Andere Kunden interessierten sich auch für
- Mike BursellTrust in Computer Systems and the Cloud44,99 €
- Jean-Guillaume DumasFoundations of Coding134,99 €
- Cybersecurity in the Transportation Industry213,99 €
- Cyber-Vigilance and Digital Trust191,99 €
- Karl Maria Michael de Leeuw (ed.)The History of Information Security285,99 €
- Cyber Security and Digital Forensics265,99 €
- Blockchain for Distributed Systems Security141,99 €
-
-
-
Produktdetails
- Verlag: Wiley
- Seitenzahl: 336
- Erscheinungstermin: 11. September 2019
- Englisch
- Abmessung: 236mm x 155mm x 20mm
- Gewicht: 567g
- ISBN-13: 9781119617365
- ISBN-10: 1119617367
- Artikelnr.: 56283987
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
Phil Quade is the CISO of Fortinet. Phil brings more than three decades of cyber intelligence, defense, and attack experience, working across foreign, government, and commercial industry sectors.
Introduction xvii
Section 1: Binding Strategies 1
1 Speed 5
Speed: The Nucleus of the Cyberfrontier 7
Roland Cloutier, ADP
Is Speed an Advantage? It Depends on the Context 18
Scott Charney, Microsoft
2 Connectivity 23
Managing the Intensifying Connectivity of the IoT Era 25
Brian Talbert, Alaska Airlines
Cyberspace: Making Some Sense of It All 30
Chris Inglis, Former NSA Deputy Director
Section 2: Elementary Shortfalls 43
3 Authentication 47
Authentication, Data Integrity, Nonrepudiation, Availability, and
Confidentiality: The Five Pillars of Security 50
Mike McConnell, Former Director of National Intelligence
Authentication and Models of Trust 58
Shannon Lietz, Intuit
4 Patching 65
Patching: A Growing Challenge and a Needed Discipline 68
Chris Richter, Former VP of Global Security Services, CenturyLink
Conquer or Be Conquered 74
Renee Tarun, Fortinet
5 Training 79
Fill the Skills Gap with an Environment of Continual Training 82
Chris McDaniels, CT Cubed, Inc.
Employee Training is Key for Cybersecurity 89
Mo Katibeh, AT&T
Training is a Mindset 97
Dave Rankin, Verisign
Section 3: Fundamental Strategies 103
6 Cryptography 105
Cryptography: The Backbone of Cybersecurity 108
Taher Elgamal, Salesforce
Cryptography: The Good, the Bad, and the Future 117
Dan Boneh, Stanford
7 Access Control 127
Managing Access in Challenging Environments 130
Erik Devine, Riverside Health
A Systematic Approach to Access Control 136
George Do, Equinix
8 Segmentation 143
Successful Segmentation Isn't Separation: It's Collaboration 147
Colin Anderson, Levi Strauss & Co.
