Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Cyber Minds
Cyber Minds

Cyber Minds: Insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe

eBook
$15.99 $22.99
Paperback
$32.99
Subscription
Free Trial
Renews at $19.99p/m

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Product feature icon AI Assistant (beta) to help accelerate your learning
Table of content icon View table of contents Preview book icon Preview Book

Cyber Minds

How Risky Behavior Leads to Data Breaches

Many employees have a lot on their plate and work hard to keep up with their rigorous job responsibilities. To meet the demands of their position, they create shortcuts to expeditiously accomplish their tasks and not get mired in the details. Herein lies the problem of risky employee behavior – in many cases, employees are not aware that their shortcuts or truncations of protocol are creating gaping holes in an organization's cyber hygiene. They may not mean to harm the organization, and their behavior is certainly non-malicious, but their risky behaviors have turned them into insider threats all the same.

This chapter is about this behavior and how it can lead to devastating outcomes. In reality, a great deal of this risky behavior can be stopped by creating cognizance around the implications of these actions. In most cases, employees are woefully unaware of the consequences of their actions, and what they don't realize...

Oblivious behaviors

We'll start by discussing the kind of behavior you might find from an oblivious, non-malicious insider threat. Oblivious employees aren't motivated by any desire to cause harm, or even by laziness or resistance to protocol; they simply don't understand that the actions they're taking, or forgetting to take, cause holes in their organization's security.

Unattended computers are a hazard

One classic form of oblivious behavior is leaving computers unattended when outside the organization – I've seen this many times at conferences, even security conferences. People go and check in their laptops along with their coats! They hand the laptop over for a checkout ticket, getting a false sense of security and trust because they've got the checkout ticket in their possession. That makes them feel like the laptop's safe; when really, it's been taken by an individual you don't know, to a place you can&apos...

Negligent behaviors

Oblivious behavior is in some ways easier to deal with – the employee doesn't know that their behavior is threatening to the organization, and if they're educated properly and become part of a security culture, those behaviors will stop. Negligent non-malicious behavior, on the other hand, is when the employee knows that their action causes a security risk. They simply underestimate the risk, and overestimate the convenience of the risky action. These employees need to be convinced not just of what to do, but also of how important it is that they do it, and the possible consequences of not following the protocol.

Leaving the door open – the problem with recycled passwords

Coming up with a new password is often a task one faces without preparing for it – a reminder pops up and, suddenly, you need to invent a password. This leads to negligent employees using the same passwords and usernames that they've already used for websites...

Social media

Many people don't realize that social media is one of the biggest portals for data breaches, phishing attempts, and social engineering. Given that social media has many risks from many different vantage points and plays an outsized role in modern life, let's explore every angle of the risks in detail.

As a rule of thumb, when it comes to using social media within an organization, employees will feel secure for the most part because they believe that they're safe at work. From an employer perspective, organizations may be under the impression that by having a firewall they can stop access to some social media sites during work hours. Those who believe this have obviously not thought about the realities of living in an age of BYOD (Bring Your Own Device).

We all know BYOD has become very popular in recent years because we all do it. Many of us carry around two phones: a work phone and a personal phone. Inevitably, we bring both into the work environment...

Takeaway – practicing cyber mindfulness

As you'll have gleaned through these examples, when your employees engage in risky behavior, they can actively undermine the thorough security protocols that you've worked diligently to put in place. Employees must understand that when they leave their workplaces, their responsibilities to protect their organizations, as well as themselves, do not cease. Everyone within the organization must practice cyber mindfulness as a way of life, no matter where they are at any given moment. Just as traditional mindfulness encourages you to be aware of your surroundings and the consequences of your actions, cyber mindfulness involves being aware of your online connections and the consequences of your digital actions.

Even at a personal level, cyber mindfulness helps you protect every single facet of your life, including your career, reputation, and family. We live in a fast-paced world where we're constantly on the go, have many...

Looking forward – breaking down cybersecurity through interviews

Over the next few chapters, we'll delve deeper by talking to the experts who will outline what you need to know about their respective fields within cybersecurity. After each interview, I'll discuss and distil these concepts to highlight critical takeaways that I personally believe will be game changers for your organization, and your cyber hygiene.

Cybersecurity is not a standalone concept, and these interviews and commentary reflect that reality. I approach the topic using as many real-world examples from my own career journey and from my interviewees' experiences as possible. These real-world anecdotes highlight problems with relatable and teachable moments, providing you with solutions that can help inform your decisions on how to approach these situations.

First, we'll tackle blockchain, a technology that's already changing the landscape of the digital world. But like any human...

