Book Image

Cyber Minds

By : Shira Rubinoff
Book Image

Cyber Minds

By: Shira Rubinoff

Overview of this book

Shira Rubinoff's Cyber Minds brings together the top authorities in cybersecurity to discuss the emergent threats that face industries, societies, militaries, and governments today. With new technology threats, rising international tensions, and state-sponsored cyber attacks, cybersecurity is more important than ever. Cyber Minds serves as a strategic briefing on cybersecurity and data safety, collecting expert insights from sector security leaders, including: General Gregory Touhill, former Federal Chief Information Security Officer of the United States Kevin L. Jackson, CEO and Founder, GovCloud Mark Lynd, Digital Business Leader, NETSYNC Joseph Steinberg, Internet Security advisor and thought leader Jim Reavis, Co-Founder and CEO, Cloud Security Alliance Dr. Tom Kellerman, Chief Cybersecurity Officer for Carbon Black Inc and Vice Chair of Strategic Cyber Ventures Board Mary Ann Davidson, Chief Security Officer, Oracle Dr. Sally Eaves, Emergent Technology CTO, Global Strategy Advisor – Blockchain AI FinTech, Social Impact award winner, keynote speaker and author Dr. Guenther Dobrauz, Partner with PwC in Zurich and Leader of PwC Legal Switzerland Barmak Meftah, President, AT&T Cybersecurity Cleve Adams, CEO, Site 1001 (AI and big data based smart building company) Ann Johnson, Corporate Vice President – Cybersecurity Solutions Group, Microsoft Barbara Humpton, CEO, Siemens USA Businesses and states depend on effective cybersecurity. This book will help you to arm and inform yourself on what you need to know to keep your business – or your country – safe.
Table of Contents (13 chapters)
9
Can Artificial Intelligence (AI) be Trusted to Run Cybersecurity?
11
Other Books You May Enjoy
12
Index

Discussion

It's unfortunate but true—data breaches are occurring far more frequently than they should, and we should resist accepting them as an unavoidable part of daily life. My interviews with both Tom and Mary stress the cold hard reality that these breaches could have been entirely avoided if the right protocols had been in place. This is precisely why practicing proper cyber hygiene is essential to ensuring a truly cyber secure environment.

Committing to a combined security posture that adds proactive security assessment to reactive security protocols is what ensures the sustainability of your defensives. But you can never back down, as what worked to defend your data yesterday may not work tomorrow, and your previously iron-clad plans could succumb to a breach in the face of new technologies and tactics. Infiltration techniques are rapidly evolving, so companies must identify vulnerabilities in their own systems before breaches happen. Attacks are happening, and...