www.securityroundtable.org Open in urlscan Pro
104.90.160.217  Public Scan

Submitted URL: http://navigatingthedigitalage.com/
Effective URL: https://www.securityroundtable.org/navigating-the-digital-age-3rd-edition/
Submission: On May 17 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

POST https://start.paloaltonetworks.com/index.php/leadCapture/save2

<form action="https://start.paloaltonetworks.com/index.php/leadCapture/save2" method="POST" class="form-book col-sm-12">
  <input type="hidden" name="type" value="pdf">
  <input type="hidden" name="ip" value="104.143.83.241, 2.17.100.189">
  <input type="hidden" name="date" value="2022/05/16">
  <input type="hidden" name="formid" value="1086">
  <input type="hidden" name="formVid" value="1086">
  <input type="hidden" name="munchkinId" value="531-OCS-018">
  <input type="hidden" name="lpId" value="45206">
  <input id="field40" type="hidden" name="fwdURL" value="https://securityroundtable.org/ndte/NTDA-Edition-3.pdf">
  <input id="field40" type="hidden" name="followUpUrl" value="">
  <input type="text" name="FirstName" placeholder="First Name" required="">
  <input type="text" name="LastName" placeholder="Last Name" required="">
  <input type="email" name="Email" placeholder="Business Email" required="">
  <input type="text" name="Title" placeholder="Job Title" required="">
  <input type="text" name="Company" placeholder="Company" required="">
  <input type="text" name="Phone" placeholder="Phone" required="">
  <!-- <input type="text" name="Country" placeholder="Country" required> -->
  <select name="Country" id="country" required="">
    <option value="United States">United States</option>
    <option value="Afghanistan">Afghanistan</option>
    <option value="Aland Islands">Aland Islands</option>
    <option value="Albania">Albania</option>
    <option value="Algeria">Algeria</option>
    <option value="American Samoa">American Samoa</option>
    <option value="Andorra">Andorra</option>
    <option value="Angola">Angola</option>
    <option value="Anguilla">Anguilla</option>
    <option value="Antigua And Barbuda">Antigua And Barbuda</option>
    <option value="Argentina">Argentina</option>
    <option value="Armenia">Armenia</option>
    <option value="Aruba">Aruba</option>
    <option value="Australia">Australia</option>
    <option value="Austria">Austria</option>
    <option value="Azerbaijan">Azerbaijan</option>
    <option value="Bahamas">Bahamas</option>
    <option value="Bahrain">Bahrain</option>
    <option value="Bangladesh">Bangladesh</option>
    <option value="Barbados">Barbados</option>
    <option value="Belarus">Belarus</option>
    <option value="Belgium">Belgium</option>
    <option value="Belize">Belize</option>
    <option value="Benin">Benin</option>
    <option value="Bermuda">Bermuda</option>
    <option value="Bhutan">Bhutan</option>
    <option value="Bolivia">Bolivia</option>
    <option value="Bosnia And Herzegovina">Bosnia And Herzegovina</option>
    <option value="Botswana">Botswana</option>
    <option value="Brazil">Brazil</option>
    <option value="British Indian Ocean Territory">British Indian Ocean Territory</option>
    <option value="Brunei Darussalam">Brunei Darussalam</option>
    <option value="Bulgaria">Bulgaria</option>
    <option value="Burkina Faso">Burkina Faso</option>
    <option value="Burundi">Burundi</option>
    <option value="Cambodia">Cambodia</option>
    <option value="Cameroon">Cameroon</option>
    <option value="Canada">Canada</option>
    <option value="Cape Verde">Cape Verde</option>
    <option value="Cayman Islands">Cayman Islands</option>
    <option value="Central African Republic">Central African Republic</option>
    <option value="Chad">Chad</option>
    <option value="Chile">Chile</option>
    <option value="China">China</option>
    <option value="Christmas Island">Christmas Island</option>
    <option value="Cocos (Keeling) Islands">Cocos (Keeling) Islands</option>
    <option value="Colombia">Colombia</option>
    <option value="Comoros">Comoros</option>
    <option value="Congo">Congo</option>
    <option value="Cook Islands">Cook Islands</option>
    <option value="Costa Rica">Costa Rica</option>
    <option value="Cote D'Ivoire">Cote D'Ivoire</option>
    <option value="Croatia">Croatia</option>
    <option value="Curacao">Curacao</option>
    <option value="Cyprus">Cyprus</option>