Why We Need to Segment Networks 153
Hussein Syed, RWJBarnabas Health
Section 4: Advanced Strategies 161
9 Visibility 164
Visibility: Identifying Pathogens, Risk Factors, and Symptoms of
Cyberattacks 167
Michael Chertoff, Former Secretary, Department of Homeland Security
20/20 Insight: Redefining Visibility to Stop Modern Cybercrime Syndicates
173
Tim Crothers, Target
The Challenge of Visibility 180
Daniel Hooper, PIMCO
10 Inspection 188
In and Out of the Shadows: The Visibility That Inspection Enables is Not
Confined to Technology Alone 192
Ed Amoroso, TAG Cyber
The Fundamental Importance of Inspection 199
Michael Johnson, Capital One
11 Failure Recovery 206
Preparation, Response, and Recovery 209
Thad Allen, Booz Allen Hamilton
Cyber Event Recovery 219
Simon Lambe, Royal Mail
Section 5: Higher-Order Dimensions 223
12 Complexity Management 226
Shift Your Mindset to Manage Complexity 229
Michael Daniel, Cyber Threat Alliance
Seven Steps to Reducing Complexity 238
Jay Gonzales, Samsung
13 Privacy 246
Don't Panic! Security Pros Must Learn to Embrace the New Era of Privacy 249
Kevin Miller, MGM Resorts International
Stricter Privacy Regulations Are Driving the Conversations-and
Innovations-We Need 259
Peter Keenan, Global Financial Services Firm
14 Human Frailty 265
Overcoming Human Frailty: People and the Power of Obligation 268
Kevin Kealy, Ingram Micro
Overcoming Human Frailty by Design 274
Theresa Payton, Fortalice
The Future 282
Why Cybersecurity Needs AI 290
Michael Xie, Fortinet
The Future of Cybersecurity 293
Ken Xie, Fortinet
Index 301
Section 1: Binding Strategies 1
1 Speed 5
Speed: The Nucleus of the Cyberfrontier 7
Roland Cloutier, ADP
Is Speed an Advantage? It Depends on the Context 18
Scott Charney, Microsoft
2 Connectivity 23
Managing the Intensifying Connectivity of the IoT Era 25
Brian Talbert, Alaska Airlines
Cyberspace: Making Some Sense of It All 30
Chris Inglis, Former NSA Deputy Director
Section 2: Elementary Shortfalls 43
3 Authentication 47
Authentication, Data Integrity, Nonrepudiation, Availability, and
Confidentiality: The Five Pillars of Security 50
Mike McConnell, Former Director of National Intelligence
Authentication and Models of Trust 58
Shannon Lietz, Intuit
4 Patching 65
Patching: A Growing Challenge and a Needed Discipline 68
Chris Richter, Former VP of Global Security Services, CenturyLink
Conquer or Be Conquered 74
Renee Tarun, Fortinet
5 Training 79
Fill the Skills Gap with an Environment of Continual Training 82
Chris McDaniels, CT Cubed, Inc.
Employee Training is Key for Cybersecurity 89
Mo Katibeh, AT&T
Training is a Mindset 97
Dave Rankin, Verisign
Section 3: Fundamental Strategies 103
6 Cryptography 105
Cryptography: The Backbone of Cybersecurity 108
Taher Elgamal, Salesforce
Cryptography: The Good, the Bad, and the Future 117
Dan Boneh, Stanford
7 Access Control 127
Managing Access in Challenging Environments 130
Erik Devine, Riverside Health
A Systematic Approach to Access Control 136
George Do, Equinix
8 Segmentation 143
Successful Segmentation Isn't Separation: It's Collaboration 147
Colin Anderson, Levi Strauss & Co.
Why We Need to Segment Networks 153
Hussein Syed, RWJBarnabas Health
Section 4: Advanced Strategies 161
9 Visibility 164
Visibility: Identifying Pathogens, Risk Factors, and Symptoms of
Cyberattacks 167
Michael Chertoff, Former Secretary, Department of Homeland Security
20/20 Insight: Redefining Visibility to Stop Modern Cybercrime Syndicates
173
Tim Crothers, Target
The Challenge of Visibility 180
Daniel Hooper, PIMCO
10 Inspection 188
In and Out of the Shadows: The Visibility That Inspection Enables is Not
