The Silicon Mountains’ approach recognizes certain market and institutional realities and develops solutions that address them while also providing a layer of cyber protection unobtainable by an institution’s existing IT platforms.
Silicon Mountains’ multi-pronged platform understands that key institutional vulnerabilities include not simply employees and other personnel but also the vendors with whom the institution relies upon to provide the technology used in day-to-day affairs. Silicon Mountains’ approach not only significantly reduces—if not eliminates—the ability of employees to expose the institution to cyber-attacks but further seeks to disrupt the existing vendor-centered technology model. In its place, Silicon Mountains shifts the dynamic in how an institution acquires and implements technology from vendor-centered to a client-centered model, where it is the client—not the vendor–who dictates the minimum standards technology must meet to be integrated into the client’s cyber platform.
Silicon Mountains is also keenly aware that institutional IT operations are typically cost centers and cyber personnel are at a premium leading those IT operations to be understaffed or staffed by less skilled IT providers. Silicon Mountains can and does provide a stellar array/host of services that reduces the amount of resources needed to ensure a secure technology and cyber resilient environment while neutralizing the impact of other market realities such as:
- the lack of skilled personnel in data visualization, large scale procurement and alternative commercial financing who command salaries outside of the range of most institutions;
- increasing competition for the limited pool of skilled cyber personnel across industries;
- institutional IT reliance on regulatory compliance as the standard for security rather than the IT platform’s capability to withstand internal and external cyberthreats; and
- the fact that an institution’s mission and its corresponding personnel are its primary vulnerability.
- Who are our allies?
- Who are we sharing resources with?
- What “exactly” are the areas of expertise of our vendors, co -investors, or joint venture partners?
- What is the economic exposure of all parties concerned?
- What is their reputational exposure?
- What is their governance structure?
- What is their regulatory exposure?
- What “exactly” are their resources?
- How long have they been in business?
- What are their insurance wrappers?
- Is there most favoured nation status with vendors?
- What are the support obligations?
- Who gets what money and when?
- Are there any economic or personal relationships with any vendor, consultant or supplier?
- Are we effectively using the skills of existing personnel?
- Are we purchasing medical devices, technology and equipment at market rates?
- What are we measuring market against?
- Are we monetizing our data?
- Are we using the most effective financing options?
- Do we know what the options are?
- What are the options?
- What percentage of our cyber security patches are effective?
- Have we explored joint ventures with similarly situated institutions?
- Are we sharing information and technology internally?
- Who participates in our training sessions?
- Have we looked to other industries for guidance and advice?
- What have we learned?