The Def initive Cybersecurity Guide

for Directors and Officers

Second Edition

A collection of 50+ leaders and visionaries centered on doing business in the Digital Age – fostering a mu­tual understanding between technical and non-technical executives when it comes to existential issues surrounding cybersecurity.

About the Book

Part 1: The Future of Threat and Risks

Seizing the opportunities, understanding the challenges

Part 2: Lessons From Today’s World

Cybersecurity awareness, understanding and leadership

Part 3 – Make Sure You’re Covered Today

“Navigating the Digital Age, serves as a guide post on the path to best practice; with practical expert advice on issues like complaince, business enablement, breach avoidance and response.”

Global Cybersecurity Education Fund

Navigating the Digital Age, Second Edition, is published by Palo Alto Networks. As a company, alleviating the problem of cybercrime is at the heart of everything we do. Our goal is to offer cybersecurity education and training to students of all backgrounds around the globe through the Global Cybersecurity Education Fund. Which is why every action we take, and your readership of this book, gets us one step closer to our mission—protecting our way of life in the Digital Age.

All proceeds for sale on Amazon.com will go toward this fund.

Contributors and Chapters

Part 1

The Future of Threat and Risks

chapters 1-12

chapter 01

Prologue

Former President, New York Stock Exchange

chapter 02

To Protect Our Way of Life in the Digital Age, We Must Reach for a Cybersecurity Moonshot

Vice Chairman, Palo Alto Networks

chapter 03

Why Our Digital DNA Must Evolve—Quickly

Founder, ExO Foundation; Board Member, XPRIZE

chapter 04

The Exhilarating, Exciting, and Sobering World of the Internet of Things: Imagine the Opportunities, and Realize the Risks

Chief Executive Officer, IOActive

chapter 05

How Data Grids Will Power the Economy and Influence Our Future

Chief Executive Officer, Data Security Council of India

chapter 06

The Future of Cloud

Corporate Vice President, Cybersecurity Solutions, Microsoft

chapter 07

Understanding the Exciting, Exponential, and Terrifying Future of Cybersecurity

Author and Global Security Advisor

chapter 08

Dealing With the Evolving Adversary Mindset

Senior Vice President, Cyber Solutions Group, Aon

chapter 09

The Evolving Role of the CISO: From Risk Manager to Business Enabler

Chief Security Officer, SAP

chapter 10

Cybersecurity and the Board: Where Do We Go From Here?

Schlumberger Fellow and CISO Emeritus, Schlumberger

chapter 11

Cybersecurity and the Future of Work

Chair, Future of Work at Singularity University; Co-founder, eParachute.com; Partner, Charrette; Speaker and Writer

chapter 12

The Ethics of Technology and the Future of Humanity

Author; Executive “Future Trainer;” Strategist; Chief Executive Officer, The Futures Agency

Part 2

Lessons From Today’s World

chapters 13-21

chapter 13

If You’re Not Collaborating With Colleagues and Competitors on Cyber Threat Intelligence, Beware: The Bad Guys Are Way Ahead of You

Cybersecurity Consultant; Former Director of the U.S. National Security Agency / Central Security Service Threat Operations Center

chapter 14

Compliance Is Not a Cybersecurity Strategy

Vice President for Cybersecurity Strategy and Global Policy, Palo Alto Networks

chapter 14

Compliance Is Not a Cybersecurity Strategy

Vice President, Internal Audit, Palo Alto Networks

chapter 15

Security Transformation As a Business Imperative

Senior Vice President and Chief Security Officer, Dell

chapter 16

The Importance of Cybersecurity Preparation and Leadership

Vice President and Chief Security Strategist, Exabeam

chapter 17

Data Manipulation, Law Enforcement, and Our Future: Seeking to Build Trust in Our Digitally Connected Systems

Head of Strategy, Europol’s European Cybercrime Centre (EC3)

chapter 18

Why Secure Availability—Not Compliance—Should Be Every Business Leader’s Goal

Executive Vice President and Chief Security Officer, Verisign

chapter 19

Enabling the Digital Revolution in Europe: Building Effective Cybersecurity Policy Through Trust and Cooperation

