Book Image

Cyber Minds

By : Shira Rubinoff
Book Image

Cyber Minds

By: Shira Rubinoff

Overview of this book

Shira Rubinoff's Cyber Minds brings together the top authorities in cybersecurity to discuss the emergent threats that face industries, societies, militaries, and governments today. With new technology threats, rising international tensions, and state-sponsored cyber attacks, cybersecurity is more important than ever. Cyber Minds serves as a strategic briefing on cybersecurity and data safety, collecting expert insights from sector security leaders, including: General Gregory Touhill, former Federal Chief Information Security Officer of the United States Kevin L. Jackson, CEO and Founder, GovCloud Mark Lynd, Digital Business Leader, NETSYNC Joseph Steinberg, Internet Security advisor and thought leader Jim Reavis, Co-Founder and CEO, Cloud Security Alliance Dr. Tom Kellerman, Chief Cybersecurity Officer for Carbon Black Inc and Vice Chair of Strategic Cyber Ventures Board Mary Ann Davidson, Chief Security Officer, Oracle Dr. Sally Eaves, Emergent Technology CTO, Global Strategy Advisor – Blockchain AI FinTech, Social Impact award winner, keynote speaker and author Dr. Guenther Dobrauz, Partner with PwC in Zurich and Leader of PwC Legal Switzerland Barmak Meftah, President, AT&T Cybersecurity Cleve Adams, CEO, Site 1001 (AI and big data based smart building company) Ann Johnson, Corporate Vice President – Cybersecurity Solutions Group, Microsoft Barbara Humpton, CEO, Siemens USA Businesses and states depend on effective cybersecurity. This book will help you to arm and inform yourself on what you need to know to keep your business – or your country – safe.
Table of Contents (13 chapters)
9
Can Artificial Intelligence (AI) be Trusted to Run Cybersecurity?
11
Other Books You May Enjoy
12
Index

Discussion

As companies migrate to the cloud, this new paradigm adds complexity when it comes to cybersecurity. Akin to many technological advancements, old problems are solved and new problems are created.

Cloud security

The move to the cloud changes the rules of the game. In the past, there was one point of entry to nearly any system. If we fast-forward to today, the concept of work has changed and is geographically dispersed. As discussed, we have shifted to data-centric security instead of an infrastructure-centric security model. The protocol will travel with the data, as people have to be able to access the data without compromising security. This is the new normal in the age of cloud security.

I want to highlight the obvious takeaway from this chapter: the security of your organization's data within the cloud is still your organization's responsibility. It's critical to realize that when it comes to cloud security, the cloud provider secures the perimeter...