RT Vol XVI: Generations: Ch 4
From the Book: The Refractive Thinker® Vol XVI: Generations: Strategies for Managing Generations in the Work Force


Summary

Millennials or generation Y and the Digital Natives or generation Z could transform the diverse culture of workforces in the global economy’s innovative digital enterprise, creating management implications with varied strategies for exercise of cyber-resiliency in a digitalized enterprise’s threat-landscape. Millennials (born from 1980 to 1994) and Digital Native (born from 1995 to 2012) could create cybersecurity risks, with unique cybersecurity habits when working along-side the generation X who were born between 1965 and 1979, and Baby Boomers who were born before 1965 through 1946. The achievement of security might be difficult with varying human behaviors in the cyber-domain, accounting for the emerging vulnerabilities in an integrated cyber secure workforce. Protection, defense, analysis, operational-resilience and mitigation of threats to social heterogeneity of various roles, could coordinate to mitigate information technology (IT) attacks, targeting critical infrastructure, control, and cyber-physical systems. Many generational similarities exist, posing cybersecurity risks to attribute to common habits among the four generations. Evidences for compromise might suggest probable cause for placing organizations at risk of loss from the use of public WiFi for accessing data from work to weak passwords, advanced persistent threats or watering hole attacks, and voluntarily enabling two-factor authentication. Refractive thinking in transformation of organizations’ security posture might necessitate reevaluation of non-compliant behaviors and availing training, to understand the level of security abilities and skills to strive aligning with challenges. Computer, information security, network-security, cybersecurity posture and response plan to evaluate potential risks of exposure, written cyber-policies, heterogeneity in roles, effective strategies for resilience to address relentless and well-funded exploits of vulnerability risks of cyber-attacks, insider-threats, and hacking need review and reexamination of the differentiating requirements within the workforce’ cyber-ecosystem.