Left arrow icon Right arrow icon

Key benefits

  • Explore the latest developments in cybersecurity
  • Hear expert insight from the industry’s top practitioners
  • Dive deep into cyber threats in business, government, and military

Description

Shira Rubinoff's Cyber Minds brings together the top authorities in cybersecurity to discuss the emergent threats that face industries, societies, militaries, and governments today. With new technology threats, rising international tensions, and state-sponsored cyber attacks, cybersecurity is more important than ever. Cyber Minds serves as a strategic briefing on cybersecurity and data safety, collecting expert insights from sector security leaders, including: General Gregory Touhill, former Federal Chief Information Security Officer of the United States Kevin L. Jackson, CEO and Founder, GovCloud Mark Lynd, Digital Business Leader, NETSYNC Joseph Steinberg, Internet Security advisor and thought leader Jim Reavis, Co-Founder and CEO, Cloud Security Alliance Dr. Tom Kellerman, Chief Cybersecurity Officer for Carbon Black Inc and Vice Chair of Strategic Cyber Ventures Board Mary Ann Davidson, Chief Security Officer, Oracle Dr. Sally Eaves, Emergent Technology CTO, Global Strategy Advisor – Blockchain AI FinTech, Social Impact award winner, keynote speaker and author Dr. Guenther Dobrauz, Partner with PwC in Zurich and Leader of PwC Legal Switzerland Barmak Meftah, President, AT&T Cybersecurity Cleve Adams, CEO, Site 1001 (AI and big data based smart building company) Ann Johnson, Corporate Vice President – Cybersecurity Solutions Group, Microsoft Barbara Humpton, CEO, Siemens USA Businesses and states depend on effective cybersecurity. This book will help you to arm and inform yourself on what you need to know to keep your business – or your country – safe.

Who is this book for?

This book is essential reading for business leaders, the C-Suite, board members, IT decision makers within an organization, and anyone with a responsibility for cybersecurity.

What you will learn

  • The threats and opportunities presented by AI
  • How to mitigate social engineering and other human threats
  • Developing cybersecurity strategies for the cloud
  • Major data breaches, their causes, consequences, and key takeaways
  • Blockchain applications for cybersecurity
  • Implications of IoT and how to secure IoT services
  • The role of security in cyberterrorism and state-sponsored cyber attacks

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Jan 13, 2020
Length: 252 pages
Edition : 1st
Language : English
ISBN-13 : 9781789805680
Category :
Concepts :

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Product feature icon AI Assistant (beta) to help accelerate your learning

Product Details

Publication date : Jan 13, 2020
Length: 252 pages
Edition : 1st
Language : English
ISBN-13 : 9781789805680
Category :
Concepts :

Packt Subscriptions

See our plans and pricing
Modal Close icon
$19.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
$199.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick icon Exclusive print discounts
$279.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total $ 149.97
Cybersecurity – Attack and Defense Strategies
$83.99
Cyber Warfare – Truth, Tactics, and Strategies
$32.99
Cyber Minds
$32.99
Total $ 149.97 Stars icon

Table of Contents

12 Chapters
Integrating Humans and Technology – Four Steps to Cyber Hygiene Chevron down icon Chevron up icon
How Risky Behavior Leads to Data Breaches Chevron down icon Chevron up icon
Blockchain – The Unwritten Chapter on Cybersecurity Chevron down icon Chevron up icon
Cybersecurity in the Cloud – What You Need to Know Chevron down icon Chevron up icon
The World's Biggest Data Breaches – Proactive and Reactive Approaches Chevron down icon Chevron up icon
Trends in Cybersecurity Chevron down icon Chevron up icon
Staying Cybersecure in the IoT Revolution Chevron down icon Chevron up icon
Cyberwars – Bringing Military Lessons to Modern Information Security Chevron down icon Chevron up icon
Can Artificial Intelligence (AI) be Trusted to Run Cybersecurity? Chevron down icon Chevron up icon
Conclusion Chevron down icon Chevron up icon
Other Books You May Enjoy Chevron down icon Chevron up icon
Index Chevron down icon Chevron up icon

Customer reviews

Top Reviews
Rating distribution
Full star icon Full star icon Full star icon Full star icon Half star icon 4.2
(10 Ratings)
5 star 80%
4 star 0%
3 star 0%
2 star 0%
1 star 20%
Filter icon Filter
Top Reviews

