Skip to main content

2016 | Buch

The Second Economy

The Race for Trust, Treasure and Time in the Cybersecurity War

insite
SUCHEN

Über dieses Buch

In today’s hyper-connected, always-on era of pervasive mobility, cloud computing and intelligent connected devices, virtually every step we take, every transaction we initiate, and every interaction we have are supported in some way by this vast global infrastructure. This set of interconnected systems comprises the fundamental building blocks of the second economy – the very foundation of our first economy. And adversaries, whether motivated by profit, principle or province, are singularly focused on winning the race through a relentless portfolio of shifting attack vectors.

The complexity and volume of these attacks are seemingly unstoppable. And, while the significant financial risk for compromised organizations is very real, the larger and more insidious threat rests with the erosion of the hard-earned trust of customers and other stakeholders. A foundational element of the actual economy, trust, once lost, is not easily recaptured. When it is shaken through a breach, seconds matter. To successfully compete against more sophisticated adversaries and protect their organizations, IT security professionals must take a second look at established security notions and challenge their thinking. Being second to none in this fight is essential, as the effectiveness and ROI of security solutions are increasingly measured by the business outcomes they enable.

Offering a practical prescription for both private and public organizations to remediate threats and maintain a competitive pace, The Second Economy is a must read for those who endeavor to lead and thrive in an ever-shifting environment.

Make no mistake about it, we are running a race. This is a race against a faceless, nameless adversary – one that dictates the starting line, the rules of the road, and what trophies are at stake. Established assumptions must be challenged, strategies must be revised, and long-held practices must be upended to run this race and effectively compete in The Second Economy.

What You Will Learn: Understand the value of time and trust in a cyber-warfare world, enabling agile and intelligent organizations to minimize their risk of falling victim to the next attack How to accelerate response time by adopting a holistic approach that eliminates friction across the threat defense lifecycle, from protection to detection to correction How to gain sustainable competitive advantage by seizing first mover advantage in deploying solutions across an open, integrated security framework

Who This Book Is For:

Senior-level IT decision makers concerned with ascribing business value to a robust security strategy. The book also addresses business decision makers who must be educated about the pervasive and growing cyber threatscape (including CXOs, board directors, and functional leaders) as well as general business employees to understand how they may become unwitting participants in a complex cyber war.

Inhaltsverzeichnis

Frontmatter

A Second Bite at the Problem

Frontmatter
Chapter 1. The Second Side of the Story
Abstract
History has a way of repeating itself, even in the unlikeliest of cases. In 1917, a seemingly nondescript proceeding in the state of Oklahoma would find its way into the annals of legal precedent. In Wilcox v. State, the plaintiff appealed his criminal conviction for assault with a dangerous weapon, specifically a claw hammer. A claw hammer was (and still is) an ordinary household tool, one used to insert and remove nails in construction projects.
Steve Grobman, Allison Cerra
Chapter 2. The Second Nature of Markets
Abstract
What has happened to my grandson Paul is terrible and heartbreaking. But I know that if I become involved it will make the situation worse for all concerned. And I must think about my other grandchildren—there are 14 of them. I must think of their safety.
Steve Grobman, Allison Cerra
Chapter 3. Seconding the Cause
Abstract
It was billed as simply “The Fight.” It sold out Madison Square Garden’s nearly 21,000-seat capacity a full month in advance and featured premium tickets at then record-setting prices of $150.ii It left some A-list celebrities, like former vice president of the United States Hubert Humphrey and best-selling recording artist of the 20th century Bing Crosby relegated to the “cheap seats” or out in the cold, respectively.iii It featured two undefeated boxing icons, each guaranteed $2.5 million—setting another record at the time as the largest purse for any entertainer or athlete.iv And, on March 8, 1971, the much anticipated matchup between former heavyweight champion Muhammad Ali and current titleholder Joe Frazier drew a worldwide audience of 300 million viewers, glued to radio and television broadcast networks that offered updates between each of the 15 roundsv—among them security guards at an FBI satellite office in Media, Pennsylvania, distracted by the perfect smokescreen for a nondescript team of eight to execute the perfect crime.
Steve Grobman, Allison Cerra
Chapter 4. No Second Chance
Abstract
“States have an inherent right to self-defense that may be triggered by certain aggressive acts in cyberspace. . . . When warranted, the United States will respond to hostile acts in cyberspace as we would to any other threat to our country.”
Steve Grobman, Allison Cerra
Chapter 5. Second-Guessing the Obvious
Abstract
Trust takes years to build, seconds to break and forever to repair.
Steve Grobman, Allison Cerra

A Second Look at Conventional Wisdom

Frontmatter
Chapter 6. Playing Second Fiddle
Abstract
I’m attracted to computers, and some people can’t understand that. But some people are attracted to horses and I can’t understand that.
Steve Grobman, Allison Cerra
Chapter 7. Take a Second Look
Abstract
What has happened to my grandson Paul is terrible and heartbreaking. But I know that if I become involved it will make the situation worse for all concerned. And I must think about my other grandchildren—there are 14 of them. I must think of their safety.
Steve Grobman, Allison Cerra
Chapter 8. When Seconds Matter
Abstract
Now, here, you see, it takes all the running you can do, to keep in the same place.
Steve Grobman, Allison Cerra
Chapter 9. Second to None
Abstract
If you want to be incrementally better: Be competitive. If you want to be exponentially better: Be cooperative.
Steve Grobman, Allison Cerra
Chapter 10. Cybersecurity’s Second Wind
Abstract
Not everything that can be counted counts, and not everything that counts can be counted.
Steve Grobman, Allison Cerra
Backmatter
Metadaten
Titel
The Second Economy
verfasst von
Steve Grobman
Allison Cerra
Copyright-Jahr
2016
Verlag
Apress
Electronic ISBN
978-1-4842-2229-4
Print ISBN
978-1-4842-2228-7
DOI
https://doi.org/10.1007/978-1-4842-2229-4