    <option value="Czech Republic">Czech Republic</option>
    <option value="Denmark">Denmark</option>
    <option value="Djibouti">Djibouti</option>
    <option value="Dominica">Dominica</option>
    <option value="Dominican Republic">Dominican Republic</option>
    <option value="Ecuador">Ecuador</option>
    <option value="Egypt">Egypt</option>
    <option value="El Salvador">El Salvador</option>
    <option value="Equatorial Guinea">Equatorial Guinea</option>
    <option value="Eritrea">Eritrea</option>
    <option value="Estonia">Estonia</option>
    <option value="Ethiopia">Ethiopia</option>
    <option value="Falkland Islands (Malvinas)">Falkland Islands (Malvinas)</option>
    <option value="Faroe Islands">Faroe Islands</option>
    <option value="Fiji">Fiji</option>
    <option value="Finland">Finland</option>
    <option value="France">France</option>
    <option value="French Guiana">French Guiana</option>
    <option value="French Polynesia">French Polynesia</option>
    <option value="French Southern and Antarctic Lands">French Southern and Antarctic Lands</option>
    <option value="Gabon">Gabon</option>
    <option value="Gambia">Gambia</option>
    <option value="Gaza">Gaza</option>
    <option value="Georgia">Georgia</option>
    <option value="Germany">Germany</option>
    <option value="Ghana">Ghana</option>
    <option value="Gibraltar">Gibraltar</option>
    <option value="Greece">Greece</option>
    <option value="Greenland">Greenland</option>
    <option value="Grenada">Grenada</option>
    <option value="Guadeloupe">Guadeloupe</option>
    <option value="Guam">Guam</option>
    <option value="Guatemala">Guatemala</option>
    <option value="Guernsey">Guernsey</option>
    <option value="Guinea">Guinea</option>
    <option value="Guinea-Bissau">Guinea-Bissau</option>
    <option value="Guyana">Guyana</option>
    <option value="Haiti">Haiti</option>
    <option value="Heard Island And Mcdonald Islands">Heard Island And Mcdonald Islands</option>
    <option value="Holy See (Vatican City State)">Holy See (Vatican City State)</option>
    <option value="Honduras">Honduras</option>
    <option value="Hong Kong">Hong Kong</option>
    <option value="Hungary">Hungary</option>
    <option value="Iceland">Iceland</option>
    <option value="India">India</option>
    <option value="Indonesia">Indonesia</option>
    <option value="Iraq">Iraq</option>
    <option value="Ireland">Ireland</option>
    <option value="Isle Of Man">Isle Of Man</option>
    <option value="Israel">Israel</option>
    <option value="Italy">Italy</option>
    <option value="Jamaica">Jamaica</option>
    <option value="Japan">Japan</option>
    <option value="Jersey">Jersey</option>
    <option value="Jordan">Jordan</option>
    <option value="Kazakhstan">Kazakhstan</option>
    <option value="Kenya">Kenya</option>
    <option value="Kiribati">Kiribati</option>
    <option value="Kosovo">Kosovo</option>
    <option value="Kuwait">Kuwait</option>
    <option value="Kyrgyzstan">Kyrgyzstan</option>
    <option value="Laos">Laos</option>
    <option value="Latvia">Latvia</option>
    <option value="Lebanon">Lebanon</option>
    <option value="Lesotho">Lesotho</option>
    <option value="Liberia">Liberia</option>
    <option value="Libya">Libya</option>
    <option value="Liechtenstein">Liechtenstein</option>
    <option value="Lithuania">Lithuania</option>
    <option value="Luxembourg">Luxembourg</option>
    <option value="Macao">Macao</option>
    <option value="Macedonia">Macedonia</option>
    <option value="Madagascar">Madagascar</option>
    <option value="Malawi">Malawi</option>
    <option value="Malaysia">Malaysia</option>
    <option value="Maldives">Maldives</option>
    <option value="Mali">Mali</option>
    <option value="Malta">Malta</option>
    <option value="Marshall Islands">Marshall Islands</option>
    <option value="Martinique">Martinique</option>
    <option value="Mauritania">Mauritania</option>
    <option value="Mauritius">Mauritius</option>
    <option value="Mayotte">Mayotte</option>
    <option value="Mexico">Mexico</option>
    <option value="Micronesia">Micronesia</option>
    <option value="Moldova">Moldova</option>
    <option value="Monaco">Monaco</option>
    <option value="Mongolia">Mongolia</option>
    <option value="Montenegro">Montenegro</option>
    <option value="Montserrat">Montserrat</option>
