The purpose of this slide is to find a commonality among InfoSec, PMP and Chan. While two are quite modern and systematic oriented, the last one had existed for thousand of years and viewed as simplistic. After all, one just sits and finds the inner peace. But Chan is a discipline that is also measurable just like its modern counterparts as this slide will show.
项目资安禅 - Project Management, Information Security & ChanChuan Lin
这简报的目标是查找项目、资安与禅之间的共同点。 先前两个都相当现代化和系统化的。 禅已经存在了几千年来,看来是简单化而无系统化的。 但是禅也是个相当系统化、并有科学与研究的后盾。
The purpose of this slide is to find a commonality among InfoSec, PMP and Chan. While two are quite modern and systematic oriented, the last one had existed for thousand of years and viewed as simplistic. After all, one just sits and finds the inner peace. But Chan is a discipline that is also measurable just like its modern counterparts as this slide will show.
Thirty-Six Stratagems of Social Engineering, Part IChuan Lin
Why Thirty-Six Social Engineer Stratagems?
As organization/nation-states are strengthened software and network aspect of cyber defenses, attackers have to look for other ways to access data.
Cyber attacks like all forms of warfare are ever escalating. In 2003, phishing introduced the art of social engineering into information security world. An email, that informed users of their password expiration, has opened up a new battlefront.
For a more sophisticate and escalate data breach, a master plan will be required, numerous stratagems are hatched to deal with various scenario, and vast numbers of bots will provide ample firepower.
An objective for this slide is to provide food for thoughts to InfoSec Pro (Information Security Professions) to recognize patterns and hopefully come up with means to deal with them.
Warfare is an extension of state in exerting its influences.
Project is an extension of a company in exerting its competitiveness.
While PMI provides standards, best practices, and guidelines, it views situations within the box. Practitioners are advised to follow through Organization Process Assets (OPA), Enterprise Environmental Factors (EEF), and/or advises of senior members on non-standard situations.
Sunzi's Art of War can offer a valuable insights from outside the box.
There are common issues faced by generals and project managers.
1) Time/Heaven – it is always a race against time because any prolongment drains available resources.
2) Resources/Earth – While it is necessary to spend capital toward the completion of project, no project is worth the cost, if the end result would bankrupt a nation/company.
3) People – Whether internal stakeholders to external vendors or domestic oppositions to foreign combatants, they are the wildcards in a control environment.
项目资安禅 - Project Management, Information Security & ChanChuan Lin
这简报的目标是查找项目、资安与禅之间的共同点。 先前两个都相当现代化和系统化的。 禅已经存在了几千年来,看来是简单化而无系统化的。 但是禅也是个相当系统化、并有科学与研究的后盾。
The purpose of this slide is to find a commonality among InfoSec, PMP and Chan. While two are quite modern and systematic oriented, the last one had existed for thousand of years and viewed as simplistic. After all, one just sits and finds the inner peace. But Chan is a discipline that is also measurable just like its modern counterparts as this slide will show.
Thirty-Six Stratagems of Social Engineering, Part IChuan Lin
Why Thirty-Six Social Engineer Stratagems?
As organization/nation-states are strengthened software and network aspect of cyber defenses, attackers have to look for other ways to access data.
Cyber attacks like all forms of warfare are ever escalating. In 2003, phishing introduced the art of social engineering into information security world. An email, that informed users of their password expiration, has opened up a new battlefront.
For a more sophisticate and escalate data breach, a master plan will be required, numerous stratagems are hatched to deal with various scenario, and vast numbers of bots will provide ample firepower.
An objective for this slide is to provide food for thoughts to InfoSec Pro (Information Security Professions) to recognize patterns and hopefully come up with means to deal with them.
Warfare is an extension of state in exerting its influences.
Project is an extension of a company in exerting its competitiveness.
While PMI provides standards, best practices, and guidelines, it views situations within the box. Practitioners are advised to follow through Organization Process Assets (OPA), Enterprise Environmental Factors (EEF), and/or advises of senior members on non-standard situations.
Sunzi's Art of War can offer a valuable insights from outside the box.
There are common issues faced by generals and project managers.
1) Time/Heaven – it is always a race against time because any prolongment drains available resources.
