Cyber Mayday and the Day After


Book Description

Successfully lead your company through the worst crises with this first-hand look at emergency leadership Cyber security failures made for splashy headlines in recent years, giving us some of the most spectacular stories of the year. From the Solar Winds hack to the Colonial Pipeline ransomware event, these incidents highlighted the centrality of competent crisis leadership. Cyber Mayday and the Day After offers readers a roadmap to leading organizations through dramatic emergencies by mining the wisdom of C-level executives from around the globe. It’s loaded with interviews with managers and leaders who've been through the crucible and survived to tell the tale. From former FBI agents to Chief Information Security Officers, these leaders led their companies and agencies through the worst of times and share their hands-on wisdom. In this book, you’ll find out: What leaders wish they'd known before an emergency and how they've created a crisis game plan for future situations How executive-level media responses can maintain – or shatter – consumer and public trust in your firm How to use communication, coordination, teamwork, and partnerships with vendors and law enforcement to implement your crisis response Cyber Mayday and the Day After is a must-read experience that offers managers, executives, and other current or aspiring leaders a first-hand look at how to lead others through rapidly evolving crises.




Cyber Mayday and the Day After


Book Description

Successfully lead your company through the worst crises with this first-hand look at emergency leadership Cyber security failures made for splashy headlines in recent years, giving us some of the most spectacular stories of the year. From the Solar Winds hack to the Colonial Pipeline ransomware event, these incidents highlighted the centrality of competent crisis leadership. Cyber Mayday and the Day After offers readers a roadmap to leading organizations through dramatic emergencies by mining the wisdom of C-level executives from around the globe. It’s loaded with interviews with managers and leaders who've been through the crucible and survived to tell the tale. From former FBI agents to Chief Information Security Officers, these leaders led their companies and agencies through the worst of times and share their hands-on wisdom. In this book, you’ll find out: What leaders wish they'd known before an emergency and how they've created a crisis game plan for future situations How executive-level media responses can maintain – or shatter – consumer and public trust in your firm How to use communication, coordination, teamwork, and partnerships with vendors and law enforcement to implement your crisis response Cyber Mayday and the Day After is a must-read experience that offers managers, executives, and other current or aspiring leaders a first-hand look at how to lead others through rapidly evolving crises.




Building a Cyber Resilient Business


Book Description

Learn how to build a proactive cybersecurity culture together with the rest of your C-suite to effectively manage cyber risks Key FeaturesEnable business acceleration by preparing your organization against cyber risksDiscover tips and tricks to manage cyber risks in your organization and build a cyber resilient businessUnpack critical questions for the C-suite to ensure the firm is intentionally building cyber resilienceBook Description With cyberattacks on the rise, it has become essential for C-suite executives and board members to step up and collectively recognize cyber risk as a top priority business risk. However, non-cyber executives find it challenging to understand their role in increasing the business's cyber resilience due to its complex nature and the lack of a clear return on investment. This book demystifies the perception that cybersecurity is a technical problem, drawing parallels between the key responsibilities of the C-suite roles to line up with the mission of the Chief Information Security Officer (CISO). The book equips you with all you need to know about cyber risks to run the business effectively. Each chapter provides a holistic overview of the dynamic priorities of the C-suite (from the CFO to the CIO, COO, CRO, and so on), and unpacks how cybersecurity must be embedded in every business function. The book also contains self-assessment questions, which are a helpful tool in evaluating any major cybersecurity initiatives and/or investment required. With this book, you'll have a deeper appreciation of the various ways all executives can contribute to the organization's cyber program, in close collaboration with the CISO and the security team, and achieve a cyber-resilient, profitable, and sustainable business. What you will learnUnderstand why cybersecurity should matter to the C-suiteExplore how different roles contribute to an organization's securityDiscover how priorities of roles affect an executive's contribution to securityUnderstand financial losses and business impact caused by cyber risksCome to grips with the role of the board of directors in cybersecurity programsLeverage the recipes to build a strong cybersecurity cultureDiscover tips on cyber risk quantification and cyber insuranceDefine a common language that bridges the gap between business and cybersecurityWho this book is for This book is for the C-suite and executives who are not necessarily working in cybersecurity. The guidebook will bridge the gaps between the CISO and the rest of the executives, helping CEOs, CFOs, CIOs, COOs, etc., to understand how they can work together with the CISO and their team to achieve organization-wide cyber resilience for business value preservation and growth.




Cybersecurity Vigilance and Security Engineering of Internet of Everything


Book Description

This book first discusses cyber security fundamentals then delves into security threats and vulnerabilities, security vigilance, and security engineering for Internet of Everything (IoE) networks. After an introduction, the first section covers the security threats and vulnerabilities or techniques to expose the networks to security attacks such as repudiation, tampering, spoofing, and elevation of privilege. The second section of the book covers vigilance or prevention techniques like intrusion detection systems, trust evaluation models, crypto, and hashing privacy solutions for IoE networks. This section also covers the security engineering for embedded and cyber-physical systems in IoE networks such as blockchain, artificial intelligence, and machine learning-based solutions to secure the networks. This book provides a clear overview in all relevant areas so readers gain a better understanding of IoE networks in terms of security threats, prevention, and other security mechanisms.




The Future of Dark Tourism


Book Description

This book offers critical scenarios of dark tourism futures and examines how our significant dead will be remembered in future visitor economies. It aims to inspire critical thinking by probing the past, disrupting the present and provoking the future. The volume outlines key features of difficult heritage and future cultural trauma and highlights the role of technology, immersive visitor experiences and the thanatological condition of future dark tourism. The book provides a collection of informed observations of how future societies might recall their memorable dead, and how the noteworthy dead might be (re)created and retained through dark tourism. The book forecasts a dark tourism future that is not only perilous but also full of possibilities. It is a helpful resource for students and researchers in tourism, heritage, futurology, sociology, human geography and cultural studies.