    <option value="Morocco">Morocco</option>
    <option value="Mozambique">Mozambique</option>
    <option value="Myanmar">Myanmar</option>
    <option value="Namibia">Namibia</option>
    <option value="Nauru">Nauru</option>
    <option value="Nepal">Nepal</option>
    <option value="Netherlands">Netherlands</option>
    <option value="Netherlands Antilles">Netherlands Antilles</option>
    <option value="New Caledonia">New Caledonia</option>
    <option value="New Zealand">New Zealand</option>
    <option value="Nicaragua">Nicaragua</option>
    <option value="Niger">Niger</option>
    <option value="Nigeria">Nigeria</option>
    <option value="Niue">Niue</option>
    <option value="Norfolk Island">Norfolk Island</option>
    <option value="Northern Mariana Islands">Northern Mariana Islands</option>
    <option value="Norway">Norway</option>
    <option value="Oman">Oman</option>
    <option value="Pakistan">Pakistan</option>
    <option value="Palau">Palau</option>
    <option value="Palestine">Palestine</option>
    <option value="Panama">Panama</option>
    <option value="Papua New Guinea">Papua New Guinea</option>
    <option value="Paraguay">Paraguay</option>
    <option value="Peru">Peru</option>
    <option value="Philippines">Philippines</option>
    <option value="Pitcairn Islands">Pitcairn Islands</option>
    <option value="Poland">Poland</option>
    <option value="Portugal">Portugal</option>
    <option value="Puerto Rico">Puerto Rico</option>
    <option value="Qatar">Qatar</option>
    <option value="Reunion">Reunion</option>
    <option value="Romania">Romania</option>
    <option value="Russia">Russia</option>
    <option value="Rwanda">Rwanda</option>
    <option value="Saint Helena">Saint Helena</option>
    <option value="Saint Kitts And Nevis">Saint Kitts And Nevis</option>
    <option value="Saint Lucia">Saint Lucia</option>
    <option value="Saint Pierre And Miquelon">Saint Pierre And Miquelon</option>
    <option value="Saint Vincent And The Grenadines">Saint Vincent And The Grenadines</option>
    <option value="Samoa">Samoa</option>
    <option value="San Marino">San Marino</option>
    <option value="Sao Tome And Principe">Sao Tome And Principe</option>
    <option value="Saudi Arabia">Saudi Arabia</option>
    <option value="Senegal">Senegal</option>
    <option value="Serbia">Serbia</option>
    <option value="Seychelles">Seychelles</option>
    <option value="Sierra Leone">Sierra Leone</option>
    <option value="Singapore">Singapore</option>
    <option value="Slovakia">Slovakia</option>
    <option value="Slovenia">Slovenia</option>
    <option value="Solomon Islands">Solomon Islands</option>
    <option value="Somalia">Somalia</option>
    <option value="South Africa">South Africa</option>
    <option value="South Korea">South Korea</option>
    <option value="Spain">Spain</option>
    <option value="Sri Lanka">Sri Lanka</option>
    <option value="Suriname">Suriname</option>
    <option value="Svalbard And Jan Mayen">Svalbard And Jan Mayen</option>
    <option value="Swaziland">Swaziland</option>
    <option value="Sweden">Sweden</option>
    <option value="Switzerland">Switzerland</option>
    <option value="Taiwan">Taiwan</option>
    <option value="Tajikistan">Tajikistan</option>
    <option value="Tanzania">Tanzania</option>
    <option value="Thailand">Thailand</option>
    <option value="Timor-Leste">Timor-Leste</option>
    <option value="Togo">Togo</option>
    <option value="Tokelau">Tokelau</option>
    <option value="Tonga">Tonga</option>
    <option value="Trinidad And Tobago">Trinidad And Tobago</option>
    <option value="Tunisia">Tunisia</option>
    <option value="Turkey">Turkey</option>
    <option value="Turkmenistan">Turkmenistan</option>
    <option value="Turks And Caicos Islands">Turks And Caicos Islands</option>
    <option value="Tuvalu">Tuvalu</option>
    <option value="Uganda">Uganda</option>
    <option value="Ukraine">Ukraine</option>
    <option value="United Arab Emirates">United Arab Emirates</option>
    <option value="United Kingdom">United Kingdom</option>
    <option value="United States Minor Outlying Islands">United States Minor Outlying Islands</option>
    <option value="Uruguay">Uruguay</option>
    <option value="Uzbekistan">Uzbekistan</option>
    <option value="Vanuatu">Vanuatu</option>
    <option value="Venezuela">Venezuela</option>
