Losing the Cybersecurity War: And What We Can Do to Stop It
- Length: 148 pages
- Edition: 1
- Language: English
- Publisher: CRC Press
- Publication Date: 2022-12-07
- ISBN-10: 1032364084
- ISBN-13: 9781032364087
- Sales Rank: #2632773 (See Top 100 Books)
An explanation of the five pillars or battlefields of Cybersecurity and how a Zero Trust approach can change the advantage on each battlefield. Deep dive into each of five battlefields where we have a decided disadvantage due to constitutional structure and moral behavioural guidelines and examples of how we got here, and what we can do about it, and moreover why we got here and how we can avoid those traps in the future. A unique viewpoint that has never been explored – five battlefields include Economics, Technology, Information, Education and Leadership – and how each has contributed to our current disadvantage on the global stage – and how Zero Trust can change the game to an advantage for us going forward. The Zero Trust credibility is directly from the father of Zero Trust, John Kindervag who says And now, Steve has written a new book on Zero Trust called: LOSING THE CYBERSECURITY WAR: Reversing the Attacker/Defender Dynamic on the Five Battlefields of Cybersecurity. It is undeniably the best Zero Trust book yet written. While other writers have focused on implementing Zero Trust from their perspectives, Steve focuses on why Zero Trust is so important on the modern cybersecurity battlefield. His concept of the five cyber battlefields is a great insight that will help us win the cyberwar. By weaving Zero Trust principles throughout these five concepts, Steve demonstrates how the ideas and efforts involved in building Zero Trust environments will lead to a profound shift in terrain advantage. No longer will attackers own the high ground. As defenders and protectors, we can leverage modern technology in a Zero Trust way to keep our data and assets safe from exfiltration and exploitation.
Cover Half Title Title Page Copyright Page Contents Foreword Testimonials Preface Acknowledgements Introduction Chapter 1. What Is Zero Trust? Adopter Challenge Zero Trust 24/7 Mission Chapter 2. The Five Battlefields of Cybersecurity Education Technology Information Economics Leadership Chapter 3. The Impact of the Last 20 Years Mission Reveal IIoT/IoT and Cyber-physical Threats Geo-political Power Shifts Out of Control The Future Human Factors Ransomware Lessons Learned Gaming Air Transportation True 20 Years Ago; True Today Chapter 4. The Connected World Healthcare Scares Coffee Money Unintended Traps Water Everywhere Goodbye VPN An Absence of Accountability A Real Business Problem We Need Help Chapter 5. Cybersecurity Problems Are Hard Problems The Constant Drumroll Dependency Confusion Houston, We May Have a Problem The Pivotal Question The Risk Threshold How the Open Source Supply Chain Operates Refresh What Can We Do? The Target Expands The Government Acts Late Entries A Textbook Classic for the Future Predictions National Service Chapter 6. Advertising Our Vulnerabilities Reverse Course Alternate Marketing Brand Authority/Brand Awareness/Branded Content Branded Content What's Next? Chapter 7. Why We Got Here A Little History Information Technology Meets Design The 2000s The DoD and NSA Step in Where Angels Dare to Tread Chapter 8. The Institutionalization All's Fair in Love and War The CISO Era Begins Isolating ROI IT and OT: A Narrowed Vision The Technology of a New Era Worry Later The Skills Gap Chapter 9. The End and the Beginning Epilogue
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.