PTo9e3ILmms)

At ON, you create value by assisting customers in solving complex problems, contributing to the development of cutting-edge products, supporting the achievement of net-zero emissions by 2040, and facilitating profitable revenue growth. You must help ON do this better and before their competitors. That is it .

This linkage between your cybersecurity function and value becomes clearer when using the Agile Security System’s Baseline Enterprise Perspective ( Figure 2) and the company specific business architecture. The Baseline Enterprise Perspective shows the relationships between the different domains.  For example, the “Other” (Figure 1) in the People domain help <<deliver>> services that <<create>> financial, social and business value.  Another example is how the “Other” (Figure 1) in the People domain <<manage>>  and <<build>> Information Technology, which, in turn, <<supports>> Process and <<represents” Information, which in turn, <<has>> financial value.

Figure 2 – Agile Security System Baseline Enterprise Perspective

It aids in prioritizing operational activities of your cybersecurity functioning by providing answers to key questions such as:

  • Where should I begin vulnerability scanning or requiring continuous scanning? 
  • What area needs to be “hunted” (and cleared of) for threat actors? 
  • What alerts and incidents should the SOC and/or IR team prioritize? 
  • Where should data protection engineering begin focusing their efforts?
  • What changes should be assigned a higher risk within the change management process? 
  • What roles should undergo IAM access reviews? 
  • What detection alerts should be created by the Detection Engineering team?
  • What use cases should the forensics team plan for? 

The answer to questions like those above can be uncovered using the architecture depicted in Figure 1 as well as creating an Agile Security System Baseline Service perspective for each service listed in the Services domain (see Figure 3 for the Baseline Service perspective).  While the architecture may lack specific technical details like hostnames and IP addresses, obtaining this information and ensuring its accurate linkage to the appropriate parent domain is easily achievable. The primary takeaway is that you now possess an understanding of the crucial services, products, and information contributing to value creation. Our mission is to safeguard and enable this value.

In the case of ON, it’s imperative to conduct vulnerability scans and complete IAM access reviews for applications, platforms, and networks supporting identified in the processes. With the recent acquisitions of “EFK” and “GT Advanced,” can a Zero Trust Network Access solution be deployed to expedite integration while minimizing risks? Does the threat hunting team thoroughly assess the networks associated with EFK and GT Advanced? Do they replicate this exercise when a manufacturing facility expands operations or a new one is built? Did the threat intel team and 3rd party risk team participate in the due diligence process for acquiring EFK and GT Advanced as well as the joint venture with Leshan? 

Furthermore, have the detection engineering, data protection engineer, and SOC teams prioritized alerts, DLP rules, and responses for unlikely or unauthorized scenarios? For instance, if an employee in the Sales, Marketing, or IT teams transfers IP information from the US to a Chinese location, how are these situations managed? When the engineering team overseeing firewalls upgrades a firewall responsible for routing/monitoring traffic from a manufacturing process, should this change be considered high-risk even with a high-availability setup? Considering scenarios where an IR or forensic team might need to take a system offline, how do they assess the potential impact of such a decision? IR and forensics teams can refer to the business contextual architecture for insights! 

Do you have the responsibility of devising tabletop exercise scenarios? It’s no surprise that you can utilize the business contextual architecture to aid in this task. For example, Understanding that Sales & Marketing services and associated processes play a crucial role in ON’s success, you could focus a tabletop exercise focused on the systems supporting Sales and Marketing processes and what happens if there are unavailable due to a ransomware attack.

