Bourne Ultimatum

Cyberist Shift: Identity in a Mobile World

Matt Damon races across Waterloo Station, scanning the crowd for a face he can’t quite remember but knows he must find. Phones buzz, cameras swivel, data streams silently in the background. The tension in The Bourne Ultimatum is constant: you are connected everywhere, but trust no one.

That’s where we are in 2007. Blackberrys, Treos, and early iPhones are in boardrooms and airports. Wi-Fi bleeds from every coffee shop. Executives are traveling with more computing power in their pockets than most companies had in their data centers ten years ago.

Everyone feels the rush of mobility. Few realize the cost.


Always On, Rarely in Control

At a luncheon in Dallas, a financial advisor leaned across the table and whispered:
“Kevin, I can check my client portfolios from anywhere now. Isn’t that amazing?”

I asked: “Do you know who else can?”

He froze. The fork halfway to his mouth, the smile gone. He hadn’t thought about that.

Mobility creates opportunity. But it also exposes identity. And in 2007, most professionals are running through the crowd like Bourne—fast, reactive, and constantly looking over their shoulders.


The Myth of Convenience

Technology vendors push a fantasy: everything faster, easier, cheaper. “Access your data anywhere!” “Plug and play!” “Just sync and go!”

The reality is closer to a Bourne chase scene—messy, unpredictable, dangerous. You think you’re in control until the phone buzzes with something you didn’t expect: a lost email, a corrupted file, a stranger piggybacking your Wi-Fi.

A Cyberist sees the lie. Mobility is not convenience. It’s exposure. And the only way to thrive is to build strategy around it—not excuses after it fails.


When Everyone Looks the Same

In The Bourne Ultimatum, Damon moves through a sea of men in black coats. He could be anyone. Or no one.

That’s exactly what’s happening to IT in 2007. Everyone is selling the same “solutions.” Firewalls. Laptops. Remote access. They all blend together, faceless, nameless.

A Cyberist cuts through the fog. Not because of what they sell, but because of who they are. You recognize them immediately—the clarity, the confidence, the ability to turn chaos into precision.


Call No One Wants to Get

In Oklahoma City, a law partner pulled me aside:
“My associates are on the road all the time. I keep hearing about lost laptops and stolen Blackberries. What do we do?”

I told him: “The question isn’t what do you do when you lose a device. It’s how you keep from losing your identity.”

He looked at me like Bourne staring into a surveillance camera—suspicious, yet suddenly aware of the trap he was already inside.


Cyberist Shift

This is the shift of 2007: mobility is here to stay. You can either stumble through it, always reactive, always on edge—or you can step forward with intent.

Cyberists don’t chase every signal. They move deliberately. They filter noise from clarity. They show executives how to thrive in a mobile-first world without losing control of who they are.


Missing the Moment

Here’s what happens if you don’t make the shift: you stay lost in the crowd. Competitors who manage mobility strategically will outpace you. Clients will notice when your people can’t deliver securely on the go. And before long, you’ll be the one looking over your shoulder, wondering what happened.

Just like Bourne.


Claiming Identity in 2007

Mobility isn’t a gadget story—it’s an identity story. You can choose to be another anonymous figure in the station, running faster and faster. Or you can become the one who knows where the exits are, who has the map, who makes the call that others can’t.

That’s the Cyberist shift. And in 2007, it’s no longer optional.

Discover how this story plays out in practice in Cyberist Adaptation.

Leave a Reply