Confined to Technology Alone 192
Ed Amoroso, TAG Cyber
The Fundamental Importance of Inspection 199
Michael Johnson, Capital One
11 Failure Recovery 206
Preparation, Response, and Recovery 209
Thad Allen, Booz Allen Hamilton
Cyber Event Recovery 219
Simon Lambe, Royal Mail
Section 5: Higher-Order Dimensions 223
12 Complexity Management 226
Shift Your Mindset to Manage Complexity 229
Michael Daniel, Cyber Threat Alliance
Seven Steps to Reducing Complexity 238
Jay Gonzales, Samsung
13 Privacy 246
Don't Panic! Security Pros Must Learn to Embrace the New Era of Privacy 249
Kevin Miller, MGM Resorts International
Stricter Privacy Regulations Are Driving the Conversations-and
Innovations-We Need 259
Peter Keenan, Global Financial Services Firm
14 Human Frailty 265
Overcoming Human Frailty: People and the Power of Obligation 268
Kevin Kealy, Ingram Micro
Overcoming Human Frailty by Design 274
Theresa Payton, Fortalice
The Future 282
Why Cybersecurity Needs AI 290
Michael Xie, Fortinet
The Future of Cybersecurity 293
Ken Xie, Fortinet
Index 301
Introduction xvii
Section 1: Binding Strategies 1
1 Speed 5
Speed: The Nucleus of the Cyberfrontier 7
Roland Cloutier, ADP
Is Speed an Advantage? It Depends on the Context 18
Scott Charney, Microsoft
2 Connectivity 23
Managing the Intensifying Connectivity of the IoT Era 25
Brian Talbert, Alaska Airlines
Cyberspace: Making Some Sense of It All 30
Chris Inglis, Former NSA Deputy Director
Section 2: Elementary Shortfalls 43
3 Authentication 47
Authentication, Data Integrity, Nonrepudiation, Availability, and
Confidentiality: The Five Pillars of Security 50
Mike McConnell, Former Director of National Intelligence
Authentication and Models of Trust 58
Shannon Lietz, Intuit
4 Patching 65
Patching: A Growing Challenge and a Needed Discipline 68
Chris Richter, Former VP of Global Security Services, CenturyLink
Conquer or Be Conquered 74
Renee Tarun, Fortinet
5 Training 79
Fill the Skills Gap with an Environment of Continual Training 82
Chris McDaniels, CT Cubed, Inc.
Employee Training is Key for Cybersecurity 89
Mo Katibeh, AT&T
Training is a Mindset 97
Dave Rankin, Verisign
Section 3: Fundamental Strategies 103
6 Cryptography 105
Cryptography: The Backbone of Cybersecurity 108
Taher Elgamal, Salesforce
Cryptography: The Good, the Bad, and the Future 117
Dan Boneh, Stanford
7 Access Control 127
Managing Access in Challenging Environments 130
Erik Devine, Riverside Health
A Systematic Approach to Access Control 136
George Do, Equinix
8 Segmentation 143
Successful Segmentation Isn't Separation: It's Collaboration 147
Colin Anderson, Levi Strauss & Co.
Why We Need to Segment Networks 153
Hussein Syed, RWJBarnabas Health
Section 4: Advanced Strategies 161
9 Visibility 164
Visibility: Identifying Pathogens, Risk Factors, and Symptoms of
Cyberattacks 167
Michael Chertoff, Former Secretary, Department of Homeland Security
20/20 Insight: Redefining Visibility to Stop Modern Cybercrime Syndicates
173
Tim Crothers, Target
The Challenge of Visibility 180
Daniel Hooper, PIMCO
10 Inspection 188
In and Out of the Shadows: The Visibility That Inspection Enables is Not
Confined to Technology Alone 192
Ed Amoroso, TAG Cyber
The Fundamental Importance of Inspection 199
Michael Johnson, Capital One
11 Failure Recovery 206
Preparation, Response, and Recovery 209
Thad Allen, Booz Allen Hamilton
Cyber Event Recovery 219
Simon Lambe, Royal Mail
Section 5: Higher-Order Dimensions 223
12 Complexity Management 226
Shift Your Mindset to Manage Complexity 229
Michael Daniel, Cyber Threat Alliance
Seven Steps to Reducing Complexity 238
Jay Gonzales, Samsung
13 Privacy 246
