The 15 minutes of fame nobody wants. Given the speed at which security technologies are rushing towards a hyper connected world, are organizations (end-users, integrators, manufacturers) ready to face the threats and risks that go hand-in-hand with networks and clouds? What should Authentication look like and who is responsible for it? The questions are still forming as are the answers. But there is one certainty. The Black Swan is coming. Ask yourself, are you being proactive enough?