2) Resources/Earth – While it is necessary to spend capital toward the completion of project, no project is worth the cost, if the end result would bankrupt a nation/company.
3) People – Whether internal stakeholders to external vendors or domestic oppositions to foreign combatants, they are the wildcards in a control environment.
How ancient Chinese Classics, Great Learning, remains relevant in modern information security profession. This presentation will show side by side of what was true back in 400 BC, can also apply to modern day 21st Century. It is also the first book on MaaS (Management as a Service).
大学的三纲跟(ISC)2和SAN的守则没有什么不同。
十资安域和技术信息的知识是对于信息安全专业有必要地。但个人的道德标准是有预期但不多指示、只要按照各种法律/裁决像HIPAA、SOX、GLBA、安全港等就算了。
我相信大学是信息安全(InfoSec)专业伦理有用的指南。
Revisit the Three Kingdoms was a quarterly issue ezine on China's Three Kingdoms era. It was created as part of Romancing Cathay which was a group of people interested in playing and introducing games about Ancient China. There were many impressive and exciting tall tales, legends, myths, and historical events that we believed would fascinate players world-wide. Our goal was to introduce these captivating stories in various game formats. In addition, we felt that through playing games, people would become more curious in learning more about China.
Content
Sorry for the Delay
Cao Cao's Ambition , part 5b of 9
Zhange He, the Marquis of Strength
Zhou Yun, the Artful General
Adventure at Qian-tong
Web Reference
Catalog
Romance of the The Kingdoms Manga Volume I Sneak Peak
Yellow Emperor Internal Canon on Information Security - part 1Chuan Lin
Yellow Emperor Internal Canon (YEIC) is a part of series of Chinese Wisdom as a Service (CWaaS). It is capable of dispense wisdom to meet the reader’s need if that person has the necessary awareness.
This presentation is an obsequious attempt to apply YEIC to Information Security.
Revisit the Three Kingdoms was a quarterly issue ezine on China's Three Kingdoms era. It was created as part of Romancing Cathay which was a group of people interested in playing and introducing games about Ancient China. There were many impressive and exciting tall tales, legends, myths, and historical events that we believed would fascinate players world-wide. Our goal was to introduce these captivating stories in various game formats. In addition, we felt that through playing games, people would become more curious in learning more about China.
Content
Looking Back, Looking Forward
Cao Cao's Ambition , part 5 of 9
Art of Propriety
Yu Jin, General of Tiger's Awe
Zhou Yun, the Artful General
Reference and Resources
There was a plan do a Kickstarter for the romance of the three kingdoms table top role playing game. Preview ad is @
https://www.kickstarter.com/projects/sanguine/1817858762?token=79efaf43
這簡報的目標是查找專案、資安與禪之間的共同點。先前兩個都相當現代化和系統化的。禪已經存在了幾千年來,看來是簡單化而無系統化的。但是禪也是個相當系統化、並有科學與研究的後盾。
The purpose of this slide is to find a commonality among InfoSec, PMP and Chan. While two are quite modern and systematic oriented, the last one had existed for thousand of years and viewed as simplistic. After all, one just sits and finds the inner peace. But Chan is a discipline that is also measurable just like its modern counterparts as this slide will show.
The document discusses events in China around 197 AD during the late Han Dynasty. Liu Bei fled from his position in Xiaopei city, fearing an attack from Yuan Shu's general Ji Ling. Liu Bei sought protection from Cao Cao, who reinstated him. Meanwhile, Lu Bu allied with Yuan Shu but disagreed with attacking Liu Bei. Yuan Shu later declared himself emperor, causing Cao Cao and Lu Bu to turn against him. Chen Deng of Xu province helped Cao Cao and gained promotions, angering Lu Bu. Yuan Shu then attacked Xu province in response to Lu Bu's betrayal.
Revisiting the Three Kingdoms Quarterly is a pdf ezine dedicated to the advocacy and increase general awareness of Romance of the Three Kingdoms period.
