The Digital Big Bang
The Hard Stuff, the Soft Stuff, and the Future of Cybersecurity
Gebonden Engels 2019 1e druk 9781119617365Samenvatting
Cybersecurity experts from across industries and sectors share insights on how to think like scientists to master cybersecurity challenges
Humankind’s efforts to explain the origin of the cosmos birthed disciplines such as physics and chemistry. Scientists conceived of the cosmic 'Big Bang' as an explosion of particles-everything in the universe centered around core elements and governed by laws of matter and gravity. In the modern era of digital technology, we are experiencing a similar explosion of ones and zeros, an exponentially expanding universe of bits of data centered around the core elements of speed and connectivity. One of the disciplines to emerge from our efforts to make sense of this new universe is the science of cybersecurity.
Cybersecurity is as central to the Digital Age as physics and chemistry were to the Scientific Age. The Digital Big Bang explores current and emerging knowledge in the field of cybersecurity, helping readers think like scientists to master cybersecurity principles and overcome cybersecurity challenges.
This innovative text adopts a scientific approach to cybersecurity, identifying the science’s fundamental elements and examining how these elements intersect and interact with each other. Author Phil Quade distills his over three decades of cyber intelligence, defense, and attack experience into an accessible, yet detailed, single-volume resource. Designed for non-specialist business leaders and cybersecurity practitioners alike, this authoritative book is packed with real-world examples, techniques, and strategies no organization should be without. Contributions from many of the world’s leading cybersecurity experts and policymakers enable readers to firmly grasp vital cybersecurity concepts, methods, and practices. This important book:
- Guides readers on both fundamental tactics and advanced strategies
- Features observations, hypotheses, and conclusions on a wide range of cybersecurity issues
- Helps readers work with the central elements of cybersecurity, rather than fight or ignore them
- Includes content by cybersecurity leaders from organizations such as Microsoft, Target, ADP, Capital One, Verisign, AT&T, Samsung, and many others
- Offers insights from national-level security experts including former Secretary of Homeland Security Michael Chertoff and former Director of National Intelligence Mike McConnell
'The Digital Big Bang' is an invaluable source of information for anyone faced with the challenges of 21st century cybersecurity in all industries and sectors, including business leaders, policy makers, analysts and researchers as well as IT professionals, educators, and students.
Trefwoorden
cybersecurity snelheid connectiviteit cryptografie authenticatie segmentatie patching toegangscontrole zichtbaarheid training foutherstel privacy inspectie complexiteitsbeheer databeveiliging menselijke kwetsbaarheid digitale transformatie kunstmatige intelligentie risicobeheer bedreigingsdetectie dreigingsinformatie internet of things resilience naleving cyberoorlog cloudbeveiliging strategie governance detectie en respons autonome systemen
Trefwoorden
Specificaties
Lezersrecensies
Inhoudsopgave
U kunt van deze inhoudsopgave een PDF downloaden
SECTION 1: BINDING STRATEGIES 1
1 SPEED 5
Speed: The Nucleus of the Cyberfrontier
Roland Cloutier, ADP 7
Is Speed an Advantage? It Depends on the Context
Scott Charney, Microsoft 18
2 CONNECTIVITY 23
Managing the Intensifying Connectivity of the IoT Era
Brian Talbert, Alaska Airlines 25
Cyberspace: Making Some Sense of It All
Chris Inglis, Former NSA Deputy Director 30
SECTION 2: ELEMENTARY SHORTFALLS 43
3 AUTHENTICATION 47
Authentication, Data Integrity, Nonrepudiation,
Availability, and Confidentiality: The Five Pillars of Security
Mike McConnell, Former Director of National Intelligence 50
Authentication and Models of Trust
Shannon Lietz, Intuit 58
4 PATCHING 65
Patching: A Growing Challenge and a Needed Discipline
Chris Richter, Former VP of Global Security Services, CenturyLink 68
Conquer or Be Conquered
Renee Tarun, Fortinet 74
5 TRAINING 79
Fill the Skills Gap with an Environment of Continual Training
Chris McDaniels, CT Cubed, Inc. 82
Employee Training Is Key for Cybersecurity
Mo Katibeh, AT&T 89
Training Is a Mindset
Dave Rankin, Verisign 97
SECTION 3: FUNDAMENTAL STRATEGIES 103
6 CRYPTOGRAPHY 105
Cryptography: The Backbone of Cybersecurity
Taher Elgamal, Salesforce 108
Cryptography: The Good, the Bad, and the Future
Dan Boneh, Stanford 117
7 ACCESS CONTROL 127
Managing Access in Challenging Environments
Erik Devine, Riverside Health 130
A Systematic Approach to Access Control
George Do, Equinix 136
8 SEGMENTATION 143
Successful Segmentation Isn’t Separation: It’s Collaboration
Colin Anderson, Levi Strauss & Co 147
Why We Need to Segment Networks
Hussein Syed, RWJBarnabas Health 153
SECTION 4: ADVANCED STRATEGIES 161
9 VISIBILITY 164
Visibility: Identifying Pathogens,
Risk Factors, and Symptoms of Cyberattacks
Michael Chertoff, Former Secretary, Department of Homeland Security 167
20/20 Insight: Redefining Visibility to Stop Modern
Cybercrime Syndicates
Tim Crothers, Target 173
The Challenge of Visibility
Daniel Hooper, PIMCO 180
10 INSPECTION 188
In and Out of the Shadows: The Visibility That Inspection
Enables Is Not Confined to Technology Alone
Ed Amoroso, TAG Cyber 192
The Fundamental Importance of Inspection
Michael Johnson, Capital One 199
11 FAILURE RECOVERY 206
Preparation, Response, and Recovery
Thad Allen, Booz Allen Hamilton 209
Cyber Event Recovery
Simon Lambe, Royal Mail 216
SECTION 5: HIGHER-ORDER DIMENSIONS 223
12 COMPLEXITY MANAGEMENT 226
Shift Your Mindset to Manage Complexity
Michael Daniel, Cyber Threat Alliance 229
Seven Steps to Reducing Complexity
Jay Gonzales, Samsung 238
13 PRIVACY. 246
Don’t Panic! Security Pros Must Learn to Embrace the New
Era of Privacy
Kevin Miller, MGM Resorts International 249
Stricter Privacy Regulations Are Driving the Conversations-and Innovations-We Need
Peter Keenan, Global Financial Services Firm 259
14 HUMAN FRAILTY 265
Overcoming Human Frailty: People and the Power of Obligation
Kevin Kealy, Ingram Micro 268
Overcoming Human Frailty by Design
Theresa Payton, Fortalice 274
THE FUTURE 282
Why Cybersecurity Needs AI
Michael Xie, Fortinet 290
The Future of Cybersecurity
Ken Xie, Fortinet 293
INDEX 301
Anderen die dit boek kochten, kochten ook
Rubrieken
- advisering
- algemeen management
- coaching en trainen
- communicatie en media
- economie
- financieel management
- inkoop en logistiek
- internet en social media
- it-management / ict
- juridisch
- leiderschap
- marketing
- mens en maatschappij
- non-profit
- ondernemen
- organisatiekunde
- personal finance
- personeelsmanagement
- persoonlijke effectiviteit
- projectmanagement
- psychologie
- reclame en verkoop
- strategisch management
- verandermanagement
- werk en loopbaan