Figure 3 – Agile Security System’s Baseline Service Perspective

Initial Observations

  1. ON must protect their intellectual property (IP).  In the same aforementioned article by Anne Meixner, it is highlighted that individuals with access to critical systems and data within a company can become a security risk, either through intentional malicious actions or unintentional compromise due to human error. An illustrative instance of human error is provided, where engineers inadvertently leaked Samsung trade secrets using ChatGPT. To mitigate such risks, implementing administrative controls such as non-disclosure agreements, confidentiality agreements, trademarks, and educational initiatives becomes crucial. This underscores the need for a well-established insider risk management program to address and mitigate potential threats originating from within the organization. Effectively safeguarding ON’s IP necessitates the integration of security objectives that prioritize Confidentiality, Classification, Threat-Managed, Access-Control, Education, Authorization, Identification  Legal, Duty-Segregation, Governance, Risk-Management and Monitoring.
  2. It is imperative for ON to possess advanced capabilities in intrusion detection, web security, threat intelligence, and training. According to the 2023 Verizon data breach report, surprisingly, only 1% of reported breaches in the Manufacturing sector involved partners, while a significant 90% were attributed to external threat actors. The predominant attack patterns observed were system intrusions, social engineering, and basic web attacks. In the context of motivation, threat actors primarily targeted organizations in the Manufacturing sector for financial gain, espionage, and convenience. Given this landscape, robust threat intelligence capabilities play a pivotal role in comprehending, identifying, and containing attacks driven by espionage motives.The above requires the cybersecurity strategy to incorporate the security objectives that prioritize Confidentiality, , Threat-Managed, Access-Control, Education, Risk-Management and Monitoring.
  3. A comprehensive vulnerability management program is crucial for ON’s security. Once again, in the article “Securing Chip Manufacturing Against Growing Cyber Threats,” Meixner references Joon Ahn, a vice president in the IT division at Amkor Technology, a company specializing in wafer level and packing assembly. According to Ahn, a notable gap in the semiconductor industry lies in connectivity vulnerabilities. Smart manufacturing technologies heavily rely on connectivity, introducing vulnerabilities as hackers target unsecured network connections to gain access to sensitive systems. The vulnerability management program should be leveraging CVSS 4.0 and have adequate resources assigned to monitor potential vulnerabilities affecting ON’s environment. To address integrity-related security objectives, ON must prioritize Vulnerability-Managed, Change-Managed, Configuration-Managed, Auditable, and Maintenance as essential components of its security strategy.
  4. As an “outsider” of the semiconductor industry, a semiconductor company like ON has to invest A LOT of capital and operational funds to setup a manufacturer facility.   One University of Berkeley  study has an estimated range of 3-4 billion US dollars.   Every dollar spent on cybersecurity is a dollar taken away from running a manufacturer facility or profit creating service or process.  To state the obvious, any security strategy needs to incorporate the security objectives of Cost-Effective and Efficient. 
  5. It seems that ON acknowledges the necessity of incorporating education and awareness into their cybersecurity strategy for both customers and suppliers (see https://www.onsemi.com/company/events/webinars/don-t-let-cybersecurity-become-the-weakest-link-in-the-automotive-system for an example).
  6. Security, encompassing both facility and infrastructure, including cybersecurity, is crucial for ensuring safety, operational effectiveness and profitability. As articulated in ON’s 10K filing, any inability to use manufacturing facilities, testing facilities, and external manufacturers at anticipated or minimum purchase obligation levels, or a scenario where production capacity expands without a proportional increase in revenue, may lead to fixed costs and operating expenses associated with these facilities and arrangements not being fully absorbed. This could result in elevated average unit costs and diminished gross profits, potentially causing a significant adverse impact on ON’s operational outcomes. Additionally, as Joon Ahn, vice present at Amkor Technology summarized in an article on semiengineering.com, physical security becomes increasingly important as manufacturing facilities become more automated.  Unauthorized access to the factory floor can result in equipment damage or theft. Any security strategy needs to incorporate the security objectives of Risk-Managed, Threat-Managed, Access-Controlled, and Interoperable.
  7. Application security is fundamental.  This becomes even more clear and scarier when you read the opinion post by Lumpkin and Levin (2022) in the article “The mother of all ‘zero-days’  – immortal flaws in semiconductor chips.” They state the following:

    Every chip starts life as a software program before it is fabricated, mostly in Asia, and mostly in Taiwan, into a chip. The process that transforms design code into “sand in the hand” silicon is just as vulnerable today as consumer applications were in the early 2010s, and for all the same reasons. The impact is deeper and more penetrating because once a chip is compromised, it is nearly impossible to patch. It might be in space or under an ocean. Our enemies know this too.