Historical Articles:
Cao Cao's Ambition
Jiao, Shen, and Ling
Dong Zhuo, the Tyran
Peach Garden Oath theme deck
FUDGE - Revisiting the Three Kingdoms in a nutshell
International Journal for Romance of the Three Kingdoms
Vol 1 Issue 2 - February 2002
Revisiting the Three Kingdoms Quarterly is a free pdf
magazine dedicated to the advocacy and increase general awareness of Romance of the Three Kingdoms period.
Historical Articles
Life of Cào Cao - Part II: The Foundation (190 - 195 AD)
Late Han Dynasty Bureaucracy
Sun Jian, Scion of Sun-tze
My first attempt on creating ezine that focused on Three Kingdoms period in China back in early 2000s.
Contents included
- Story of Cao Cao (Part 1 of 9)
- Army Structure During Three Kingdoms Period
- Lu Bu: East and West views
- Review of games with Three Kingdoms theme
This document discusses the similarities between the board game Go (also known as Weiqi) and information security (InfoSec). It describes how Go components like stones, the board, and lines of defense map to InfoSec concepts like technologies, company locations, and layers of security. Stones represent both offensive and defensive tools, and the board represents a company, with intersection points as areas where networks, hardware, software, and people converge. Different board sizes correlate to company sizes, and strategic points on the board are like critical assets to protect. The document advocates viewing InfoSec defenses holistically and in depth, rather than focusing on any single area.
Great Learning & Information Security - English editionChuan Lin
How ancient Chinese Classics, Great Learning, remains relevant in modern information security profession. This presentation will show side by side of what was true back in 400 BC, can also apply to modern day 21st Century. It is also the first book on MaaS (Management as a Service).
How ancient Chinese Classics, Great Learning, remains relevant in modern information security profession. This presentation will show side by side of what was true back in 400 BC, can also apply to modern day 21st Century. It is also the first book on MaaS (Management as a Service).
大學的三綱跟(ISC)2和SAN的守則沒有什麼不同。
十資安域和技術信息的知識是對於信息安全專業有必要地。但個人的道德標準是有預期但不多指示、只要按照各種法律/裁決像HIPAA、SOX、GLBA、安全港等就算了。
我相信大學是信息安全(InfoSec)專業倫理有用的指南。
You may be stressed about revealing your cancer diagnosis to your child or children.
Children love stories and these often provide parents with a means of broaching tricky subjects and so the ‘The Secret Warrior’ book was especially written for CANSA TLC, by creative writer and social worker, Sally Ann Carter.
Find out more:
https://cansa.org.za/resources-to-help-share-a-parent-or-loved-ones-cancer-diagnosis-with-a-child/
Aggression - Applied Social Psychology - Psychology SuperNotesPsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
ProSocial Behaviour - Applied Social Psychology - Psychology SuperNotesPsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
As we navigate through the ebbs and flows of life, it is natural to experience moments of low motivation and dwindling passion for our goals.
However, it is important to remember that this is a common hurdle that can be overcome with the right strategies in place.
In this guide, we will explore ways to rekindle the fire within you and stay motivated towards your aspirations.
How ancient Chinese Classics, Great Learning, remains relevant in modern information security profession. This presentation will show side by side of what was true back in 400 BC, can also apply to modern day 21st Century. It is also the first book on MaaS (Management as a Service).
大学的三纲跟(ISC)2和SAN的守则没有什么不同。
十资安域和技术信息的知识是对于信息安全专业有必要地。但个人的道德标准是有预期但不多指示、只要按照各种法律/裁决像HIPAA、SOX、GLBA、安全港等就算了。
我相信大学是信息安全(InfoSec)专业伦理有用的指南。
Revisit the Three Kingdoms was a quarterly issue ezine on China's Three Kingdoms era. It was created as part of Romancing Cathay which was a group of people interested in playing and introducing games about Ancient China. There were many impressive and exciting tall tales, legends, myths, and historical events that we believed would fascinate players world-wide. Our goal was to introduce these captivating stories in various game formats. In addition, we felt that through playing games, people would become more curious in learning more about China.
Content
Sorry for the Delay
Cao Cao's Ambition , part 5b of 9
Zhange He, the Marquis of Strength
Zhou Yun, the Artful General
Adventure at Qian-tong
Web Reference
Catalog
Romance of the The Kingdoms Manga Volume I Sneak Peak
Yellow Emperor Internal Canon on Information Security - part 1Chuan Lin
Yellow Emperor Internal Canon (YEIC) is a part of series of Chinese Wisdom as a Service (CWaaS). It is capable of dispense wisdom to meet the reader’s need if that person has the necessary awareness.