Don't Panic! Security Pros Must Learn to Embrace the New Era of Privacy 249
Kevin Miller, MGM Resorts International
Stricter Privacy Regulations Are Driving the Conversations-and
Innovations-We Need 259
Peter Keenan, Global Financial Services Firm
14 Human Frailty 265
Overcoming Human Frailty: People and the Power of Obligation 268
Kevin Kealy, Ingram Micro
Overcoming Human Frailty by Design 274
Theresa Payton, Fortalice
The Future 282
Why Cybersecurity Needs AI 290
Michael Xie, Fortinet
The Future of Cybersecurity 293
Ken Xie, Fortinet
Index 301
Section 1: Binding Strategies 1
1 Speed 5
Speed: The Nucleus of the Cyberfrontier 7
Roland Cloutier, ADP
Is Speed an Advantage? It Depends on the Context 18
Scott Charney, Microsoft
2 Connectivity 23
Managing the Intensifying Connectivity of the IoT Era 25
Brian Talbert, Alaska Airlines
Cyberspace: Making Some Sense of It All 30
Chris Inglis, Former NSA Deputy Director
Section 2: Elementary Shortfalls 43
3 Authentication 47
Authentication, Data Integrity, Nonrepudiation, Availability, and
Confidentiality: The Five Pillars of Security 50
Mike McConnell, Former Director of National Intelligence
Authentication and Models of Trust 58
Shannon Lietz, Intuit
4 Patching 65
Patching: A Growing Challenge and a Needed Discipline 68
Chris Richter, Former VP of Global Security Services, CenturyLink
Conquer or Be Conquered 74
Renee Tarun, Fortinet
5 Training 79
Fill the Skills Gap with an Environment of Continual Training 82
Chris McDaniels, CT Cubed, Inc.
Employee Training is Key for Cybersecurity 89
Mo Katibeh, AT&T
Training is a Mindset 97
Dave Rankin, Verisign
Section 3: Fundamental Strategies 103
6 Cryptography 105
Cryptography: The Backbone of Cybersecurity 108
Taher Elgamal, Salesforce
Cryptography: The Good, the Bad, and the Future 117
Dan Boneh, Stanford
7 Access Control 127
Managing Access in Challenging Environments 130
Erik Devine, Riverside Health
A Systematic Approach to Access Control 136
George Do, Equinix
8 Segmentation 143
Successful Segmentation Isn't Separation: It's Collaboration 147
Colin Anderson, Levi Strauss & Co.
Why We Need to Segment Networks 153
Hussein Syed, RWJBarnabas Health
Section 4: Advanced Strategies 161
9 Visibility 164
Visibility: Identifying Pathogens, Risk Factors, and Symptoms of
Cyberattacks 167
Michael Chertoff, Former Secretary, Department of Homeland Security
20/20 Insight: Redefining Visibility to Stop Modern Cybercrime Syndicates
173
Tim Crothers, Target
The Challenge of Visibility 180
Daniel Hooper, PIMCO
10 Inspection 188
In and Out of the Shadows: The Visibility That Inspection Enables is Not
Confined to Technology Alone 192
Ed Amoroso, TAG Cyber
The Fundamental Importance of Inspection 199
Michael Johnson, Capital One
11 Failure Recovery 206
Preparation, Response, and Recovery 209
Thad Allen, Booz Allen Hamilton
Cyber Event Recovery 219
Simon Lambe, Royal Mail
Section 5: Higher-Order Dimensions 223
12 Complexity Management 226
Shift Your Mindset to Manage Complexity 229
Michael Daniel, Cyber Threat Alliance
Seven Steps to Reducing Complexity 238
Jay Gonzales, Samsung
13 Privacy 246
Don't Panic! Security Pros Must Learn to Embrace the New Era of Privacy 249
Kevin Miller, MGM Resorts International
Stricter Privacy Regulations Are Driving the Conversations-and
Innovations-We Need 259
Peter Keenan, Global Financial Services Firm
14 Human Frailty 265
Overcoming Human Frailty: People and the Power of Obligation 268
Kevin Kealy, Ingram Micro
Overcoming Human Frailty by Design 274
Theresa Payton, Fortalice
The Future 282
Why Cybersecurity Needs AI 290
Michael Xie, Fortinet
The Future of Cybersecurity 293
Ken Xie, Fortinet
Index 301