1st Edition

Losing the Cybersecurity War And What We Can Do to Stop It

By Steve King, Kiren Chaudry Copyright 2023
    172 Pages
    by CRC Press

    172 Pages
    by CRC Press

    This book explains the five pillars or battlefields of cybersecurity and how a Zero Trust approach can change the advantage on each battlefield. We have taken a deep dive into each of five battlefields where we have a decided disadvantage due to constitutional structure and moral behavioral guidelines, where we provide examples of how we got here, what we can do about it, why we got here, and how we can avoid these traps in the future. This is a unique viewpoint that has never been explored – the five battlefields include Economics, Technology, Information, Education, and Leadership – and how each has contributed to our current disadvantage on the global stage. We go on to discuss how Zero Trust can change the game to create an advantage for us going forward. The credibility of Zero Trust stems directly from the father of Zero Trust, John Kindervag, who says, “And now, Steve has written a new book on Zero Trust called Losing the Cybersecurity War: And What We Can Do to Stop It. It is undeniably the best Zero Trust book yet written. While other writers have focused on implementing Zero Trust from their perspectives, Steve focuses on why Zero Trust is so important on the modern cybersecurity battlefield. His concept of the five cyber battlefields is a great insight that will help us win the cyberwar. By weaving Zero Trust principles throughout these five concepts, Steve demonstrates how the ideas and efforts involved in building Zero Trust environments will lead to a profound shift in terrain advantage. No longer will attackers own the high ground. As defenders and protectors, we can leverage modern technology in a Zero Trust way to keep our data and assets safe from infiltration and exploitation.”

    1. What is Zero Trust?.

    2. The Five Battlefields of Cybersecurity.

    3. The Impact of the Last 20 Years.

    4. The Connected World.

    5. Cybersecurity Problems are Hard Problems.

    6. Advertising Our Vulnerabilities.

    7. Why We Got Here.

    8. The Institutionalization.

    9. The End and The Beginning.

    Biography

    Dr Steve King

    Managing Director, CyberTheory and Founder/Executive Director, CyberEd.io - Cybersecurity Expert certified CISM and CISSP - 20 years’ experience in Cybersecurity markets as CISO, CEO and CMO - Cybersecurity Technology Product and Services Sector founder and innovator - Digital Branding & Ad Agency founder - clients included Starbucks, Matson, Abercrombie & Fitch, Harley Davidson, Lucky Brands, United Airlines and Nike - 3x Cybersecurity Start-up Founder and Exec - Raised $40 million in VC - Multiple patents issued encompassing Remote Access MFA Authentication Method Using Adaptive Machine Learning, an Actionable Cyber Threat Intelligence Network Platform, an Architecture for an IoT Cyber-Risk Platform, a Contextual Semantic Search Architecture , Web-enabled Multimedia Audio Transfers, and Database Smart Query Processing - Former HealthCare and Computer Manufacturing CIO.

    Kiren Chaudry

    Kiren Chaudry is the product manager for CyberEd.io, the leading platform for cybersecurity education. Kiren’s role is to manage the conversations and content across teams from marketing to course creation to platform development and drive the vision for the relaunch of CyberEd.io. In addition to her role, she loves grammar, language, obsessing over detail and wearing the hat of part-time content editor. She earned her degree in Linguistics from Georgetown University and speaks English, Spanish, Russian and dabbles in Arabic.