This presentation is an obsequious attempt to apply YEIC to Information Security.
Revisit the Three Kingdoms was a quarterly issue ezine on China's Three Kingdoms era. It was created as part of Romancing Cathay which was a group of people interested in playing and introducing games about Ancient China. There were many impressive and exciting tall tales, legends, myths, and historical events that we believed would fascinate players world-wide. Our goal was to introduce these captivating stories in various game formats. In addition, we felt that through playing games, people would become more curious in learning more about China.
Content
Looking Back, Looking Forward
Cao Cao's Ambition , part 5 of 9
Art of Propriety
Yu Jin, General of Tiger's Awe
Zhou Yun, the Artful General
Reference and Resources
There was a plan do a Kickstarter for the romance of the three kingdoms table top role playing game. Preview ad is @
https://www.kickstarter.com/projects/sanguine/1817858762?token=79efaf43
這簡報的目標是查找專案、資安與禪之間的共同點。先前兩個都相當現代化和系統化的。禪已經存在了幾千年來,看來是簡單化而無系統化的。但是禪也是個相當系統化、並有科學與研究的後盾。
The purpose of this slide is to find a commonality among InfoSec, PMP and Chan. While two are quite modern and systematic oriented, the last one had existed for thousand of years and viewed as simplistic. After all, one just sits and finds the inner peace. But Chan is a discipline that is also measurable just like its modern counterparts as this slide will show.
The document discusses events in China around 197 AD during the late Han Dynasty. Liu Bei fled from his position in Xiaopei city, fearing an attack from Yuan Shu's general Ji Ling. Liu Bei sought protection from Cao Cao, who reinstated him. Meanwhile, Lu Bu allied with Yuan Shu but disagreed with attacking Liu Bei. Yuan Shu later declared himself emperor, causing Cao Cao and Lu Bu to turn against him. Chen Deng of Xu province helped Cao Cao and gained promotions, angering Lu Bu. Yuan Shu then attacked Xu province in response to Lu Bu's betrayal.
Revisiting the Three Kingdoms Quarterly is a pdf ezine dedicated to the advocacy and increase general awareness of Romance of the Three Kingdoms period.
Historical Articles:
Cao Cao's Ambition
Jiao, Shen, and Ling
Dong Zhuo, the Tyran
Peach Garden Oath theme deck
FUDGE - Revisiting the Three Kingdoms in a nutshell
International Journal for Romance of the Three Kingdoms
Vol 1 Issue 2 - February 2002
Revisiting the Three Kingdoms Quarterly is a free pdf
magazine dedicated to the advocacy and increase general awareness of Romance of the Three Kingdoms period.
Historical Articles
Life of Cào Cao - Part II: The Foundation (190 - 195 AD)
Late Han Dynasty Bureaucracy
Sun Jian, Scion of Sun-tze
My first attempt on creating ezine that focused on Three Kingdoms period in China back in early 2000s.
Contents included
- Story of Cao Cao (Part 1 of 9)
- Army Structure During Three Kingdoms Period
- Lu Bu: East and West views
- Review of games with Three Kingdoms theme
This document discusses the similarities between the board game Go (also known as Weiqi) and information security (InfoSec). It describes how Go components like stones, the board, and lines of defense map to InfoSec concepts like technologies, company locations, and layers of security. Stones represent both offensive and defensive tools, and the board represents a company, with intersection points as areas where networks, hardware, software, and people converge. Different board sizes correlate to company sizes, and strategic points on the board are like critical assets to protect. The document advocates viewing InfoSec defenses holistically and in depth, rather than focusing on any single area.
Great Learning & Information Security - English editionChuan Lin
How ancient Chinese Classics, Great Learning, remains relevant in modern information security profession. This presentation will show side by side of what was true back in 400 BC, can also apply to modern day 21st Century. It is also the first book on MaaS (Management as a Service).