    This means that software flaws needed to be detected and remediated continuously throughout the development lifecycle and iterations.  Application security cannot be bolted on, but designed and built in.  Any ON cybersecurity strategy must be structured to address the security objectives of Risk-Managed, Awareness, Threat-Managed, Integrity-Assured and Compliant. 
  8. Like all organizations, ON must gather and keep up with laws and regulations and translating them into physical, administrative and technical controls. As a manufacturer, ON has several of same sources for requirements as those posted for Rogers. Cybersecurity strategy must be organized to address the security objectives of Auditable, Legal and Compliant. Here are some potential  sources for cybersecurity requirements: a) United States Patent and Trademark Office; b) United States Uniform Trade Secrets Act; c) United States Sarbanes-Oxley Act of 2002; d) European Union’s General Data Protection Regulation; e) United States Patent and Trademark Office; f) Canadian Bill C-27; g) SEMI E187 and SEMI E188 Standards; h) Creating Helpful Incentives to Produce Semiconductors and Science Act; i) United States Inflation Reduction Act; j)the International Traffic in Arms Regulation promulgated under the Arms Export Control Act (“ITAR”; k)  United States Foreign Corrupt Practices Act (“FCPA”); l)  anti-boycott provisions of the U.S. Export Administration Act; m) United States Responsible Business Alliance (“RBA”) Code of Conduct United States; n) FCPA (anti-corruption laws); o) NIST 800-171.

    If you’re curious about how the Agile Security System manages requirements engineering, please consult the Figures 5, 6, and 7 provided below (prior to the questions section). It’s important to note that these figures are not complete and would require further iterations. The figure also only show the first page of the domain analysis worksheet too. This aspect is notably robust within the Agile Security System, allowing you to follow a set of requirements, objectives, or goals within a specific domain, along with their associated risks and mitigations. Notably, these aspects directly correspond to cybersecurity strategy. This process can be defined as the threat modeling of the business context. As per the threat modeling manifesto, the process involves addressing four key questions: a) What are we building (requirements, goals, objectives)?; b) What could go wrong (risks)? c) How do we plan to address it (mitigations)? d) Have we done an adequate job? The final question involves a “gut check” to evaluate the documentation. Ideally, all questions are collaboratively answered by the team, avoiding dependence on a singular “hero threat modeler.”
  9. Establishing an Enterprise Architecture (EA) capability is imperative to provide a systematic approach to processes and architecture. This is essential for supporting the design and implementation of a new manufacturing facility and the integration of new companies. The EA capability should also encompass cybersecurity architecture. 

    As noted in ON’s 10K filing from 2022, if ON is 

    unable to successfully integrate new strategic acquisitions, which could materially adversely affect our business, results of operations and financial condition.  Per Successful acquisitions and alliances in our industry require, among other things, efficient integration and aligning of product offerings and manufacturing operations and coordination of sales and marketing and research and development efforts, often in markets or regions in which we have less experience. Risks related to successful integration of an acquisition include, but are not limited to: (1) the ability to integrate information technology and other systems; (2) issues not discovered in our due diligence