Member, European Parliament

chapter 20

Beyond Compliance: The Human Element of Cyber Resilience

Partner and Global Co-Lead for Cybersecurity, Brunswick Group

chapter 21

Why Corporate Governance Matters So Much in Cybersecurity

GCFE — Managing Director, Asia-Pacific Leader, Cyber Risk, Kroll

Part 3

The Cyber Threat in the Digital Age

chapters 22-46

chapter 22

Welcome to the Frontlines of Business and Cybersecurity

Chief Information Security Officer, Tecnológico de Monterrey

chapter 23

In Today’s World, Every Company Is a Cybersecurity Company

President, Palo Alto Networks

chapter 24

How You Should Expand Your Cybersecurity Talent Pool: A Lesson of Supply and Demand

Founder and Co-President, Stroz Friedberg, an Aon company

chapter 25

How to Articulate the Business Value of Cybersecurity

Cybersecurity and Privacy Attorney

chapter 26

Language, Please: How You Talk to Boards and Executives Can Make or Break Your Cybersecurity

chapter 27

Using the Right Evidence to Make the Right Cybersecurity Decisions

Founder and Chief Executive Officer, MKACyber

chapter 28

Building Empathy and Trust Among CISOs and Business Leaders

Vice President and Chief Security Officer, Adobe

chapter 29

To Get Ahead of Cybersecurity Threats, Focus on Preparedness and Sustainability

Chief Operating Officer, Cyber Threat Alliance

chapter 29

To Get Ahead of Cybersecurity Threats, Focus on Preparedness and Sustainability

Attorney; Founder, Silicon Harbor Consultants; Cybersecurity Policy Director, Public Knowledge

chapter 30

Learning and Leveraging the Wisdom of “So What?”

Chief Security Officer and Senior Vice President for Enterprise Security, United States Automobile Association

chapter 31

Junk the Jargon: In Today’s World, Money Talks

Banking Industry Executive Vice President and Chief Security Officer

chapter 32

Zero Trust: The Strategic Approach to Stop Data Breaches

Field Chief Technology Officer, Palo Alto Networks

chapter 33

Making Boardroom Changes Today to Ensure a Cyber-Secure Tomorrow

Head of North America Technology Practice, Egon Zehnder

chapter 33

Making Boardroom Changes Today to Ensure a Cyber-Secure Tomorrow

Global Lead, Technology and Communications Practice, Egon Zehnder

chapter 33

Making Boardroom Changes Today to Ensure a Cyber-Secure Tomorrow

Advisor, Technology and Communications & Industrial Practices, Egon Zehnder

chapter 34

Creating a Culture of Cybersecurity

MSc

chapter 35

Recognizing, Developing, and Deploying Good Cybersecurity Habits

Chief Security Officer, Southern Methodist University

chapter 36

Social Engineering Attacks: We’re All Targets

Head of Infrastructure Services & CTO, North Europe, AXA IT

chapter 37

Hunting for the Cyber Leader With the Best Board-Level Credentials

Partner, Heidrick & Struggles, USA

chapter 37

Hunting for the Cyber Leader With the Best Board-Level Credentials

Partner, Heidrick & Struggles, United Kingdom

chapter 37

Hunting for the Cyber Leader With the Best Board-Level Credentials

Principal, Heidrick & Struggles, Australia

chapter 38

How to Manage a Data Breach

Partner, Hunton Andrews Kurth LLP

chapter 39

Incident Response: How to Deal With a Cyberattack

Chief Technology Officer, Deutsche Cyber-Sicherheitsorganisation GmbH (DCSO)

chapter 40

Don’t Wait for a Breach to Build Your Communications Strategy

Managing Director, Accenture Security, Accenture

chapter 40

Don’t Wait for a Breach to Build Your Communications Strategy

Managing Director, Accenture Security, Accenture

chapter 41

Making Cyber Insurance a Strategic Tool in Reducing Risk and Improving Resilience

Managing Director and U.S. Cyber Product Leader, Marsh

chapter 42

How You Should Use Cybersecurity Technology to Improve Business Outcomes

Senior Vice President and Chief Information Officer, Palo Alto Networks

chapter 43

Harnessing the Power of Blockchain

Member, European Parliament

chapter 44

When It Comes to Shadow IT, What You Don’t Know— and Don’t Prepare for—Can Hurt You

Global Head of Derivative Trade Processing IT, BNP Paribas CIB

chapter 45

Unlocking Productivity With Security

MBE — Chief Security Advisor, Microsoft

chapter 46

How We Can Change Our Approach to Cybersecurity Today

Founder and Chief Technology Officer, Palo Alto Networks

Get the Book

Order Printed Copy – coming soon

Latest News

Sponsors