Filter reviews by




Nathan Chung Feb 06, 2020
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Book was received as a gift for review. I wanted to read this because I was interested to learn about how cybersecurity will be affected by new technologies such as AI, Blockchain, and IoT. What surprised me was how the author focused more on thought leaders and their ideas. This is the first cyber book I have read that uses this format and I enjoyed it. Even for people who do not understand the impact these new technologies will bring; this book will help them to bring awareness to the new cybersecurity risks and opportunities. Highly recommended! Great book!
Amazon Verified review Amazon
Chicago2305 Jan 29, 2020
Full star icon Full star icon Full star icon Full star icon Full star icon 5
A fresh take on a tough subject. Shira takes us through the basics of what we need to know and through interviews with other thought leaders gains additional perspective. It’s a very enjoyable read that also informs!
Amazon Verified review Amazon
C. Schober Feb 23, 2020
Full star icon Full star icon Full star icon Full star icon Full star icon 5
It takes a great cyber mind to probe great cyber minds for answers and Shira Rubinoff is no exception. From CISO's to high level executives keeping tech titans safe, Rubinoff asks them all thought provoking questions that unfold as enjoyable interview-style conversations and go on to educate and inspire readers. Discussing major breaches of our time while delving into intellectually diverse technologies including AI, cloud, IoT and blockchain, Rubinoff never strays far from the guiding principle that the human factor is still the weakest link in the cybersecurity chain. Cyber Minds offers a unique perspective to both novice and expert practitioners of cybersecurity and will always occupy a special spot in my library for years to come.
Amazon Verified review Amazon
Wes Knight Jan 21, 2020
Full star icon Full star icon Full star icon Full star icon Full star icon 5
As a Chief Information Security Officer, I know that one of the very difficult parts of this job is explaining cyber security and information security in a way that can be understood by everyone. Shira does a great job with this. Her interview and writing style keep the flow on target and address some very important aspects of cyber security. It's not just writing and interviewing. The Discussion sections that offer a recap and highlight the most important parts of the interviews are great. This give solid take-aways from the book.I found the interview with General Touhill very interesting. Applying some basic military thinking and tactics to cyber-warfare should be fundamental to any cyber defense. This may not be a kinetic war, but it is war. Being situational aware when using social media, using MFA and VPNs, and using a Zero Trust model should be everyone's starting point.Shira has written a great book for everyone to read and understand.
Amazon Verified review Amazon
RDiver Mar 04, 2020
Full star icon Full star icon Full star icon Full star icon Full star icon 5
There is a need for organizations to change from a compliance culture and adopt a real security culture. Stop doing security because you are told to do it, and start doing security like the future of your entire business relies on it (because it does!)If you are reviewing you enterprise level securities strategy, and looking at Zero Trust or Insider Threat models, this book will assist you in gaining a wider range of ideas and approaches.By reading this book you will dig into the psychology of people and gain new ways to tackle your risks and threats. The method of using an interview approach to gaining insights from experts in their field, changes the dynamic of reading a book written solely by the author alone, to providing an engaging journey of discovery; as of you had hired these consultants yourself.I hope you enjoy the read as much as I did.
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

How do I buy and download an eBook? Chevron down icon Chevron up icon

Where there is an eBook version of a title available, you can buy it from the book details for that title. Add either the standalone eBook or the eBook and print book bundle to your shopping cart. Your eBook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalised PDF download file. This link will remain active for 30 days. You can download backup copies of the file by logging in to your account at any time.

If you already have Adobe reader installed, then clicking on the link will download and open the PDF file directly. If you don't, then save the PDF file on your machine and download the Reader to view it.

Please Note: Packt eBooks are non-returnable and non-refundable.

Packt eBook and Licensing When you buy an eBook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it we have tried to balance the need for the ebook to be usable for you the reader with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:

  • You may make copies of your eBook for your own use onto any machine
  • You may not pass copies of the eBook on to anyone else
How can I make a purchase on your website? Chevron down icon Chevron up icon

If you want to purchase a video course, eBook or Bundle (Print+eBook) please follow below steps:

  1. Register on our website using your email address and the password.
  2. Search for the title by name or ISBN using the search option.
  3. Select the title you want to purchase.
  4. Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title. 
  5. Proceed with the checkout process (payment to be made using Credit Card, Debit Cart, or PayPal)
Where can I access support around an eBook? Chevron down icon Chevron up icon
  • If you experience a problem with using or installing Adobe Reader, the contact Adobe directly.
  • To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
  • To view your account details or to download a new copy of the book go to www.packtpub.com/account
  • To contact us directly if a problem is not resolved, use www.packtpub.com/contact-us
What eBook formats do Packt support? Chevron down icon Chevron up icon

Our eBooks are currently available in a variety of formats such as PDF and ePubs. In the future, this may well change with trends and development in technology, but please note that our PDFs are not Adobe eBook Reader format, which has greater restrictions on security.

You will need to use Adobe Reader v9 or later in order to read Packt's PDF eBooks.

What are the benefits of eBooks? Chevron down icon Chevron up icon
  • You can get the information you need immediately
  • You can easily take them with you on a laptop
  • You can download them an unlimited number of times
  • You can print them out
  • They are copy-paste enabled
  • They are searchable
  • There is no password protection
  • They are lower price than print
  • They save resources and space
What is an eBook? Chevron down icon Chevron up icon

Packt eBooks are a complete electronic version of the print edition, available in PDF and ePub formats. Every piece of content down to the page numbering is the same. Because we save the costs of printing and shipping the book to you, we are able to offer eBooks at a lower cost than print editions.

When you have purchased an eBook, simply login to your account and click on the link in Your Download Area. We recommend you saving the file to your hard drive before opening it.

For optimal viewing of our eBooks, we recommend you download and install the free Adobe Reader version 9.