The Four Rs of Cybersecurity Resist. Restrict. Recover. Report.: The simplest step-by-step guide for CEOs, Board Directors & other non-geeks
()
About this ebook
This book was written to be a translator, handbook, and dictionary for anyone who isn't an expert in the world of cybersecurity (which is most of us). It contains 65 pages of easy-to-understand, well-organized explanations about cybersecurity with charts and graphs. Most importantly it takes complex, highly technical concepts and boils them down to the stuff that matters - and tells you why it matters.
Scott Goldman's career includes leadership positions in the wireless, mobile, Internet and cybersecurity industries. He has helped governments and multi-billion-dollar corporations around the world make educated choices by explaining the terminology that baffles most people. Like a personal consultant, The Four Rs of Cybersecurity tells you what to ask, what to know and what to ignore.
Related to The Four Rs of Cybersecurity Resist. Restrict. Recover. Report.
Related ebooks
Networking Karma: How Today's Cutting Edge Networking Trends Can Help You Connect and Conquer Rating: 0 out of 5 stars0 ratings7 Rules To Become Exceptional At Cyber Security Rating: 5 out of 5 stars5/57 Rules to Influence Behaviour and Win at Cyber Security Awareness Rating: 5 out of 5 stars5/5The Basics of Web Hacking: Tools and Techniques to Attack the Web Rating: 3 out of 5 stars3/5Digital Common Sense: and how to get IT Rating: 0 out of 5 stars0 ratingsInstant Netcat Starter Rating: 4 out of 5 stars4/5Evolving Digital Leadership: How to Be a Digital Leader in Tomorrow’s Disruptive World Rating: 0 out of 5 stars0 ratingsOnline Danger: How to Protect Yourself and Your Loved Ones from the Evil Side of the Internet Rating: 4 out of 5 stars4/5Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership Rating: 0 out of 5 stars0 ratingsPsychological Safety: The key to happy, high-performing people and teams Rating: 4 out of 5 stars4/5The Power in a Link: Open Doors, Close Deals, and Change the Way You Do Business Using LinkedIn Rating: 5 out of 5 stars5/5The Golden Age of Drive-Thru It: The True Potential of It and How It Sells Itself Short Rating: 0 out of 5 stars0 ratingsReady to Amplify Rating: 0 out of 5 stars0 ratingsThe Coming Cyber War: What Executives, the Board, and You Should Know Rating: 0 out of 5 stars0 ratingsJump-start Your SOC Analyst Career: A Roadmap to Cybersecurity Success Rating: 0 out of 5 stars0 ratingsThe Modern CEO: A CEO's perspective on leading, evolving and driving organizational success through a people-centric philosophy Rating: 0 out of 5 stars0 ratingsCybersecurity Career Guide Rating: 0 out of 5 stars0 ratingsThe Networking Playbook: Transform Your Social Capital into Professional Career Success Rating: 0 out of 5 stars0 ratingsUNHACKABLE : Your Online Security Playbook: Recreating Cyber Security in an Unsecure World Rating: 0 out of 5 stars0 ratingsDigital Self Mastery Rating: 0 out of 5 stars0 ratings21st Century Networking: How to Become a Natural Networker Rating: 0 out of 5 stars0 ratingsSpeaking Their Language: The Non-Techie's Guide to Managing IT & Cybersecurity for Your Organization Rating: 0 out of 5 stars0 ratingsSet Up and Manage Your Virtual Private Server: Making System Administration Accessible to Professionals Rating: 0 out of 5 stars0 ratingsMaking Passwords Secure Rating: 0 out of 5 stars0 ratingsRebooting Work: Transform How You Work in the Age of Entrepreneurship Rating: 4 out of 5 stars4/5The Secure CEO: How to Protect Your Computer Systems, Your Company, and Your Job Rating: 0 out of 5 stars0 ratingsThe Personal Digital Resilience Handbook: An essential guide to safe, secure and robust use of everyday technology Rating: 0 out of 5 stars0 ratingsThe Connect Effect: Building Strong Personal, Professional, and Virtual Networks Rating: 0 out of 5 stars0 ratings
Security For You
CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsPractical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5How I Rob Banks: And Other Such Places Rating: 0 out of 5 stars0 ratingsCodes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Hacking For Dummies Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsRemote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Hands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming Rating: 3 out of 5 stars3/5Ethical Hacking 101 - How to conduct professional pentestings in 21 days or less!: How to hack, #1 Rating: 5 out of 5 stars5/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5Blockchain Basics: A Non-Technical Introduction in 25 Steps Rating: 5 out of 5 stars5/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5
Reviews for The Four Rs of Cybersecurity Resist. Restrict. Recover. Report.
0 ratings0 reviews
Book preview
The Four Rs of Cybersecurity Resist. Restrict. Recover. Report. - Scott Goldman
INTRODUCTION
BACK IN 1986 two brothers had a clever idea to stop customers from stealing their software. They wrote a bit of code to prevent people from illegally copying it and hid it on the floppy disks they used to distribute their software. Unfortunately they couldn't anticipate the unintended negative consequences of that effort. That bit of code ended up spreading everywhere, eventually infecting computers that didn't even have their software, weren't connected to any network and had zero clue about what was happening. Computers around the world started spending their time and processing power replicating and spreading the copy-prevention software instead of performing their intended tasks. As a result they all slowed to a crawl – and the cybersecurity industry was born.
This one small action shocked people into realizing how quickly computer viruses spread. It changed, virtually overnight, how people and enterprises saw the need for antivirus cybersecurity awareness, antivirus software, preventing hackers and backing up data.
Today, 30+ years later, too many of us are still insufficiently aware of the risks, consequences and need to protect against cyberattacks. Cybersecurity discussions can be intimidating and complex – but there’s a desperate need to make the topic simple and understandable. This applies to people at the top of the food chain in enterprises and small businesses alike. Owners, CEOs, board directors and others with responsibilities to employees, customers and shareholders must be cyberaware.
That’s what this book is about.
Let me start by saying that if you can already distinguish a virus from a trojan or a packet sniffer from a firewall, this book is not for you. You’d find more value in taking cooking lessons or learning how to crochet. On the other hand, if you’re not directly involved in cybersecurity or just an individual seeking insight into why the bad guys seem to be constantly outsmarting the good guys, you’ve come to the right place.
The fundamental issue surrounding cybersecurity is pretty simple, actually – it has historically been an afterthought for most company leaders and even the general population. Generally speaking, we all had our roles within the organizations we worked for and seldom ventured beyond them. CEOs led the way, CFOs managed finances, and HR teams dealt with personnel matters. But in today’s business landscape, cyber-security transcends boundaries. It has become a fundamental aspect of every business that every position within an organization must grapple with and take responsibility for. At its core, cybersecurity represents a mindset and attitude that should permeate the culture and fabric of every organization.
Unfortunately, this transformation hasn’t fully materialized yet. It’s hardly surprising when we consider the laser focus and specialization inherent in our respective roles. Consider board directors, for instance. While some perceive directors as sitting atop the corporate hierarchy, they actually occupy a unique position within the companies they serve. While they are tasked with providing oversight, guidance, and counsel to the CEOs who report to them, they (typically) aren’t employees and aren’t expected to possess extensive expertise in the company’s core operations. A board director at General Motors wouldn’t be expected to comprehend the intricate details of building a fuel injection system, just as a director at Nvidia wouldn’t be expected to know where to begin designing a microchip.
However, it has recently become the directors’ job to question the cybersecurity capabilities and require that executives give it sufficient attention. How can one do that without a fundamental understanding of what they’re asking of the company’s