The Def initive Cybersecurity Guide

for Directors and Officers

Third Edition

A collection of 50 global thought leaders and visionaries centered on doing business in the Digital Age – from addressing disruptions caused by COVID-19, to driving digital transformation through innovation, to fostering a mu­tual understanding between technical and non-technical executives when it comes to existential issues surrounding cybersecurity.

About the Book

Part 1

The Future of Threat and Risks

Seizing the opportunities, confronting the challenges

Part 2

Lessons from Around the World

Cybersecurity awareness, understanding and leadership

Part 3

Make Sure You’re Covered Today

Best practices on people, process and technology

Contributors and Chapters

Part 1

The Future of Threat and Risks

chapters 1-11

 

Preface

Chief Executive Officer and Chairman, Palo Alto Networks

chapter 01

Ensuring a Safe, Secure, and People-Centered Internet

Vice President and Chief Internet Evangelist, Google

chapter 02

Forget About the New Normal. We’re in the New Now.

Retired Chief Information Officer, U.S. Army, Department of Defense

chapter 03

Why Our Digital DNA Must Evolve—Quickly

Founder, ExO Foundation; Board Member, XPRIZE

chapter 04

The Exhilarating, Exciting, and Sobering World of the Internet of Things: Imagine the Opportunities, and Realize the Risks

Chief Executive Officer, IOActive

chapter 05

How Data Grids Will Power the Economy and Influence Our Future

Chief Executive Officer, Data Security Council of India

chapter 06

The Future of Cloud

Corporate Vice President, Cybersecurity Solutions, Microsoft

chapter 07

Understanding the Exciting, Exponential, and Terrifying Future of Cybersecurity

Author and Global Security Advisor

chapter 08

Dealing With the Evolving Adversary Mindset

Senior Vice President, Cyber Solutions Group, Aon

chapter 09

The Evolving Role of the CISO: From Risk Manager to Business Enabler

Chief Security Officer, Unity Technologies

chapter 10

The Great Reset: The Future of Work and Cybersecurity

Chair for the Future of Work, Singularity University

chapter 11

The Ethics of Technology and the Future of Humanity

Author; Executive “Future Trainer;” Strategist; Chief Executive Officer, The Futures Agency

Part 2

Lessons From Around the World

chapters 13-24

chapter 12

If You’re Not Collaborating With Colleagues and Competitors on Cyber Threat Intelligence, Beware: The Bad Guys Are Way Ahead of You

Cybersecurity Consultant; Former Director of the U.S. National Security Agency

chapter 13

Partnering to Secure a New Form of Critical Infrastructure

Vice President for Cybersecurity Strategy and Global Policy, Palo Alto Networks

chapter 13

Partnering to Secure a New Form of Critical Infrastructure

Director of Cybersecurity Policy and Partnerships, Palo Alto Networks

chapter 14

The Value of Being Prepared For Anything

Schlumberger Fellow and CISO Emeritus, Schlumberger

chapter 15

Reacting to Cyber Attacks Doesn’t Work: Why You Need a Proactive Approach

Vice President and Board Director, Yunda Group

chapter 16

The Path to a Successful Cloud Transformation

Chief Information Security Officer, Takeda Pharmaceuticals International

chapter 17

How to Build and Deploy an Autonomous SOC

Head of Security Operations, Iress

chapter 18

Security Transformation As a Business Imperative

Senior Vice President and Chief Security Officer, Dell

chapter 19

An Antidote to Stress in Cybersecurity

Founder, Instituto de Inteligencia Emocional

chapter 20

The Importance of Cybersecurity Preparation and Leadership

Vice President and Chief Security Strategist, Exabeam

chapter 21

Data Manipulation, Law Enforcement, and Our Future: Seeking to Build Trust in Our Digitally Connected Systems