    <option value="Vietnam">Vietnam</option>
    <option value="Virgin Islands, British">Virgin Islands, British</option>
    <option value="Virgin Islands, U.S.">Virgin Islands, U.S.</option>
    <option value="Wallis And Futuna">Wallis And Futuna</option>
    <option value="West Bank">West Bank</option>
    <option value="Western Sahara">Western Sahara</option>
    <option value="Yemen">Yemen</option>
    <option value="Zambia">Zambia</option>
    <option value="Zimbabwe">Zimbabwe</option>
  </select>
  <select name="state" id="state">
    <option value="AK">Alaska</option>
    <option value="AL">Alabama</option>
    <option value="AR">Arkansas</option>
    <option value="AZ">Arizona</option>
    <option value="CA">California</option>
    <option value="CO">Colorado</option>
    <option value="CT">Connecticut</option>
    <option value="DC">D.C.</option>
    <option value="DE">Delaware</option>
    <option value="FL">Florida</option>
    <option value="GA">Georgia</option>
    <option value="HI">Hawaii</option>
    <option value="IA">Iowa</option>
    <option value="ID">Idaho</option>
    <option value="IL">Illinois</option>
    <option value="IN">Indiana</option>
    <option value="KS">Kansas</option>
    <option value="KY">Kentucky</option>
    <option value="LA">Louisiana</option>
    <option value="MA">Massachusetts</option>
    <option value="MD">Maryland</option>
    <option value="ME">Maine</option>
    <option value="MI">Michigan</option>
    <option value="MN">Minnesota</option>
    <option value="MO">Missouri</option>
    <option value="MS">Mississippi</option>
    <option value="MT">Montana</option>
    <option value="NC">North Carolina</option>
    <option value="ND">North Dakota</option>
    <option value="NE">Nebraska</option>
    <option value="NH">New Hampshire</option>
    <option value="NJ">New Jersey</option>
    <option value="NM">New Mexico</option>
    <option value="NV">Nevada</option>
    <option value="NY">New York</option>
    <option value="OH">Ohio</option>
    <option value="OK">Oklahoma</option>
    <option value="OR">Oregon</option>
    <option value="PA">Pennsylvania</option>
    <option value="PR">Puerto Rico</option>
    <option value="RI">Rhode Island</option>
    <option value="SC">South Carolina</option>
    <option value="SD">South Dakota</option>
    <option value="TN">Tennessee</option>
    <option value="TX">Texas</option>
    <option value="UT">Utah</option>
    <option value="VA">Virginia</option>
    <option value="VT">Vermont</option>
    <option value="WA">Washington</option>
    <option value="WI">Wisconsin</option>
    <option value="WV">West Virginia</option>
  </select>
  <div class="checkbox-holder mt-20">
    <input type="checkbox" name="mktoOptIn" id="mktoOptIn" value="1" style="display:inline-block; width:30px; float:left; clear:none;">
    <p for="mktoOptIn">Please check the box if you wish to opt-in specifically to marketing communications from Palo Alto Networks.</p>
  </div>
  <p class="privacy-area pb-0 pt-10">By submitting this form, you agree to our <a href="https://www.securityroundtable.org/terms/" style="color:#F05B33" target="_blank">Terms of Use</a> and acknowledge our
    <a href="https://www.paloaltonetworks.com/legal-notices/privacy" style="color:#F05B33;" target="_blank">Privacy Statement</a></p>
  <div class="modal-footer">
    <div class="g-recaptcha mb-15 d-flex justify-content-center" data-callback="captchaComplete" data-sitekey="6LcWUAoUAAAAAPE9HFfO3AXw9E_gja4MLHG03mor">
      <div style="width: 304px; height: 78px;">
        <div><iframe title="reCAPTCHA"
            src="https://www.google.com/recaptcha/api2/anchor?ar=1&amp;k=6LcWUAoUAAAAAPE9HFfO3AXw9E_gja4MLHG03mor&amp;co=aHR0cHM6Ly93d3cuc2VjdXJpdHlyb3VuZHRhYmxlLm9yZzo0NDM.&amp;hl=de&amp;v=0aeEuuJmrVqDrEL39Fsg5-UJ&amp;size=normal&amp;cb=x47px0f6lhc3"
            width="304" height="78" role="presentation" name="a-fouzv21l0t7d" frameborder="0" scrolling="no" sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"></iframe>
        </div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
          style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
      </div><iframe style="display: none;"></iframe>
    </div>
    <input type="submit" class="button-modal-form" value="Download">
    <button class="btn" data-dismiss="modal" aria-label="Close">Cancel</button>
  </div>
</form>

