,

Capitol Technology University Quotes

Quotes tagged as "capitol-technology-university" Showing 1-25 of 25
“Anyone starting out to research for a doctorate degree should remember that hours of self centered work has the ability to be the spark for others to progress. All research is potentially useful to open doors or show others that door does not lead anywhere useful. Advancements happen by building on others research.”
Ian R. McAndrew, PhD

“Navigating a complex system of cloud computing with an enterprise cybersecurity strategy is not an easy feat. A complex technological system works when designed correctly. However, adding the human factor as an element to this system is an ever-escalating paradox and a potential cyberthreat.”
Ludmila Morozova-Buss

“Cybersecurity is a new area where equality will exist to allow intelligence to succeed.

Cybersecurity needs women to be successful and without them it will not as the best talent a must.”
Ian R. McAndrew, PhD

“In the 21st century, the second quantum revolution will shape the science and the world economy, re-defining the speed, and scale of scientific and technological expansion.”
Ludmila Morozova-Buss

“Quantum theory fascinates me. I find the underlying theoretical constructs intensely interesting and I am captured by how quantum theory is driving modern scientific discovery and delivering tangible, life-changing applications in the real world.”
Ludmila Morozova-Buss

“We are currently at the start of a second quantum revolution,” said Dr. Ian McAndrew, Dean of Doctorate Programs @ Capitol Technology University. “The first quantum revolution gave us new rules that govern physical reality. The second quantum revolution will take these rules and use them to develop new technologies and offer the next level of opportunities.”
Ian R. McAndrew, PhD

“Research can be both lonely and rewarding. I would encourage research in areas that are of interest to the researcher and not that which is currently popular. Any research of note is not going to happen overnight and your interest will keep you dedicated.”
Ian R. McAndrew, PhD

“An increasingly digital world is no longer an abstract concept, it is a reality. As a systems thinker, I strongly believe that an enterprise must strive to synchronize its digital transformation strategy with a cybersecurity strategy.”
Ludmila Morozova-Buss

“Widen your innovative frontiers by using the cutting-edge, market-leading technology solutions. Turn the sensitive information of your business into the ́information ́ of your successful digital journey.”
Ludmila Morozova-Buss

“A systemic approach to the knowledge collected will help decision makers to construct resilient and proactive measures across these pathways:

Prominent partnerships of cooperation and interconnectedness as a new business model are needed to make the existing model of competition between companies obsolete.

Heal the broken links in cyber-security by creating cyber-resilient supply and value chains.

Leader-shift your business from the culture of fear and uncertainty to the business of trust.”
Ludmila Morozova-Buss

“Die Frage ist nicht mehr, ob man auf Cloud Computing setzt, sondern wann und wie. Die Cloud Infrastruktur- und Cloud Sicherheits-Strategie sollte immer mit der Unternehmensstrategie einhergehen. Denn die Implementierung von Cloud Computing könnte die treibende Kraft für eine Unternehmen oder eine Organisation werden. In einer auf das Geschäftsmodell abgestimmten Cloud-Strategie, ist Cloud Security oftmals der entscheidende Faktor im allumfassenden Sicherheitsmodell. Strategisch muss Cloud-Sicherheit daher eine gemeinsame Aufgabe des Cloud-Providers und des Kunden sein.”
Ludmila Morozova-Buss

“The IoT market grows rapidly and it’s acceleration will continue in all major areas like Industrial Internet of Things; Digital Enterprise; Internet of Healthcare; Internet of Energy; Internet of Education; Digitalisation of global Supply Chains.

Security concerns add to the IoT complexity. Strategically, to assure the system’s reliability & data / knowledge engineering, it is important to insure data integrity, availability, traceability, and privacy. A complex problem of digital transformation globally.

The Internet of Things cybersecurity, therefore, is not a matter of device self-defence. What is needed is a systemic approach. Identify underlying patterns. Secure elements of a chain: from security of a device that creates, captures your data.. to the data storage.. to the back-end storage.. Create/ join IoT ecosystems, driven by protection with external monitoring, detection and reaction systems. It is a challenge - to secure systems.”
Ludmila Morozova-Buss

“For an enterprise, the digital readiness in a volatile, uncertain, complex, and ambiguous (VUCA) business environment an accurate, reliable, and timely information flow along with the customer trust, play a fundamental role.

