We use cookies and other similar technologies (Cookies) to enhance your experience and to provide you with relevant content and ads. By using our website, you are agreeing to the use of Cookies. You can change your settings at any time. Cookie Policy.


Blog: John Myers Subscribe to this blog's RSS feed!

John Myers

Hey all-

Welcome to my blog. The fine folks at the BeyeNETWORK™ have provided me with this forum to offer opinion and insight into the worlds of telcommunications (telecom) and business activity monitoring (BAM). But as with any blog, I am sure that we (yes we... since blogging is a "team sport"...) will explore other tangents that intersect the concepts of telecom and BAM.

In this world of "Crossfire" intellectual engagement (i.e. I yell louder therefore I win the argument), I will try to offer my opinion in a constructive manner. If I truly dislike a concept, I will do my best to offer an alternative as opposed to simply attempting to prove my point by disproving someone else's. I ask that people who post to this blog follow in my lead.

Let the games begin....

About the author >

John Myers, a senior analyst in the business intelligence (BI) practice at Enterprise Management Associates (EMA). In this role, John delivers comprehensive coverage of the business intelligence and data warehouse industry with a focus on database management, data integration, data visualization, and process management solutions. Prior to joining EMA, John spent over ten years working with business analytics implementations associated with the telecommunications industry.

John may be contacted by email at JMyers@enterprisemanagement.com.

Editor's note: More telecom articles, resources, news and events are available in the BeyeNETWORK's Telecom Channel. Be sure to visit today!

This week the CFCA is holding their latest telecommunications fraud educational event. If you wanted to encapsulate the "motto" of the ever growing and dispersed population of fraudsters targeting the telecom industry, it might be the following:

"You can be sure of succeeding in your attacks if you only attack places which are undefended."

And the message for the security professionals, who are in attendance tasked with thwarting those fraudsters, could be described as:

"We also know there are "known unknowns"; that is to say we know there are some things we do not know. But there are also "unknown unknowns" — the ones we don't know we don't know."

Yes, yes. It might not be the best to use Donald Rumsfeld against the strategic master of Sun Tzu. But the concept is that the CFCA brings to light through these events is to think outside the box to find the "unknown unknowns" because that exactly where fraudsters will make their "undefended attacks". When a telecom fraud or security organization can do that, they will have mastered half the battle in fighting fraud.

If you are one of those fraud or security professionals, I would recommend making plans for any of the upcoming CFCA events.

Technorati Tags: Telecommunications, Telecom, Fraud, CFCA, Sun Tzu, Donald Rumsfeld


Posted October 17, 2007 8:00 PM
Permalink | No Comments |

Leave a comment

    
Search this blog
Categories ›
Archives ›
Recent Entries ›