Text Content

___

NAVIGATING THE DIGITAL AGE

Get Your Copy


THE DEF INITIVE CYBERSECURITY GUIDE


FOR DIRECTORS AND OFFICERS

Third Edition

A collection of 50 global thought leaders and visionaries centered on doing
business in the Digital Age – from addressing disruptions caused by COVID-19, to
driving digital transformation through innovation, to fostering a mu­tual
understanding between technical and non-technical executives when it comes to
existential issues surrounding cybersecurity.

Get Your Copy




GET YOUR DIGITAL COPY

United States Afghanistan Aland Islands Albania Algeria American Samoa Andorra
Angola Anguilla Antigua And Barbuda Argentina Armenia Aruba Australia Austria
Azerbaijan Bahamas Bahrain Bangladesh Barbados Belarus Belgium Belize Benin
Bermuda Bhutan Bolivia Bosnia And Herzegovina Botswana Brazil British Indian
Ocean Territory Brunei Darussalam Bulgaria Burkina Faso Burundi Cambodia
Cameroon Canada Cape Verde Cayman Islands Central African Republic Chad Chile
China Christmas Island Cocos (Keeling) Islands Colombia Comoros Congo Cook
Islands Costa Rica Cote D'Ivoire Croatia Curacao Cyprus Czech Republic Denmark
Djibouti Dominica Dominican Republic Ecuador Egypt El Salvador Equatorial Guinea
Eritrea Estonia Ethiopia Falkland Islands (Malvinas) Faroe Islands Fiji Finland
France French Guiana French Polynesia French Southern and Antarctic Lands Gabon
Gambia Gaza Georgia Germany Ghana Gibraltar Greece Greenland Grenada Guadeloupe
Guam Guatemala Guernsey Guinea Guinea-Bissau Guyana Haiti Heard Island And
Mcdonald Islands Holy See (Vatican City State) Honduras Hong Kong Hungary
Iceland India Indonesia Iraq Ireland Isle Of Man Israel Italy Jamaica Japan
Jersey Jordan Kazakhstan Kenya Kiribati Kosovo Kuwait Kyrgyzstan Laos Latvia
Lebanon Lesotho Liberia Libya Liechtenstein Lithuania Luxembourg Macao Macedonia
Madagascar Malawi Malaysia Maldives Mali Malta Marshall Islands Martinique
Mauritania Mauritius Mayotte Mexico Micronesia Moldova Monaco Mongolia
Montenegro Montserrat Morocco Mozambique Myanmar Namibia Nauru Nepal Netherlands
Netherlands Antilles New Caledonia New Zealand Nicaragua Niger Nigeria Niue
Norfolk Island Northern Mariana Islands Norway Oman Pakistan Palau Palestine
Panama Papua New Guinea Paraguay Peru Philippines Pitcairn Islands Poland
Portugal Puerto Rico Qatar Reunion Romania Russia Rwanda Saint Helena Saint
Kitts And Nevis Saint Lucia Saint Pierre And Miquelon Saint Vincent And The
Grenadines Samoa San Marino Sao Tome And Principe Saudi Arabia Senegal Serbia