How ancient Chinese Classics, Great Learning, remains relevant in modern information security profession. This presentation will show side by side of what was true back in 400 BC, can also apply to modern day 21st Century. It is also the first book on MaaS (Management as a Service).
大學的三綱跟(ISC)2和SAN的守則沒有什麼不同。
十資安域和技術信息的知識是對於信息安全專業有必要地。但個人的道德標準是有預期但不多指示、只要按照各種法律/裁決像HIPAA、SOX、GLBA、安全港等就算了。
我相信大學是信息安全(InfoSec)專業倫理有用的指南。
You may be stressed about revealing your cancer diagnosis to your child or children.
Children love stories and these often provide parents with a means of broaching tricky subjects and so the ‘The Secret Warrior’ book was especially written for CANSA TLC, by creative writer and social worker, Sally Ann Carter.
Find out more:
https://cansa.org.za/resources-to-help-share-a-parent-or-loved-ones-cancer-diagnosis-with-a-child/
Aggression - Applied Social Psychology - Psychology SuperNotesPsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
ProSocial Behaviour - Applied Social Psychology - Psychology SuperNotesPsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
As we navigate through the ebbs and flows of life, it is natural to experience moments of low motivation and dwindling passion for our goals.
However, it is important to remember that this is a common hurdle that can be overcome with the right strategies in place.
In this guide, we will explore ways to rekindle the fire within you and stay motivated towards your aspirations.
Understanding of Self - Applied Social Psychology - Psychology SuperNotesPsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
Procrastination is a common challenge that many individuals face when it comes to completing tasks and achieving goals. It can hinder productivity and lead to feelings of stress and frustration.
However, with the right strategies and mindset, it is possible to overcome procrastination and increase productivity.
In this article, we will explore the causes of procrastination, how to recognize the signs of procrastination in oneself, and effective strategies for overcoming procrastination and boosting productivity.
Best Way to Overcome Procrastination and Increase Productivity.pdf
PMP, InfoSec & Chan
1. PMP, InfoSec & Chan
easy to understand
lifetime to master
Chuan Lin, CISSP, PMP
2. What are these
• PMP
– Project Management Professional
• InfoSec
– Information Security Professional
• Chan
– A method of meditation that observes
breathing and inner thoughts
3. What are their goals
• PMP
– To bring about organizational process into
anarchic projects
• InfoSec
– To bring about organizational information
security in a chaotic business environment
• Chan
– To calm the mind through regulated
breathing and inner perception
4. Why Chan
• Chan is both spiritual and practical.
• While spirituality is subjective, practicality
is backed by science and study.
o Physical benefits – reduce blood pressure,
bowel syndrome, and flare up in
ulcerative colitis
o Mental benefits – increase creativity and
prioritization while reduce anxiety,
depression and insomnia
5. What’s the Purpose
• Back in Chinese Song Dynasty (around
12th century AD), Chan Master Kuòān
Shīyuǎn (廓庵師遠) mapped out stages of
Chan through poetry and images called
Ten Bulls.
• This is an attempt to demonstrate the
systematic similarity among PMP, Infosec
and Chan through these ten stages.
6. Undisciplined
With his horns fiercely
projected in the air the beast
snorts,
madly running over the
mountain paths, farther and
farther he goes astray!
A dark cloud is spread across
the entrance of the valley,
and who knows how much of
the fine fresh herb is trampled
under his wild hoofs!
猙獰頭角恣咆哮 奔走溪山路轉遙
一片黑雲橫谷口 誰知步步犯佳苗
Source: http://www.santosha.com/philosophy/oxherdingpictures-1.html
7. Undisciplined
Black Water Buffalo
represents our moods and
thoughts.
Cowherd represents our
conscious.
When we first attempt to
meditate, we find that our
moods and thoughts are
running rampant in our
minds.
In Chan
Source: http://baike.baidu.com/view/454346.htm
8. Undisciplined
Black Water Buffalo
represents a company’s
culture and/or norms.
Cowherd represents info sec
profession.
A company without a
security policy is like a wild
buffalo running amok and
unknowingly bringing harm
to itself and those around it.
Source: http://baike.baidu.com/view/454346.htm
In InfoSec
9. Undisciplined
Black Water Buffalo
represents stakeholders in a
given project.