Destructive and demoralising, the financial impact of experiencing a data breach continues to increase year over year for businesses. A very complex situation of a data breach / ransomware / malware attack (to name a few cyberthreats) leads to even more complex and challenging reputational damage, making, potentially, a cyber-attack costs ongoing for years. As threat actors are innovating, cybersecurity experts assert their own unique interpretation of trust.

The Zero Trust approach therefore is a powerful and promising concept.”
Ludmila Morozova-Buss

“It is essential to know that no single specific technology is associated with Zero Trust architecture. The Zero Trust is a security model based on the principle of maintaining strict access controls and not trusting anyone by default; a holistic approach to network security, that incorporates a number of different principles and technologies.”
Ludmila Morozova-Buss

“With Cloud Computing, it is no longer a question of If, but rather When and How.”
Ludmila Morozova-Bussva

“Five interconnecting rings for the “Faster, higher, stronger” of Cloud Computing System.

The “Cloud Computing Rings” represent: Performance, Resilience, Data Sovereignty, Interoperability and Reversibility of a successfully integrated Cloud System.”
Ludmila Morozova-Bussva

“With Cloud Computing, it is no longer a question of If, but rather When and How.

Offering the transformative power of connected systems, cloud computing technologies - cloud systems - enable alignment of the digital transformation and cybersecurity ambitions with the corporate strategy of an enterprise.”
Ludmila Morozova-Bussva

“Cybersecurity is a subject that requires logic, knowledge, thought and commitment.

It can be applied or research based. It is a true leveller for all to enter, be successful and lead the future of cybersecurity.

I see a future where women are the leaders a pushing the boundaries for the benefit for all.”
Ian R. McAndrew, PhD

“We are now at a critical mass as we plan the future with combined technology.
If we do not identify how separate technologies support or add problems we are just repeating the mistakes of the past.”
Ian R. McAndrew, PhD

“The Stellar Evolution of Cybersecurity. The evolutionary processes of stars depend upon their initial mass. The evolutionary processes of cybersecurity depend upon the hyperconvergence of Cyber Dependencies, People, Processes, and Technology.”
Ludmila Morozova-Buss

“I would love to see more women in the area of digital transformation. If women have improved access to skills development in this area, I believe it will have a positive impact for many generations to come. The skills acquired in digital transformation are transferrable to other sectors as well. The skills are practical and can lead to scientific breakthroughs. Because of this I believe there can be a generational impact.

The generational impact is important because we live in an age of commoditized information. As a society, we are relatively new to this reality and while cyber threats are the root of information security challenges, information security challenges are increasingly becoming the root of global threats. There needs to be increased involvement of more international stakeholders with the goal of improving digital transformation skills for everyone.

These skills are powerful and for that reason I will continue to promote cyber knowledge-sharing and greater access to cybersecurity education. For more women to enjoy the digital world full of surprises and rewards!”
Ludmila Morozova-Buss

“Women have so much to contribute to the cybersecurity field. Breaking barriers is more than just populating the cybersecurity space with a female presence, but about contributing fresh and different perspectives to a dynamic landscape that requires agile and adaptable thinking.”
Ludmila Morozova-Buss

“As sunlight is to the eyes, science is for the mind...”
Ludmila Morozova-Buss

“Observation: Suddenly, the world is flooded with self-proclaimed "AI experts," yet few have the training or experience to truly understand AI. Those who build AI rarely speak, and those who speak about AI rarely create anything new.
Challenge: This creates a gap between hype and reality, leaving organizations and individuals vulnerable to misinformation.”
Ludmila Morozova-Buss

“The Mega-Trend - The Convergence of Technologies.

The era of standalone "silos" of tech is over. The most powerful innovations and disruptive business models of the next decade will emerge from the intentional and strategic combination of these technologies. Understanding how they fit together is now more important than understanding any one of them in isolation.”
Ludmila Morozova-Buss