    ON’s cybersecurity strategy must incorporate the security objectives of Risk-Managed, Threat-Managed, Integrity-Assured, Governed, Efficient , Cost-Effective, Monitored, Usable and Adaptable.  
  10. For a global company, effective cybersecurity capabilities must encompass attack surface management and threat intelligence. ON seems to operate with 19 Internet Service Providers (ISPs) and 102 visible endpoints on the internet (including 4 DNS servers and 4 email servers via Proofpoint). It is crucial to vigilantly monitor the contraction and expansion of this attack surface to identify potential weaknesses, such as configuration errors or systems without system owners
  11. Like Rogers Corporation and the City of Mesa, ON has a cloud presence (in AWS).  It appears that may be migrating their website, www.onsemi.com to AWS (beta-www.onsemi.com). I have the same observations for ON as those for Rogers Corporation.
  12. ON must retain highly skilled personnel, and its cybersecurity program should not be overly burdensome to the extent that employees choose to leave the company. It is crucial that the cybersecurity program at ON is competitive, efficient, effective, and user-friendly to avoid making it overly burdensome and cumbersome.
  13. ON provides products to companies in the industrial sector, contributing to the development of more intelligent cities, factories, and buildings. The demand for cybersecurity in product delivery is expected to rise as ON’s “smart” technologies continue to expand, and the company adopts its own technology in its manufacturing facilities. Another term used to describe a more intelligent factory is Industry 4.0 (or the 4th Industrial Revolution), as per ChatGPT 3.5, involving the integration of digital technologies, the Internet of Things, artificial intelligence, and data analytics into the industrial process. Clearly, as manufacturing processes become more digitized and interconnected for ON and its customers and suppliers, solving cybersecurity challenges becomes crucial.
  14. Managing Third-Party/Supply Chain Risks is crucial.  This involves overseeing aspects such as monitoring, access control, incident response, and governance. However, it’s crucial to strike a balance; third-party risk management practices and processes must not become so burdensome that companies are disinclined to engage in business collaborations. The reliance of manufacturing and operations on third-party facilities, suppliers of raw materials, and software is significant. Identifying alternative manufacturers and suppliers can be a time-consuming and expensive endeavor, often complicated by a limited pool of qualified providers. Collaboration and a well-practiced incident response plan are vital when dealing with connections to third parties. It’s essential to limit exposure and prioritize containment. This means restricting third-party access to a specific set of resources, thereby minimizing the potential impact. Regular validation of access, following a zero-trust approach, adds an extra layer of security and assurance.

    The article, “Securing Chip Manufacturing Against Growing Cyber Threats” by Anne Meixner states that  60% to 90%, of impactful security issues stem from suppliers. This is, in part, due to a growing level of interdependency among companies in this industry, and ON is likely no exception. As the Meixner’s article summarizes the current situation of 3rd party interdependency. 

    Where methodologies and standards do exist for security, they often are confusing, cumbersome, and incomplete. There are plenty of gaps, particularly among some of the smaller suppliers of IP, equipment, and materials, where security remains primitive at best. This is partly due to the fact that in the past, much of the focus was on vulnerabilities in chips and chipmakers. But there is an increasingly high level of interdependency between companies in the semiconductor industry. The number of interactions is growing as complexity increases, and as chip designs become increasingly heterogeneous.

    Figure 4 provides a conceptual view of the interdependency the semiconductor industry Change Managed, Monitored, Risk-Managed, Access-Controlled, Threat-Monitored, Threat Management, Governed, and Vetted are key attributes that need to be part of any cybersecurity strategy. 
Figure 4 – Semiconductor Industry Eco-System Overview  (txOne networks, 2022)
Figure 5 – ON’s Product Domain Analysis Worksheet (incomplete)
Figure 6 – ON’s Information Domain Analysis Worksheet (incomplete)
Figure 7 – ON’s Process Domain Analysis Worksheet (incomplete)

Initial Questions

  1. Is the accuracy of the business architecture confirmed, and are there any essential elements missing?
  2. Does a reference architecture exist for a specific manufacturing facilities that includes cybersecurity requirements? That is, business knows the cost associated with the cybersecurity infrastructure and tools for a facility. Has IT provided a BOM for the different facility types? Does cybersecurity have a process to on-board a facility into their processes?
  3. How are risk management and policy governance handled? Is ON the culture open an approach similar to one discussed for the City of Mesa?
  4. How is the integration handled in the event of a merger with a new company?
  5. What is the logistics process for transporting products between facilities? For instance, how are silicon wafers manufactured in the Czech Republic transported to a facility in another company? How are these protected?
  6. What role does IT and Cybersecurity play in the expansion or installation of a new manufacturing facility?
  7. In what ways can Cybersecurity support and safeguard Research and Development (R&D) efforts? 
  8. The prevalence of VPN connections is notable. With 23 internet-accessible VPN endpoints (23 out of 103, or 22%), what is the reason for this high number? 
  9. Is there an ongoing project to transition http://www.onsemi.com to AWS (beta-www.onsemi.com, 23.22.192.64)? Has AWS been design with their cloud adoption framework? Does the SOC use cloud native tools or 3rd party tools for security cloud operations?
  10. Is there representation from ON at Semicon West, and is Semicon West considered a reputable conference?
  11. Is there a defined policy or stance regarding Generative AI, and does ON have an Emerging Technology Committee in place?
  12. Is ON following the guidance from the NSA?  Is it applicable? 

