The Second Economy: The Race for Trust, Treasure and Time in the Cybersecurity War
Autor Steve Grobman, Allison Cerra Cuvânt înainte de Christopher Youngen Limba Engleză Paperback – 7 oct 2016
Gain a practical prescription for both private and public organizations to remediate threats and maintain a competitive pace to lead and thrive in an ever-shifting environment.
In today’s hyper-connected, always-on era of pervasive mobility, cloud computing and intelligent connected devices, virtually every step we take, every transaction we initiate, and every interaction we have are supported in some way by this vast global infrastructure. This set of interconnected systems comprises the fundamental building blocks of the second economy – the very foundation of our first economy. And adversaries, whether motivated by profit, principle or province, are singularly focused on winning the race through a relentless portfolio of shifting attack vectors.
Make no mistake about it, we are running a race. This is a race against a faceless, nameless adversary – one that dictates the starting line, the rules of the road, and what trophies are at stake. Established assumptions must be challenged, strategies must be revised, and long-held practices must be upended to run this race and effectively compete.
In today’s hyper-connected, always-on era of pervasive mobility, cloud computing and intelligent connected devices, virtually every step we take, every transaction we initiate, and every interaction we have are supported in some way by this vast global infrastructure. This set of interconnected systems comprises the fundamental building blocks of the second economy – the very foundation of our first economy. And adversaries, whether motivated by profit, principle or province, are singularly focused on winning the race through a relentless portfolio of shifting attack vectors.
Make no mistake about it, we are running a race. This is a race against a faceless, nameless adversary – one that dictates the starting line, the rules of the road, and what trophies are at stake. Established assumptions must be challenged, strategies must be revised, and long-held practices must be upended to run this race and effectively compete.
The Second Economy highlights a second to none approach in this fight, as the effectiveness and ROI of security solutions are increasingly measured by the business outcomes they enable.
What You Will Learn:- Understand the value of time and trust in a cyber-warfare world
- Enable agile and intelligent organizations to minimize their risk of falling victim to the next attack
- Accelerate response time by adopting a holistic approach
- Eliminate friction across the threat defense lifecycle, from protection to detection to correction
- Gain a sustainable competitive advantage by seizing first mover advantage
- Deploy solutions across an open, integrated security framework
Who This Book Is For:
Senior-level IT decision makers concerned with ascribing business value to a robust security strategy. The book also addresses business decision makers who must be educated about the pervasive and growing cyber threatscape (including CXOs, board directors, and functional leaders) as well as general business employees to understand how they may become unwitting participants in a complex cyber war.Preț: 143.45 lei
Preț vechi: 179.32 lei
-20% Nou
Puncte Express: 215
Preț estimativ în valută:
27.45€ • 28.52$ • 22.80£
27.45€ • 28.52$ • 22.80£
Carte disponibilă
Livrare economică 13-27 ianuarie 25
Livrare express 27 decembrie 24 - 02 ianuarie 25 pentru 26.55 lei
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781484222287
ISBN-10: 1484222288
Pagini: 250
Ilustrații: XXXII, 238 p. 8 illus.
Dimensiuni: 155 x 235 x 20 mm
Greutate: 0.33 kg
Ediția:1st ed.
Editura: Apress
Colecția Apress
Locul publicării:Berkeley, CA, United States
ISBN-10: 1484222288
Pagini: 250
Ilustrații: XXXII, 238 p. 8 illus.
Dimensiuni: 155 x 235 x 20 mm
Greutate: 0.33 kg
Ediția:1st ed.
Editura: Apress
Colecția Apress
Locul publicării:Berkeley, CA, United States
Cuprins
Prologue
Chapter 1: The Second Side of the Story
Chapter 2: The Second Nature of Markets
Chapter 3: Seconding the Cause
Chapter 4: No Second Chance
Chapter 5: Second Guessing the Obvious
Chapter 6: Playing Second Fiddle
Chapter 7: Take a Second Look
Chapter 8: When Seconds Matter
Chapter 9: Second to None
Chapter 10: Cybersecurity’s Second Wind
Epilogue
Chapter 1: The Second Side of the Story
Chapter 2: The Second Nature of Markets
Chapter 3: Seconding the Cause
Chapter 4: No Second Chance
Chapter 5: Second Guessing the Obvious
Chapter 6: Playing Second Fiddle
Chapter 7: Take a Second Look
Chapter 8: When Seconds Matter
Chapter 9: Second to None
Chapter 10: Cybersecurity’s Second Wind
Epilogue
Notă biografică
A self-proclaimed cybersecurity pragmatist, Steve Grobman has spent over two decades in senior technical leadership positions related to the field of cybersecurity. He has the distinction of serving on both sides of the white-hat fight: both in defending his company against adversaries and in building innovative cyber security defense technology to protect consumers and organizations around the world. An avid student and teacher of the trade, Grobman earned his bachelor’s degree in Computer Science from North Carolina State University, has published multiple technical papers and books and holds 24 US and international patents in the fields of security, software, and computer architecture, with another roughly 20 patents pending. He regularly provides perspectives of the adversary, the evolving threatscape and the measures organizations and consumers alike can take in protecting themselves to industry insiders, media, analysts and customers the world over – all delivered in laymen’s terms that distill extraordinarily complex problems into actionable prescriptions.
Allison Cerra found her life’s calling at 18 years of age, when she fortuitously stumbled into a lifelong career of marketing complex technologies. A frustrated anthropologist at heart, Cerra enjoys understanding how the technologies around us are fundamentally altering the way we live, work, learn and play. Whether in dissecting how broadband upends traditional economies, how technology influences and reflects company culture or how virtual and physical worlds converge to create a new human psyche, Cerra has explored the intersection of technology and behavior in several books. In 2015, motivated by a desire to stand on the good side of a fight too important to lose, Cerra joined the ranks of cybersecurity professionals, where she currently marries her calling for marketing with a cause of educating unwitting participants in a virtual battle that isunderestimated, if not ignored, by far too many.
Caracteristici
Written by industry leaders Speaks to a business audience about why cyber security is vital Discusses the current stage of cyber security, where it is leading, and how many are following the wrong prescription