Cowherd represents project
manager.
When a project manager
initiates or inherits a project,
he has to take control of
stakeholders else project will
go awry.
Source: http://baike.baidu.com/view/454346.htm
In PMP
10. Discipline Begin
I am in possession of a straw
rope, which passes through its
nose,
at once it makes a frantic
attempt to run away, but is
severely whipped and
whipped;
The beast resists the training
with all the power there is in a
nature wild and ungoverned,
But the rustic oxherd never
relaxes his pulling tether and
ever-ready whip.
我有芒繩驀鼻穿 一回奔競痛加鞭
從來劣性難調製 猶得山童盡力牽
Source: http://www.santosha.com/philosophy/oxherdingpictures-2.html
11. Discipline Begin
Straw Rope represents
disciplines that we used to
calm our moods and
thoughts.
But it is not something we’re
used to. Our body, moods
and thoughts rebelled
against the rein that we’ve
put ourselves through.
In Chan
Source: http://baike.baidu.com/view/454346.htm
12. Discipline Begin
Straw Rope represents
governance risks and
compliances (GRC), along
with policies and standards
that imposed on a company
culture.
If not effectively conveyed,
the buffalo will attempt to
thwart the control from
InfoSec Profession.
Source: http://baike.baidu.com/view/454346.htm
In InfoSec
13. Discipline Begin
Straw Rope represents
disciplines, guidelines, and
rules for this project.
Project Manager uses it to
rein in stakeholders.
This is similar to Tuckman’s
Team Formation – Storming
whereas previous slide
(Undisciplined) may
represent Forming.
Source: http://baike.baidu.com/view/454346.htm
In PMP
14. In Harness
漸調漸伏息賓士 渡水穿雲步步隨
手把芒繩無少緩 牧童終日自忘疲
Gradually getting into harness
the beast is now content to be
led by the nose,
crossing the stream, walking
along the mountain path, he
follows every step of the
leader;
The leader holds the rope
tightly in his hand never letting
it go,
All day long he is on the alert
almost unconscious of what
fatigue is.
Source: http://www.santosha.com/philosophy/oxherdingpictures-3.html
15. In Harness In Chan
Buffalo turned white at its
head which represented our
gradual control of
conscience over moods and
thoughts.
At this stage, we began to
get a glimpse of tranquility.
Source: http://baike.baidu.com/view/454346.htm
16. In Harness
InfoSec Profession has to
win the support from the top
management.
At this stage, the company
may seem docile but it does
not fully embrace the need
for information security.
InfoSec Pro has to lead and
to maintain a tight control.
Source: http://baike.baidu.com/view/454346.htm
In InfoSec
17. In Harness
Project Manager gains
control of stakeholders
who’re slowly accepted him
as their leader.
But PM still has to pay close
attention to stakeholders
because any negligence
could release them.
Source: http://baike.baidu.com/view/454346.htm
In PMP
18. Faced Round
日久功深始轉頭 顛狂心力漸調柔
山童未肯全相許 猶把芒繩且系留
After long days of training the
result begins to tell and the
beast is faced round,
a nature so wild and
ungoverned is finally broken,
he has become gentler;
But the tender has not yet given
him his full confidence,
he still keeps his straw rope
with which the ox is now tied
to a tree.
Source: http://www.santosha.com/philosophy/oxherdingpictures-4.html
19. Faced Round In Chan
An intermediate stage of
meditation where moods and
thoughts are gradually
receded.
Our conscience is still
maintain a tight rein over our
moods and thoughts.
Source: http://baike.baidu.com/view/454346.htm
20. Faced Round
Now, a third of the company
has adopted GRC and
security policy as part of
corporate culture norm.
InfoSec Pro can now step
away from enforcing GRC
and security policy which are
still visible and view as
constraint.
Source: http://baike.baidu.com/view/454346.htm
In InfoSec
21. Faced Round
Project Manager wins about a
third of the stakeholders.
Even though they seem
compliant, PM still needs to
have the straw rope around
as the mean of control.