Business Contextual Architecture – Public Sector Case Study

Presented here is another segment in the series focusing on constructing a business contextual architecture, utilizing the Agile Security System devised by Andrew Townley. This particular case study centers on the public sector, specifically examining the context of the City of Mesa, Arizona.  The figure below is the Domain Impact Worksheet from the Agile Security System.

Figure 1 – Domain Impact Worksheet for City of Mesa, Arizona

Methodology

Please note that I use the phrases  of “security objectives” or “business objectives” throughout the observations below.  This is an architectural or strategy technique that I learned from SABSA and Andrew Townley.  SABSA refers to them as “business attributes.” Business attributes are abstractions of risk mitigation strategies or enablement strategies that must be met for an organization to deliver or achieve a desired outcome, goal or objective. The specific security objectives, like Available, Risk-Managed, and associated definitions are from “Getting Started with the Agile Security System” (Townley, 2023, Appendices E and F). A cybersecurity strategy  and operations need to incorporate and deliver on these cybersecurity objectives. 

Observations

  1. The official website, www.mesaaz.gov, stands as the primary brand for the City. Residents depend on the site’s continuous availability, anticipating unfettered access at all times. Moreover, residents expect that any information gathered from them is handled with the utmost protection. The security objectives, encompassing Availability, Governed, Duty-Segregated, Reputable, and Safe, are paramount in this context. Additionally, Customer-focused, Usable, and Resourced are other important business objectives.
  2. Data.mesaaz.gov and openbudget.mesaaz.gov assume a pivotal role in promoting the City’s strategic priority of cultivating “Strong Community Connections.” The essence of their importance is rooted in harnessing data analytics, minimizing disruptions to stakeholders, and aligning with the objective of ensuring transparency with citizens, thereby helping the implementation of a smarter Mesa. These two websites share the same security objectives as www.mesaaz.gov, including Availability, Governed, Duty-Segregated, Reputable, and Safe. Additionally, an overarching objective for Data.mesaaz.gov and openbudget.mesaaz.gov is to be Interoperable.
  3. Complexity and diversity of City Services are unapparelled.   The City of Mesa operates utilities, medical service, police, transportation, library, parks, social services and public Wi-Fi. These services are delivered by people operating in 28 diverse departments within the City of Mesa. The services are structured by unique and overlapping processes and expose different types of information to customers and employees.  The intricate complexity and diversity of services provided by the City of Mesa give rise to distinct business requirements, legislative demands, and a varied landscape of attack surfaces that require targeted risk mitigation strategies. A notable example is the existence of 52 internet-accessible web applications supporting diverse city processes. Consequently, it is imperative to incorporate critical security objectives into the cybersecurity strategy to effectively address these challenges. The essential security objectives include Risk-managed, Compliant, Documented, Recoverable, Access Controlled, Compliant, Integrity-Assured.
  4. Given the complexity and diversity of the City of Mesa’s services, the maturing of an Enterprise Architecture (EA) capability becomes imperative. The City has recognized the importance of maturing such capability by incorporating it into their IT Strategic Plan and Roadmap document. EA capability needs to incorporate and be integrated with Cybersecurity Architecture and Solution Architecture These architecture domains play a crucial role in ensuring that solutions are not only technologically sound but also aligned with key cybersecurity objectives and requirements.  Customer-Focused and Governed are key business objectives. Enterprise Architecture can help break down silos, down silos, explore new technologies / capabilities, ensure IT alignment with the 50 year plan (see https://plan.konveio.com/tomorrows-mesa-2050-general-plan),  and IT governance. 
