Book Image

Cyber Minds

By : Shira Rubinoff
Book Image

Cyber Minds

By: Shira Rubinoff

Overview of this book

Shira Rubinoff's Cyber Minds brings together the top authorities in cybersecurity to discuss the emergent threats that face industries, societies, militaries, and governments today. With new technology threats, rising international tensions, and state-sponsored cyber attacks, cybersecurity is more important than ever. Cyber Minds serves as a strategic briefing on cybersecurity and data safety, collecting expert insights from sector security leaders, including: General Gregory Touhill, former Federal Chief Information Security Officer of the United States Kevin L. Jackson, CEO and Founder, GovCloud Mark Lynd, Digital Business Leader, NETSYNC Joseph Steinberg, Internet Security advisor and thought leader Jim Reavis, Co-Founder and CEO, Cloud Security Alliance Dr. Tom Kellerman, Chief Cybersecurity Officer for Carbon Black Inc and Vice Chair of Strategic Cyber Ventures Board Mary Ann Davidson, Chief Security Officer, Oracle Dr. Sally Eaves, Emergent Technology CTO, Global Strategy Advisor – Blockchain AI FinTech, Social Impact award winner, keynote speaker and author Dr. Guenther Dobrauz, Partner with PwC in Zurich and Leader of PwC Legal Switzerland Barmak Meftah, President, AT&T Cybersecurity Cleve Adams, CEO, Site 1001 (AI and big data based smart building company) Ann Johnson, Corporate Vice President – Cybersecurity Solutions Group, Microsoft Barbara Humpton, CEO, Siemens USA Businesses and states depend on effective cybersecurity. This book will help you to arm and inform yourself on what you need to know to keep your business – or your country – safe.
Table of Contents (13 chapters)
9
Can Artificial Intelligence (AI) be Trusted to Run Cybersecurity?
11
Other Books You May Enjoy
12
Index

Looking beyond the four steps – risky behaviors that you need to recognize

In this opening chapter, we looked at what I consider the four vital steps to solidify your cyber hygiene, and how to implement these steps across all facets of your organization. In the next chapter, we'll look at examples of how certain employee behaviors are outsized drivers of risk and how to mitigate or quash those patterns.

As a clear takeaway, you should have a substantial grasp of what's at stake and what it takes to practice proper hygiene in today's world. Humans are the weak link in the security chain if you don't consider them, and by considering humans as the solution instead of the problem, you change the security outlook of your whole organization.

You'll see many of these concepts touched upon again through the book as we discuss cyber hygiene in a changing digital landscape.

Now, I want to take the time to review some of the risky behaviors that employees are prone to engaging in, and how it can compromise everything. In the next chapter, we'll discuss the most common pitfalls that employees tend to fall into, and how those seemingly trivial events can wreak havoc on your organization and your reputation—and, ultimately, your bottom line.