Security bootcamp: 8 must-read books for leaders

Security bootcamp: 8 must-read books for leaders

Hackers increasingly target individuals as weak links. As the number of breaches and their costs continue to spike, it’s time for leaders of all kinds to learn more about security

up
198 readers like this, including you

Dark Territory: The Secret History of Cyber War

By Fred Kaplan

Book description (via Amazon): “From the 1991 Gulf War to conflicts in Haiti, Serbia, Syria, the former Soviet republics, Iraq, and Iran, where cyber warfare played a significant role, Dark Territory chronicles a little-known past that shines an unsettling light on our future. Fred Kaplan probes the inner corridors of the National Security Agency, the beyond-top-secret cyber units in the Pentagon, the ‘information warfare’ squads of the military services, and the national security debates in the White House to reveal the details of the officers, policymakers, scientists, and spies who devised this new form of warfare and who have been planning — and (more often than people know) fighting — these wars for decades.”

Why you should read it: The New Yorker’s review of this book points out: “The book’s central question is how should we think about war, retaliation, and defense when our technologically advanced reliance on computers is also our greatest vulnerability?” Fred Kaplan aims to answer this complex question by pulling back the curtain on the secretive inner workings of the government’s efforts to manage national cybersecurity.

Future Crimes: Inside the Digital Underground and the Battle for Our Connected World

By Marc Goodman

Book description (via Amazon): “Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us. And just over the horizon is a tidal wave of scientific progress that will leave our heads spinning — from implantable medical devices to drones and 3-D printers, all of which can be hacked, with disastrous consequences. With explosive insights based on a career in law enforcement and counterterrorism, leading authority on global security Marc Goodman takes readers on a vivid journey through the darkest recesses of the Internet. He explores how bad actors are primed to hijack the technologies of tomorrow.”

Why you should read it: Everything that can be hacked will eventually be hacked. And all those hackable things are making their way into every corner of our personal and professional lives. This book provides a comprehensive overview of current threats to our security and the future cybercrime that is just on the horizon. Read this book to stay one step ahead.

InSecurity: Why a Failure to Attract and Retain Women in Cybersecurity is Making Us All Less Safe

By Jane Frankland

Book description (via Amazon): “Women matter in cybersecurity because of the way they view and deal with risk. Typically, women are more risk-averse, compliant with rules, and embracing of organizational controls and technology than men. They’re also extremely intuitive and score highly when it comes to emotional and social intelligence, which enables them to remain calm during times of turbulence – a trait that’s required when major security breaches and incidents occur. As cybercrime, terrorism, and warfare are increasing and the number of women in cybersecurity is declining, now is the time to take action.”

Why you should read it: Jane Frankland examines the cybersecurity industry’s diversity issue in this book. Through interviews, data, and advice, she provides strategies for attracting and retaining female cybersecurity talent to your organization – and insights into what you stand to gain by doing so.

[ What do security pros want most? Read also: How to attract and keep IT security talent. ]

Cybersecurity: The Insights You Need from Harvard Business Review

By Harvard Business Review, Alex Blau, Andrew Burt, and Boris Groysberg

Book description (via HBR): “No data is completely safe. In our connected world, more access and more data come with more risk. The number of cyber attacks companies stop has grown, but the attacks are also increasingly frequent – and ferocious. As the complexity and sophistication of our interconnected systems increases, so too do the skills of our adversaries. Cybersecurity can no longer be relegated to IT. Improving and increasing data security practices and identifying suspicious activity are everyone’s responsibility, from the boardroom to the breakroom.”

Why you should read it: HBR’s “Insights You Need” series is designed to help leaders grasp critical ideas on fast-moving issues. Download an advanced edition now on hbr.org for digestible, actionable insights such as how to launch the right cybersecurity initiatives at your company, how to get everyone on your org chart on the same page, and how to plan for the inevitable cyber attack.

[ How can automation help with security? Get the free Ebook: Managing IT with Automation. ] 

Pages

I would add The Art of

I would add The Art of Invisibility - Mitnick and Transformational Security Awareness by Carpenter

Pages

7 New CIO Rules of Road

CIOs: We welcome you to join the conversation

Related Topics

Submitted By Kassie Rangel
September 25, 2020

Looking to land a new IT job? Move your resume to the top of the list by avoiding these three common pitfalls

Submitted By Kevin Casey
September 24, 2020

Many organizations are moving security as close to the start of the software development lifecycle or CI/CD pipeline as possible. Containerization and orchestration can help with security and compliance as you make that shift.

Submitted By Stephanie Overby
September 24, 2020

Are you considering whether to make a career move – or well on your way to exploring new job options? These TED Talks offer career shifting advice from a diverse group of experts.

x

Email Capture

Keep up with the latest thoughts, strategies, and insights from CIOs & IT leaders.