Source: http://baike.baidu.com/view/454346.htm
In PMP
22. Tamed
綠楊蔭下古溪邊 放去收來得自然
日暮碧雲芳草地 牧童歸去不須牽
Under green willow by the
ancient mountain stream,
the ox is set at liberty to
pursue his own pleasures;
At the eventide when a grey
mist descends on the
pasture,
the boy wends his
homeward way with the
animal quietly following.
Source: http://www.santosha.com/philosophy/oxherdingpictures-5.html
23. Tamed In Chan
Discipline is no longer a
discipline but mature into a
part of our habit.
Our moods and thoughts are
calmed in two-third of the
time as we meditated.
In Chan, we only need to
spend a third of our time to
quiet our mind.
Source: http://baike.baidu.com/view/454346.htm
24. Tamed
Two-third of a company has
adopted GRC and security
policy.
By now, the straw rope is no
longer needed, rather it is
gradually absorbed in parts
into corporate culture norm.
Source: http://baike.baidu.com/view/454346.htm
In InfoSec
25. Tamed
Project Manager has gained
enough trust with two-third
of stakeholders that they no
longer need to be rein by the
straw rope.
In Tuckman’s Team
Formation, we’re begin to
see the transition to Norming.
Source: http://baike.baidu.com/view/454346.htm
In PMP
26. Unimpeded
露地安眠意自如 不勞鞭策永無拘
山童穩坐青松下 一曲升平樂有餘
On the verdant field the
beast contentedly lies idling
his time away,
no whip is needed now, nor
any kind of restraint;
The boy too sits leisurely
under the pine tree,
playing a tune of peace,
overflowing with joy.
Source: http://www.santosha.com/philosophy/oxherdingpictures-6.html
27. Unimpeded In Chan
Our moods and thoughts are
nearly calm during chan.
Outside of chan, our moods
and thoughts will not
disturb us while we focus on
our tasks.
Source: http://baike.baidu.com/view/454346.htm
28. Unimpeded
Nearly ninety percent of
corporation has adopted
GRC and security policy.
InfoSec Pro is free to work
on other security related
projects and only need to
maintain casual contact to
administrate GRC and
security policy.
Source: http://baike.baidu.com/view/454346.htm
In InfoSec
29. Unimpeded
The rapport between project
manager and stakeholders is
jelled that they can dispense
with the straw rope.
This is not to say that rules
and regulation are ditched.
Rather, PM and stakeholders
are working closely together
that they are not hindered
by it.
Source: http://baike.baidu.com/view/454346.htm
In PMP
30. Laissez Faire
柳岸春波夕照中 淡煙芳草綠茸茸
饑餐渴飲隨時過 石上山童睡正濃
The spring stream in the
evening sun flows languidly
along the willow-lined bank,
in the hazy atmosphere the
meadow grass is seen growing
thick;
When hungry he grazes, when
thirsty he quaffs, as time
sweetly slides,
while the boy on the rock dozes
for hours not noticing anything
that goes on about him.
Source: http://www.santosha.com/philosophy/oxherdingpictures-7.html
31. Laissez Faire In Chan
Our moods and thoughts are
fully subsided in chan and in
our world.
Because there is no obstruction
he has no fear, and he passes far
beyond all confused
imagination and reaches
Ultimate Nirvana.
Source: http://baike.baidu.com/view/454346.htm
32. Laissez Faire
Now that the company has
fully embraced GRC and
security policy as a part of
business culture or norm,
InfoSec Pro can be gone for a
duration and not worry
about information security
breach.
Source: http://baike.baidu.com/view/454346.htm
In InfoSec
33. Laissez Faire
There is a trust between
Project Manager and
stakeholders that the former
could be away from the
project, and nothing is
deviated.
In Tuckman’s Team Formation,
we’re begin to see the
transition to Performing.
Source: http://baike.baidu.com/view/454346.htm
In PMP
34. All Forgotten
The beast all in white now is
surrounded by the white clouds,
The man is perfectly at his case
and care-free, so is his companion;
The white clouds penetrated by
the moon-light cast their white
shadows below,
The white clouds and the bright
moon-light-each following its
course of movement.
白牛常在白雲中 人自無心牛亦同
月透白雲雲影白 白雲明月任西東
Source: http://www.santosha.com/philosophy/oxherdingpictures-8.html
35. All Forgotten
Our moods and thoughts
began to transcend into our
inner conscience.
