Book Image

Cyber Minds

By : Shira Rubinoff
Book Image

Cyber Minds

By: Shira Rubinoff

Overview of this book

Shira Rubinoff's Cyber Minds brings together the top authorities in cybersecurity to discuss the emergent threats that face industries, societies, militaries, and governments today. With new technology threats, rising international tensions, and state-sponsored cyber attacks, cybersecurity is more important than ever. Cyber Minds serves as a strategic briefing on cybersecurity and data safety, collecting expert insights from sector security leaders, including: General Gregory Touhill, former Federal Chief Information Security Officer of the United States Kevin L. Jackson, CEO and Founder, GovCloud Mark Lynd, Digital Business Leader, NETSYNC Joseph Steinberg, Internet Security advisor and thought leader Jim Reavis, Co-Founder and CEO, Cloud Security Alliance Dr. Tom Kellerman, Chief Cybersecurity Officer for Carbon Black Inc and Vice Chair of Strategic Cyber Ventures Board Mary Ann Davidson, Chief Security Officer, Oracle Dr. Sally Eaves, Emergent Technology CTO, Global Strategy Advisor – Blockchain AI FinTech, Social Impact award winner, keynote speaker and author Dr. Guenther Dobrauz, Partner with PwC in Zurich and Leader of PwC Legal Switzerland Barmak Meftah, President, AT&T Cybersecurity Cleve Adams, CEO, Site 1001 (AI and big data based smart building company) Ann Johnson, Corporate Vice President – Cybersecurity Solutions Group, Microsoft Barbara Humpton, CEO, Siemens USA Businesses and states depend on effective cybersecurity. This book will help you to arm and inform yourself on what you need to know to keep your business – or your country – safe.
Table of Contents (13 chapters)
9
Can Artificial Intelligence (AI) be Trusted to Run Cybersecurity?
11
Other Books You May Enjoy
12
Index

Discussion

The good news is that IoT doesn't mean that security policy needs to be entirely rewritten, as a lot of the same rules that I've covered in depth apply. Training, global awareness, security, and Zero Trust are extremely relevant in this chapter, as is procuring devices that are built from the ground up with security considerations in mind. Understanding people, processes, and technology is still the bedrock of effective cybersecurity within your organization, and IoT is a just another item on the growing list of responsibilities for cybersecurity professionals. 

Cultural change

Barbara offers excellent advice for organizations when she points out that cultural change must be driven from within. She puts emphasis on practical and no-nonsense policies that are imperative to maintaining your cyber hygiene in the age of IoT. Moreover, she touches on a theme that I repeat throughout this book regarding the shared nature of responsibility in cybersecurity...