  5. Effective risk management and policy governance are indispensable for municipalities like the City of Mesa, particularly in the context of limited funding for cybersecurity compared to federal governments or private corporations. Prioritizing IT security and privacy funding via risk management is paramount. A key facet of risk management involves identifying the appropriate owner / role, whether it be a City Manager, Mayor, or Department Head, to accept, mitigate, or transfer risks. The integration of risk management with a comprehensive City-wide framework, beyond cybersecurity and privacy, is essential. The adoption of a “Domain Framework” based on SABSA becomes instrumental, where each domain is owned by an accountable individual responsible for setting policies and risk appetite, while adhering to the parent risk parameters and policies. For example, the City of Mesa via the Mayor and City Council would set a city wide risk appetite level and general cybersecurity risk policy (i.e., Enterprise Domain). All child domains (e.g. Process, Information, Information Technology) would have to adhere to the risk appetite and policies of the parent (i.e., Enterprise Domain). This approach enables the appropriate role to make and own risk decisions similar to the ones they are already making in finance, legal, and HR. Cybersecurity would need to be consulted on cybersecurity policy and risk decisions. This approach also removes IT Security as the perceived owner of all cybersecurity risk and a blocker to projects/initiatives. Cybersecurity could also work with domain owners to draft policies. Domain owners would be accountable for writing policies for their domain and demonstrating compliance to them.
  6. Cybersecurity in local governments is a public safety risk that needs to be Risk-managed and Safe. 
  7. There are a lot of processes needed to structure the diverse City services.  Process information in the Domain Impact worksheet are from the  Process Classification Framework® (PCF), The City Government PCF.  There is a potential opportunity to leverage the City Government PCF to benchmark services, resulting in improvements in processes and services.   Per APQC, the PCF Experience serves as a high-level, industry-neutral enterprise process model that allows organizations to see their business processes from a cross-industry viewpoint.
  8. The City exhibits a seemingly greater transparency in sharing information about its IT assets compared to the private sector, evident in instances such as Palo Alto Networks  customer success story featuring their technology used by the City. However, this abundance of information poses potential risks as threat actors could leverage it for reconnaissance purposes (see MITRE ATT&CK framework T1589T1590T1591).  Therefore, a well-rounded cybersecurity strategy needs to incorporate the cybersecurity objectives of Educated, Classified, and Risk-Managed. Striking a balance between transparency and security is crucial to maintain the City’s resilience against potential cyber threats.
  9. The City of Mesa must allocate sufficient resources, if not already, to effectively identify and manage regulatory requirements for its complex environment. This necessitates collaboration, potentially through a committee comprising representatives from IT Security & Risk, the City Attorney’s office, and designated “Domain Owners” (see #5 above) for specific services. Any cybersecurity strategy needs to incorporate the objective of “Compliant.” Below are examples of potential regulatory and standards that may impose requirements for cybersecurity and privacy based on the information utilized and services offered by the City of Mesa. These sources should be carefully considered and integrated into the security strategy to maintain compliance: a) PHI – Health Insurance Portability and Accountability Act; b) PII – Children’s Online Privacy Protection Act, The Electronic Communications Privacy Act, Arizona’s Data-Breach Notification Law; c) Payment Information – The Payment Card Industry Data Security Standard; d) Water Utility – US Environmental Protection Agency Cybersecurity Checklist; e) Arizona Freedom of Information Act; f) US Transportation Security Administration cybersecurity requirements for airports and aircraft operators; g) US Executive Branch Strategies and Orders – National Cybersecurity StrategyExecutive Order 14028Executive Order 13800Policy Directive PPD-21; h) US Federal Aviation Agency’s regulations for Unmanned Aircraft System; i)NIST Cybersecurity Framework; j) Criminal Justice Information – FBI’s CJIS Security Policy; k) Cybersecurity Incident – SEC Rules on “Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure by Public Companies.” Obviously, the City of Mesa is not a publicly traded company and these rules don’t apply to the City. However, it might be worthwhile to adopt the SEC framework for handling disclosures in the spirit of transparency if it doesn’t conflict with other laws or regulations. 