We experience a serene and
benevolence state both in
and out of chan.
In 2008 US animation, Kung
Fu Panda, Oogway can be
seemed as have reaching this
stage and beyond.
In Chan
Source: http://baike.baidu.com/view/454346.htm
36. All Forgotten
GRC and security policy are
all forgotten in the sense that
they are fully absorbed into
corporate norms.
They do not restraint a
company but allow it to
move with greater certainty
and confidence as if they are
travelled through clouds.
Source: http://baike.baidu.com/view/454346.htm
In InfoSec
37. All Forgotten
As project nears completion,
stakeholders no longer
maintain their identities.
They are assimilated into
project closures. Their needs
are met, and their supports
are concluded.
Source: http://baike.baidu.com/view/454346.htm
In PMP
38. Solitary Moon
Nowhere is the beast, and the
oxherd is master of his time,
He is a solitary cloud wafting
lightly along the mountain
peaks;
Clapping his hands he sings
joyfully in the moon-light,
But remember a last wall is still
left barring his homeward
walk.
牛兒無處牧童閑 一片孤雲碧嶂間
拍手高歌明月下 歸來猶有一重關
Source: http://www.santosha.com/philosophy/oxherdingpictures-9.html
39. Solitary Moon
Our moods and thoughts are
no more. Our inner mind
emerges and we begins to
realize that all are
impermanent.
Our mind begins to awake.
But our body is not ready.
In Chan
Source: http://baike.baidu.com/view/454346.htm
40. Solitary Moon
Understand that GRC is not a
permanent fixture but a cycle
of change.
Core ideas remain the same,
but physical means of
protecting, layering and
defending are ever changing.
There is a loop of new threats
overcoming old defenses which
in turn are remediate by newer
security.
Source: http://baike.baidu.com/view/454346.htm
In InfoSec
41. Solitary Moon
Project Manager, in closing
out the project, reviewed its
charter, and documentation.
Project life cycle embodies
the idea, “All things are
impermanent.”
There is an initiation,
execution, and conclusion.
Source: http://baike.baidu.com/view/454346.htm
In PMP
42. Both Vanished
Both the man and the animal
have disappeared, no traces are
left,
The bright moon-light is empty
and shadowless with all the
ten-thousand objects in it;
If anyone should ask the
meaning of this,
Behold the lilies of the field and
its fresh sweet-scented verdure.
人牛不見杳無蹤 明月光含萬象空
若問其中端的意 野花芳草自叢叢
Source: http://www.santosha.com/philosophy/oxherdingpictures-10.html
43. Both Vanished
The final stage of chan, we
are ready to move on at the
moment of our choosing
with both body and soul.
By being empty of our body
and souls, we are able to
contain myriads of things
without influenced by them.
In Chan
Source: http://baike.baidu.com/view/454346.htm
44. Both Vanished
GRC no longer sticks out as
an inhibitor but as a
competitive leverage.
Like vitamin, it no longer
exists as a distasteful pill. Its
essence spreads through
corporate structure and
strengthens information
security.
Source: http://baike.baidu.com/view/454346.htm
In InfoSec
45. Both Vanished
Project completion by
meeting project objectives
and acceptances of end
results by requesters.
Other than an archive record
in company, the project itself
is no longer existed. There
might be same project
manager and same
stakeholders, but it will
never be the same project.
Source: http://baike.baidu.com/view/454346.htm
In PMP
46. Summary
• While there are no Chan Professional,
nonetheless, there existed a systematic
mapping of Chan progress/stages which
are no different to that of modern
professional system.
• Another word, current professional
system are no different than ancient
schema on bringing order to chaos.
47. Summary
• Again, the focus of Chan Meditation
demonstrated here is on the practicality
that is both measurable and repeatable.
• Confucian meditation favored this form of
Chan Meditation whereas Taoism and
Buddhism favored its spiritual aspect.
48. Summary
• Meditation is gaining traction among
Western business elites as a mean to cope
with information overload and to find the
center within themselves.
• Personally, my meditation borders
between the Undisciplined and
the Discipline Begin.