Looking to land a new IT job? Move your resume to the top of the list by avoiding these three common pitfalls
Security bootcamp: 8 must-read books for leaders
Hackers increasingly target individuals as weak links. As the number of breaches and their costs continue to spike, it’s time for leaders of all kinds to learn more about security
Book description (via Amazon): “From the 1991 Gulf War to conflicts in Haiti, Serbia, Syria, the former Soviet republics, Iraq, and Iran, where cyber warfare played a significant role, Dark Territory chronicles a little-known past that shines an unsettling light on our future. Fred Kaplan probes the inner corridors of the National Security Agency, the beyond-top-secret cyber units in the Pentagon, the ‘information warfare’ squads of the military services, and the national security debates in the White House to reveal the details of the officers, policymakers, scientists, and spies who devised this new form of warfare and who have been planning — and (more often than people know) fighting — these wars for decades.”
Why you should read it: The New Yorker’s review of this book points out: “The book’s central question is how should we think about war, retaliation, and defense when our technologically advanced reliance on computers is also our greatest vulnerability?” Fred Kaplan aims to answer this complex question by pulling back the curtain on the secretive inner workings of the government’s efforts to manage national cybersecurity.
Book description (via Amazon): “Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us. And just over the horizon is a tidal wave of scientific progress that will leave our heads spinning — from implantable medical devices to drones and 3-D printers, all of which can be hacked, with disastrous consequences. With explosive insights based on a career in law enforcement and counterterrorism, leading authority on global security Marc Goodman takes readers on a vivid journey through the darkest recesses of the Internet. He explores how bad actors are primed to hijack the technologies of tomorrow.”
Why you should read it: Everything that can be hacked will eventually be hacked. And all those hackable things are making their way into every corner of our personal and professional lives. This book provides a comprehensive overview of current threats to our security and the future cybercrime that is just on the horizon. Read this book to stay one step ahead.
Book description (via Amazon): “Women matter in cybersecurity because of the way they view and deal with risk. Typically, women are more risk-averse, compliant with rules, and embracing of organizational controls and technology than men. They’re also extremely intuitive and score highly when it comes to emotional and social intelligence, which enables them to remain calm during times of turbulence – a trait that’s required when major security breaches and incidents occur. As cybercrime, terrorism, and warfare are increasing and the number of women in cybersecurity is declining, now is the time to take action.”
Why you should read it: Jane Frankland examines the cybersecurity industry’s diversity issue in this book. Through interviews, data, and advice, she provides strategies for attracting and retaining female cybersecurity talent to your organization – and insights into what you stand to gain by doing so.
[ What do security pros want most? Read also: How to attract and keep IT security talent. ]
Book description (via HBR): “No data is completely safe. In our connected world, more access and more data come with more risk. The number of cyber attacks companies stop has grown, but the attacks are also increasingly frequent – and ferocious. As the complexity and sophistication of our interconnected systems increases, so too do the skills of our adversaries. Cybersecurity can no longer be relegated to IT. Improving and increasing data security practices and identifying suspicious activity are everyone’s responsibility, from the boardroom to the breakroom.”
Why you should read it: HBR’s “Insights You Need” series is designed to help leaders grasp critical ideas on fast-moving issues. Download an advanced edition now on hbr.org for digestible, actionable insights such as how to launch the right cybersecurity initiatives at your company, how to get everyone on your org chart on the same page, and how to plan for the inevitable cyber attack.
[ How can automation help with security? Get the free Ebook: Managing IT with Automation. ]