  10. Ransomware is a critical concern.  Per the Verizon Data Breach report from 2023, ransomware remains the favored approach for disrupting government operations. Several security objectives need to be addressed in response to ransomware: Risk-Managed, Recoverable, Access Controlled, Integrity-Assured, and Educated. Dallas (May  2023 – June 2023) and City of Oakland (February – April 2023) are two examples cities impacted by ransomware attacks. At minimum, the City should, if not already: a) utilize the domain impact worksheet (or similar business architecture modeling or business impact analysis) to initiate the identification of critical services necessitating protection, resilience, and expedited recovery in the event of a ransomware attack; b) evaluate the City’s alignment with CISA’s Stop Ransomware Guide, potentially converting the guidance into a spreadsheet or web application to assess and monitor progress. This evaluation should encompass technology, personnel, and processes; c) encourage cybersecurity technology partners to conduct complimentary ransomware health checks and remediation assessments of their technologies deployed within the City of Mesa’s environment; d) ensure the existence of an up-to-date and tested Incident Response plan, involving key stakeholders such as the City Manager, City Attorney, Mayor, and Councilors. Additionally, safeguard and regularly test the backup and restore infrastructure to ensure its effectiveness in mitigating the impact of a potential ransomware incident. Ensure there is reputable incident response company, like Verizon, Mandiant etc, on retainer to assist with incident response along with appropriate federal and state agencies.
  11. The City of Mesa should be cognizant of several trends identified in the 2023 Verizon Data Breach Report that are relevant to its security posture. While the report does not provide a breakdown for government levels, the patterns observed, such as system intrusion, basic web attacks, DDoS, social engineering, and miscellaneous errors, are pertinent to municipal entities. Espionage-motivated actors pose a notable threat in this sector, and the persistent issue of collusion between disgruntled internal actors and external entities requires attention. Financially motivated actors and nation states targeting public sectors for information remain a concern, with personal information being the most frequently stolen data type. In response to these threat actors, critical security objectives, including Risk-Managed, Integrity-Assured, and Risk-Aware, must be addressed. The City of Mesa should explore the feasibility of implementing geo-blocking for all web applications, except www.mesaaz.gov, to ensure it continues to support efforts to market and attract individuals and organizations to the city. Additionally, it is advisable for the city to assess its control maturity and capabilities against recognized frameworks such as the CIS Critical Controls and MITRE ATT&CK to ensure a robust and adaptive security posture, especially for applications listed in the “Critical Apps” subdomain. Side note – I like that VERIS has mapped their incident classification patterns to MITRE ATT&CK framework techniques and the CIS Critical Controls
  12. Similar to other cities, the City of Mesa has placed a strategic emphasis on evolving into a “Smarter City.” As the city progresses towards becoming smarter, several of the previously mentioned Security Objectives remain applicable. The criticality and frequency of cybersecurity incidents are expected to rise, especially as services increasingly rely on interconnected Operational Technology (OT) systems, Information Technology (IT) systems, and Smart City infrastructure. Recognizing the growing complexity and interconnectivity, CISA has offered cybersecurity best practices tailored for and attributes of a trusted for Smart Cities.  Consulting and potentially adhering to these best practices is crucial for the City of Mesa to enhance the security posture of its Smart City initiatives.
  13. Like Rogers Corporation, the City of Mesa has a cloud presence. I would have the same observations for the City of Mesa as those for Rogers Corporation.

Initial questions

  1. Is the accuracy of the Domain Impact worksheet accurate, or are there crucial elements missing?
  2. What are critical services and initiatives requiring guidance from cybersecurity? 
  3. What is the risk management process for identity, assessing, addressing etc. risk? 
  4. Who is responsible for collecting regulations etc. and converting them into policies and requirements? 
  5. Is there a dedicated cybersecurity and IT plan for managing attacks involving ransomware?
  6. Why is business continuity with Cybersecurity? 
  7. How are cybersecurity items on the IT Strategy and Roadmap identified and prioritized? 
  8. How does cybersecurity architecture, enterprise and solution architecture integrate? 
  9. What components of the CIS Critical Security Controls are in place for the Information Technology parent domain in terms of people, process and technology?
  10. How is the cloud governed? Are there any initiatives involving cloud? 
  11. How is the network segmented? 
  12. How mature is City of Mesa’s Security Operations Capability?