This human cost should not be forgotten. Rather it should be central to any anti-poaching policy. If we do not change the conversation, this evil trade will only continue unabated. With any luck, an acknowledgement of the economic and security implications of this poaching crisis may help formulate a more nuanced response that will save Africa's great wildlife before it is too late.
Organisations are bombarded with potential threats every day. Most of these are small and irritating, not truly critical--but among those needles are little threads of larger actions at work. An incident response programme enables you to pull out the needles that make up the haystack of the big picture.
What fragile progress on women's rights there has been in recent years is down to the work of Afghan women activists, and it will be down to them to ensure that progress is protected and bettered in the months and years ahead. But their ability to do so will be seriously undermined if their security cannot be assured.
Cybercrime today is not like the early days of virus writers and hackers who bragged about their exploits with friends. Today cybercrime is a serious business where actually most hackers do not want to be noticed as the longer they remain hidden in the network and are free to conduct their operations, the more information they can steal and the more money they can make.
CCTV technology has an integral role to pay in securing general welfare. The question for policy makers is how can we better integrate CCTV into national security policies without losing the individual's rights to privacy, determining who should have access to the footage and how long it can be kept on file for. This is a discussion which is only beginning and which merits serious discussion at all levels of society.
Of course the PC is not going to be replaced completely in business. But such is the power and flexibility of today's mobile devices, and the willingness of businesses to embrace the often-hyped 'Bring Your Own Device' movement, that means we as users are making more and more use of mobile devices not just to watch funny kitten movies, but also to do our 'normal' business day-to-day.
Earlier in the year, I highlighted the importance of using unique, complex passwords for securing our online identities. This is especially true for mobile devices. Many of us today use our phones for the bulk of our online activities. This is very convenient, of course. But it does mean that our online life lies behind a single password.
Across the world, the contentious debate over the future of nuclear power continues apace. In East Asia, for instance, it emerged last month that a nuclear plant in Taiwan may have been leaking radio-active water for three years. Meanwhile, Japan is still struggling to contain radio-active water from Fukushima; and in South Korea prosecutors are conducting a huge investigation into forged nuclear safety certificates.
While the US-Russian deal to dismantle Syria's chemical weapons is a welcome sign that diplomacy has a central part to play in this crisis, the retreat from early talk of military action also suggests a growing reluctance on the part of the US and UK to intervene directly in the Middle East. Whether this is a good or a bad thing, it is certainly something new.
For those firms which misstep, fallout can be very damaging, both for the financial bottom-line and reputationally. However, for those which are pro-active and invest in their capability, the prizes -- both in terms of mitigating risk and seizing opportunity -- are potentially ever more significant.