Book Image

Cyber Minds

By : Shira Rubinoff
Book Image

Cyber Minds

By: Shira Rubinoff

Overview of this book

Shira Rubinoff's Cyber Minds brings together the top authorities in cybersecurity to discuss the emergent threats that face industries, societies, militaries, and governments today. With new technology threats, rising international tensions, and state-sponsored cyber attacks, cybersecurity is more important than ever. Cyber Minds serves as a strategic briefing on cybersecurity and data safety, collecting expert insights from sector security leaders, including: General Gregory Touhill, former Federal Chief Information Security Officer of the United States Kevin L. Jackson, CEO and Founder, GovCloud Mark Lynd, Digital Business Leader, NETSYNC Joseph Steinberg, Internet Security advisor and thought leader Jim Reavis, Co-Founder and CEO, Cloud Security Alliance Dr. Tom Kellerman, Chief Cybersecurity Officer for Carbon Black Inc and Vice Chair of Strategic Cyber Ventures Board Mary Ann Davidson, Chief Security Officer, Oracle Dr. Sally Eaves, Emergent Technology CTO, Global Strategy Advisor – Blockchain AI FinTech, Social Impact award winner, keynote speaker and author Dr. Guenther Dobrauz, Partner with PwC in Zurich and Leader of PwC Legal Switzerland Barmak Meftah, President, AT&T Cybersecurity Cleve Adams, CEO, Site 1001 (AI and big data based smart building company) Ann Johnson, Corporate Vice President – Cybersecurity Solutions Group, Microsoft Barbara Humpton, CEO, Siemens USA Businesses and states depend on effective cybersecurity. This book will help you to arm and inform yourself on what you need to know to keep your business – or your country – safe.
Table of Contents (13 chapters)
9
Can Artificial Intelligence (AI) be Trusted to Run Cybersecurity?
11
Other Books You May Enjoy
12
Index

Up-to-date security

As we've discussed, sometimes cybersecurity professionals glaze over the basics and run out-of-date, unsupported OSs as a matter of convenience. This is a common phenomenon because many organizations are already large and spread out or are growing so rapidly that those in charge have trouble keeping track of every single device.  It's not always easy, but running an updated OS is essential. Having the right, forward-looking processes in place to identify the next necessary update and prepare for it as far ahead of time as possible is essential. Bad actors keep their technology up to date and wait eagerly for the next update; your organization needs to be just as eager for the next opportunity to add to their security.

Patching is a task that can be cumbersome, expensive, and time consuming. That's why it's critical for an organization to have the right process—a designated group of people that handle patching. This key group of...