Seychelles Sierra Leone Singapore Slovakia Slovenia Solomon Islands Somalia
South Africa South Korea Spain Sri Lanka Suriname Svalbard And Jan Mayen
Swaziland Sweden Switzerland Taiwan Tajikistan Tanzania Thailand Timor-Leste
Togo Tokelau Tonga Trinidad And Tobago Tunisia Turkey Turkmenistan Turks And
Caicos Islands Tuvalu Uganda Ukraine United Arab Emirates United Kingdom United
States Minor Outlying Islands Uruguay Uzbekistan Vanuatu Venezuela Vietnam
Virgin Islands, British Virgin Islands, U.S. Wallis And Futuna West Bank Western
Sahara Yemen Zambia Zimbabwe Alaska Alabama Arkansas Arizona California Colorado
Connecticut D.C. Delaware Florida Georgia Hawaii Iowa Idaho Illinois Indiana
Kansas Kentucky Louisiana Massachusetts Maryland Maine Michigan Minnesota
Missouri Mississippi Montana North Carolina North Dakota Nebraska New Hampshire
New Jersey New Mexico Nevada New York Ohio Oklahoma Oregon Pennsylvania Puerto
Rico Rhode Island South Carolina South Dakota Tennessee Texas Utah Virginia
Vermont Washington Wisconsin West Virginia

Please check the box if you wish to opt-in specifically to marketing
communications from Palo Alto Networks.

By submitting this form, you agree to our Terms of Use and acknowledge our
Privacy Statement


Cancel


ABOUT THE BOOK

> PART 1
> 
> THE FUTURE OF THREAT AND RISKS
> 
> Seizing the opportunities, confronting the challenges

> PART 2
> 
> LESSONS FROM AROUND THE WORLD
> 
> Cybersecurity awareness, understanding and leadership

> PART 3
> 
> MAKE SURE YOU’RE COVERED TODAY
> 
> Best practices on people, process and technology


CONTRIBUTORS AND CHAPTERS


PART 1


THE FUTURE OF THREAT AND RISKS

chapters 1-11

 

PREFACE

Nikesh Arora

Chief Executive Officer and Chairman, Palo Alto Networks

×

Nikesh Arora is Chief Executive Officer and Chairman of Palo Alto Networks.
Previously, he was President and Chief Operating Officer of SoftBank Group
Corp., and Senior Vice President and Chief Business Officer at Google.

CHAPTER 01

ENSURING A SAFE, SECURE, AND PEOPLE-CENTERED INTERNET

Vint Cerf

Vice President and Chief Internet Evangelist, Google

×

Vinton G. Cerf is Vice President and Chief Internet Evangelist at Google. Known
as a “Father of the Internet,” Cerf is co-designer of the TCP/IP protocols and
architecture of the Internet. He has received numerous awards, including the
U.S. National Medal of Technology, ACM Alan M. Turing award and the Presidential
Medal of Freedom.

CHAPTER 02

FORGET ABOUT THE NEW NORMAL. WE’RE IN THE NEW NOW.