Cyber Risk Leaders


Book Description

Cyber Risk Leaders: Global C-Suite Insights - Leadership and Influence in the Cyber Age’, by Shamane Tan - explores the art of communicating with executives, tips on navigating through corporate challenges, and reveals what the C-Suite looks for in professional partners. For those who are interested in learning from top industry leaders, or an aspiring or current CISO, this book is gold for your career. It’s the go-to book and your CISO kit for the season.




Leadership U


Book Description

Accelerating Through the Crisis Curve Leadership is all about others—inspiring them to believe, then enabling that belief to become reality. That’s the essence of Leadership U: it starts with ‘U’ but it’s not about ‘U.’ Those timeless words are timelier than ever today, as leaders look to accelerate through the crisis curve. As author Gary Burnison observes, “There will likely be more change in the next two years than we have seen in the last twenty.” Now, in Leadership U: Accelerating Through the Crisis Curve, Burnison lays out a framework—his “Six Degrees of Leadership”—to show leaders how to create change. Anticipate – foreseeing what lies ahead, amid ambiguity and uncertainty that are throttled up like never before Navigate – course-correcting in real time, to keep the organization on an even keel Communication – constantly connecting with others; the leader is both the messenger and the message Listen – breaking down the organizational hierarchy to gather insights at all levels—especially what the leader doesn’t want to hear Learn – applying learning agility, to “know what to do when you don’t know what to do” Lead – empowering others in a bottom-up culture that is more nimble, agile, innovative, and entrepreneurial than ever before. Only by embracing these truths can leaders master another ‘U’—the “crisis curve” that will completely disrupt the business landscape. The world has changed—forever. The old days are fine to reminiscence about, but you can’t stay there. Today leadership means becoming comfortable with being uncomfortable. As Burnison says, when a door closes, leaders cannot afford to stand there, staring at it. It’s a “get up or give up” moment. For leaders, the only choice is to find and open another door. Leadership U defines and inspires the pathway through that door.




On the Future


Book Description

A provocative and inspiring look at the future of humanity and science from world-renowned scientist and bestselling author Martin Rees Humanity has reached a critical moment. Our world is unsettled and rapidly changing, and we face existential risks over the next century. Various outcomes—good and bad—are possible. Yet our approach to the future is characterized by short-term thinking, polarizing debates, alarmist rhetoric, and pessimism. In this short, exhilarating book, renowned scientist and bestselling author Martin Rees argues that humanity’s prospects depend on our taking a very different approach to planning for tomorrow. The future of humanity is bound to the future of science and hinges on how successfully we harness technological advances to address our challenges. If we are to use science to solve our problems while avoiding its dystopian risks, we must think rationally, globally, collectively, and optimistically about the long term. Advances in biotechnology, cybertechnology, robotics, and artificial intelligence—if pursued and applied wisely—could empower us to boost the developing and developed world and overcome the threats humanity faces on Earth, from climate change to nuclear war. At the same time, further advances in space science will allow humans to explore the solar system and beyond with robots and AI. But there is no “Plan B” for Earth—no viable alternative within reach if we do not care for our home planet. Rich with fascinating insights into cutting-edge science and technology, this accessible book will captivate anyone who wants to understand the critical issues that will define the future of humanity on Earth and beyond.




Ransomware Protection Playbook


Book Description

Avoid becoming the next ransomware victim by taking practical steps today Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And it's growing longer every day. In Ransomware Protection Playbook, computer security veteran and expert penetration tester Roger A. Grimes delivers an actionable blueprint for organizations seeking a robust defense against one of the most insidious and destructive IT threats currently in the wild. You'll learn about concrete steps you can take now to protect yourself or your organization from ransomware attacks. In addition to walking you through the necessary technical preventative measures, this critical book will show you how to: Quickly detect an attack, limit the damage, and decide whether to pay the ransom Implement a pre-set game plan in the event of a game-changing security breach to help limit the reputational and financial damage Lay down a secure foundation of cybersecurity insurance and legal protection to mitigate the disruption to your life and business A must-read for cyber and information security professionals, privacy leaders, risk managers, and CTOs, Ransomware Protection Playbook is an irreplaceable and timely resource for anyone concerned about the security of their, or their organization's, data.




Cyber Mayday and the Day After


Book Description

Successfully lead your company through the worst crises with this first-hand look at emergency leadership Cyber security failures made for splashy headlines in recent years, giving us some of the most spectacular stories of the year. From the Solar Winds hack to the Colonial Pipeline ransomware event, these incidents highlighted the centrality of competent crisis leadership. Cyber Mayday and the Day After offers readers a roadmap to leading organizations through dramatic emergencies by mining the wisdom of C-level executives from around the globe. It's loaded with interviews with managers and leaders who've been through the crucible and survived to tell the tale. From former FBI agents to Chief Information Security Officers, these leaders led their companies and agencies through the worst of times and share their hands-on wisdom. In this book, you'll find out: What leaders wish they'd known before an emergency and how they've created a crisis game plan for future situations How executive-level media responses can maintain - or shatter - consumer and public trust in your firm How to use communication, coordination, teamwork, and partnerships with vendors and law enforcement to implement your crisis response Cyber Mayday and the Day After is a must-read experience that offers managers, executives, and other current or aspiring leaders a first-hand look at how to lead others through rapidly evolving crises.