Cyber Minds: The people, the brains, and the voices that keep you Cyber Safe

Cyber Minds: The people, the brains, and the voices that keep you Cyber Safe

English | 2020 | ISBN: 978-1789807004 | 300 Pages | PDF, EPUB, MOBI | 10 MB

Cyber Minds brings together an unrivalled panel of international experts who offer their insights into current cybersecurity issues in the military, business, and government.
Shira Rubinoff’s Cyber Minds brings together the top authorities in cyber security to discuss the emergent threats that face industries, societies, militaries and governments today.
With new technology threats, rising international tensions, and state-sponsored cyber attacks, cybersecurity is more important than ever. Cyber Minds serves as a strategic briefing on cybersecurity and data safety, collecting expert insights from sector security leaders, including
Kevin L. Jackson, CEO and Founder GovCloud
Mark Lynd, Digital Business Leader, NETSYNC
Joseph Steinberg (Internet Security advisor and thought leader)
Jim Reavis, Co-Founder and CEO, Cloud Security Alliance
Dr. Tom Kellerman, Chief Cybersecurity Officer for Carbon Black Inc and Vice Chair of Strategic Cyber Ventures Board
Mary Ann Davidson, Chief Security Officer, Oracle
Dr. Sally Eaves (Emergent Technology CTO | Global Strategy Advisor – Blockchain AI FinTech | Social Impact | Keynote Speaker and Author)
Dr. Guenther Dobrauz, Partner with PwC in Zurich and Leader of PwC Legal Switzerland
Barmak Meftah, President AT&T Cybersecurity
Cleve Adams, CEO Site 1001 (AI, Big Data based smart building company)
Ann Johnson, Corporate Vice President – Cybersecurity Solutions Group, Microsoft
Barbara Humpton, CEO Siemens USA
Businesses and states depend on effective cybersecurity. This book will help you to arm and inform yourself on what you need to know to keep your business – or your country – safe.
What you will learn

  • The threats and opportunities presented by AI
  • How to mitigate social engineering and other ‘human’ threats
  • Developing cybersecurity strategies for the cloud
  • Major data breaches, their causes, consequences, and key learnings
  • Blockchain applications to cybersecurity
  • Implications of IoT and how to secure IoT services
  • The role of security in cyberterrorism and state-sponsored cyber attacks
Homepage