Book Image

Cyber Minds

By : Shira Rubinoff
Book Image

Cyber Minds

By: Shira Rubinoff

Overview of this book

Shira Rubinoff's Cyber Minds brings together the top authorities in cybersecurity to discuss the emergent threats that face industries, societies, militaries, and governments today. With new technology threats, rising international tensions, and state-sponsored cyber attacks, cybersecurity is more important than ever. Cyber Minds serves as a strategic briefing on cybersecurity and data safety, collecting expert insights from sector security leaders, including: General Gregory Touhill, former Federal Chief Information Security Officer of the United States Kevin L. Jackson, CEO and Founder, GovCloud Mark Lynd, Digital Business Leader, NETSYNC Joseph Steinberg, Internet Security advisor and thought leader Jim Reavis, Co-Founder and CEO, Cloud Security Alliance Dr. Tom Kellerman, Chief Cybersecurity Officer for Carbon Black Inc and Vice Chair of Strategic Cyber Ventures Board Mary Ann Davidson, Chief Security Officer, Oracle Dr. Sally Eaves, Emergent Technology CTO, Global Strategy Advisor – Blockchain AI FinTech, Social Impact award winner, keynote speaker and author Dr. Guenther Dobrauz, Partner with PwC in Zurich and Leader of PwC Legal Switzerland Barmak Meftah, President, AT&T Cybersecurity Cleve Adams, CEO, Site 1001 (AI and big data based smart building company) Ann Johnson, Corporate Vice President – Cybersecurity Solutions Group, Microsoft Barbara Humpton, CEO, Siemens USA Businesses and states depend on effective cybersecurity. This book will help you to arm and inform yourself on what you need to know to keep your business – or your country – safe.
Table of Contents (13 chapters)
9
Can Artificial Intelligence (AI) be Trusted to Run Cybersecurity?
11
Other Books You May Enjoy
12
Index

Summary

IoT is the next chapter of digital interconnectedness and can't be avoided by consumers and businesses alike. Still, IoT is accompanied by risks due to the increased surface area from which your data can be lifted more easily. Barbara and Ann gave great advice on how a proactive security posture that actively seeks breaches before they occur is the only way to navigate a world in which IoT is the norm.

Before I move on to our next chapter, I'll leave you with my favorite quote from Barbara: "There are two kinds of people in the world: the people who know they've been hacked and the people who've been hacked and just don't know it." You need to be in the know about the hacking that might be occurring while you're sitting here reading this book.