{"id":298,"date":"2023-12-06T22:53:27","date_gmt":"2023-12-06T22:53:27","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jameswoodson\/?p=298"},"modified":"2023-12-06T22:53:27","modified_gmt":"2023-12-06T22:53:27","slug":"how-should-we-approach-the-development-of-cyber-policy-and-infrastructure-given-the-short-arm-of-predictive-knowledge","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jameswoodson\/2023\/12\/06\/how-should-we-approach-the-development-of-cyber-policy-and-infrastructure-given-the-short-arm-of-predictive-knowledge\/","title":{"rendered":"How should we approach the development of cyber-policy and infrastructure given the \u201cshort arm\u201d of predictive knowledge?"},"content":{"rendered":"\n<p>The development of cyber-policy and infrastructure should be approached with a mindset that we cannot look too far into the future as far as trends and threats are concerned. Because total shifts in the trajectory of technology can unexpectedly happen, having a policy that can be re-evaluated and pivoted quickly is critical. As stated in the article, having insurance is nice but can only go so far and only helps after damage has already been caused. Developing infrastructure only based on what is available to us now and our current environment and predicting the future is a safe choice, but locking in a policy that then takes many years to be fully in place and constraining it to current threats is a mistake. An approach with built-in flexibility for re-evaluation would be able to change course and adapt to new threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The development of cyber-policy and infrastructure should be approached with a mindset that we cannot look too far into the future as far as trends and threats are concerned. Because total shifts in the trajectory of technology can unexpectedly happen, having a policy that can be re-evaluated and pivoted quickly is critical. As stated in&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jameswoodson\/2023\/12\/06\/how-should-we-approach-the-development-of-cyber-policy-and-infrastructure-given-the-short-arm-of-predictive-knowledge\/\">Read More<\/a><\/div>\n","protected":false},"author":27584,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jameswoodson\/wp-json\/wp\/v2\/posts\/298"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jameswoodson\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jameswoodson\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jameswoodson\/wp-json\/wp\/v2\/users\/27584"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jameswoodson\/wp-json\/wp\/v2\/comments?post=298"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/jameswoodson\/wp-json\/wp\/v2\/posts\/298\/revisions"}],"predecessor-version":[{"id":303,"href":"https:\/\/sites.wp.odu.edu\/jameswoodson\/wp-json\/wp\/v2\/posts\/298\/revisions\/303"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jameswoodson\/wp-json\/wp\/v2\/media?parent=298"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jameswoodson\/wp-json\/wp\/v2\/categories?post=298"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jameswoodson\/wp-json\/wp\/v2\/tags?post=298"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}