Head of Strategy, Europol’s European Cybercrime Centre

chapter 22

Why Secure Availability—Not Compliance—Should Be Every Business Leader’s Goal

Executive Vice President and Chief Security Officer, Verisign

chapter 23

Why Corporate Governance Matters So Much in Cybersecurity

Managing Director, Asia-Pacific Leader, Cyber Risk, Kroll

chapter 24

Compliance Is Not a Cybersecurity Strategy

Vice President, Internal Audit, Palo Alto Networks

Part 3

Make Sure You’re Covered Today

chapters 25-44

chapter 25

Welcome to the Frontlines of Business and Cybersecurity

Chief Information Security Officer, Tecnológico de Monterrey

chapter 26

Preparing for the Coming Technology Tsunami

Head of Centre for Cybersecurity, World Economic Forum

chapter 26

Preparing for the Coming Technology Tsunami

Vice President and Chief Security Officer, EMEA, Palo Alto Networks

chapter 27

How to Articulate the Business Value of Cybersecurity

Cybersecurity and Privacy Attorney

chapter 28

Language, Please: How You Talk to Boards and Executives Can Make or Break Your Cybersecurity

Principle, Global, and U.S. Chief Information and Technology Officer PricewaterhouseCoopers

chapter 29

To Get Ahead of Cybersecurity Threats, Focus on Preparedness and Sustainability

Former Acting Senior Director for Cybersecurity Policy, White House, National Security Council Staff

chapter 29

To Get Ahead of Cybersecurity Threats, Focus on Preparedness and Sustainability

Executive Director, Americas, Global Cyber Alliance

chapter 30

Learning and Leveraging the Wisdom of “So What?”

Chief Security Officer, USAA

chapter 31

How to Optimize Cybersecurity Using Measurement

Chief Executive Officer, Soluble.ai

chapter 32

Making Cybersecurity the Smart Investment in an Era of Economic Uncertainty

President and Chief Executive Officer, Security Division, NTT

chapter 33

Zero Trust: The Strategic Approach to Stop Data Breaches

Field Chief Technology Officer, Palo Alto Networks

chapter 34

Making Boardroom Changes Today to Ensure a Cyber-Secure Tomorrow

Head of North America Technology Practice, Egon Zehnder

chapter 34

Making Boardroom Changes Today to Ensure a Cyber-Secure Tomorrow

Advisor, Technology and Communications & Industrial Practices, Egon Zehnder

chapter 35

Recognizing, Developing, and Deploying Good Cybersecurity Habits

Chief Security Officer, Southern Methodist University

chapter 36

Social Engineering Attacks: We’re All Targets

Chief Information Technology Officer, Allianz Malaysia

chapter 37

How to Manage a Data Breach

Partner and Chair of the Global Privacy and Cybersecurity Practice, Hunton Andrews Kurth LLP

chapter 38

Incident Response: How to Deal With a Cyberattack

Chief Technology Officer, Deutsche Cyber-Sicherheitsorganisation GmbH

chapter 39

Don’t Wait for a Breach to Build Your Communications Strategy

Managing Director, Accenture Security, Accenture

chapter 39

Don’t Wait for a Breach to Build Your Communications Strategy

Managing Director, Accenture Security, Accenture

chapter 40

Making Cyber Insurance a Strategic Tool in Reducing Risk and Improving Resilience

Managing Director and U.S. Cyber Product Leader, Marsh

chapter 41

How You Should Use Cybersecurity Technology to Improve Business Outcomes

Senior Vice President and Chief Information Officer, Palo Alto Networks

chapter 42

When It Comes to Shadow IT, What You Don’t Know— and Don’t Prepare for—Can Hurt You

Global Head of Derivative Trade Processing IT, BNP Paribas CIB

chapter 43

Unlocking Productivity With Security

MBE — Chief Security Advisor, Microsoft

chapter 44

How We Can Change Our Approach to Cybersecurity Today

Founder and Chief Technology Officer, Palo Alto Networks

Get the Book

Navigating the Digital Age Book

Latest Articles