Bruce T. Crawford

Retired Chief Information Officer, U.S. Army, Department of Defense

×

Lieutenant General Bruce T. Crawford recently culminated 34 years of service as
the Army Chief Information Officer, serving as the senior government official
responsible for policy and oversight of the Army’s $12.B IT portfolio. Other key
assignments include senior cybersecurity and enterprise IT positions in every
major theater of operations at the strategic, operational, and tactical levels.
Bruce now serves on the advisory boards of Rubrick Inc, and CyberArk.

CHAPTER 03

WHY OUR DIGITAL DNA MUST EVOLVE—QUICKLY

Salim Ismail

Founder, ExO Foundation; Board Member, XPRIZE

×

Best-Selling Author of Exponential Organizations; XPRIZE Foundation Board
member; Founding Executive Director of Singularity University; Chairman of ExO
Works; Founder, The ExO Foundation; Former Vice President of Yahoo!’s
Brickhouse; AION Advisory Board member; and General Partner of Rokk3r Fuel ExO
Venture Fund.

Salim Ismail is the best-selling author of Exponential Organizations, a
sought-after business strategist, and a renowned entrepreneur with ties to
Yahoo!, Google, and Singularity University. He consults with governments and the
world’s Fortune 1000 companies on innovation, institutional change and growth.
Ismail has been profiled in media outlets like The New York Times, Bloomberg
BusinessWeek, Fortune, Forbes, WIRED, Vogue, and the BBC.

Ismail travels extensively sharing a global perspective on the impact of
breakthrough technologies. His book quickly reached No. 1 on Amazon’s
“Best-Sellers in Business Management,” and was also named Frost & Sullivan’s
“Growth, Innovation and Leadership Book of the Year.” In presentations, he
shares how any company, from a startup to a multinational, can streamline its
performance and grow 10x faster than its peers. Audiences receive a tailored
action plan, a new process for leading-edge thinking, and an understanding of
what emerging technology trends mean for their future.

Ismail’s captivating, educational, and downright jaw-dropping presentations have
been called “mind-blowing” and “the best talk I’ve ever heard.”

Salim founded ExO Works in 2016 to transform global business by catapulting
organizations into the world of exponential thinking. ExO Works delivers a
10-week program based on concepts detailed in  Exponential Organizations that
fast forwards an enterprise’s mindset by two years by removing the barriers to
innovation. Just as ExO Works is the face of the future of management
consulting, Ismail founded The Fastrack Institute, a non-profit dedicated to
accelerating technology into society.

Ismail spent eight years as Singularity University’s founding Executive Director
and global ambassador. SU’s goal is to “educate, inspire and empower a new
generation of leaders to apply exponential technologies to address humanity’s
grand challenges.” SU, whose founders hail from Google and the XPRIZE
Foundation, has empowered thousands of people from more than 85 countries to
apply disruptive technologies – biotechnology, artificial intelligence, and
neuroscience – to more than 100 startups and countless patents and ideas.

Prior to Singularity, Ismail was a vice president at Yahoo, where he built and
ran Brickhouse, the company’s internal incubator. His last company, Ångströ, a
news aggregation startup, was sold to Google in 2010. He has founded or operated
seven early-stage companies including PubSub Concepts, which laid some of the
foundation for the real-time web, and the New York Grant Company, a direct
response to 9/11. In its first year, the organization attracted over 400 clients
and delivered over $12 million of federal grants to the local Lower Manhattan
economy.

In 2017,  at its fourth annual benefit gala, Endeavor Miami, the first U.S.
affiliate of Endeavor, a global non-profit organization that has advised and
helped scale more than 800 high-impact companies in 26 countries around the
world, honored Ismail with its 2017 Impact Award.

CHAPTER 04

THE EXHILARATING, EXCITING, AND SOBERING WORLD OF THE INTERNET OF THINGS:
IMAGINE THE OPPORTUNITIES, AND REALIZE THE RISKS

Jennifer Steffens

Chief Executive Officer, IOActive

×

Jennifer Sunshine Steffens is the Chief Executive Officer of IOActive, a global
consulting firm dedicated to making the world a safer place. She spearheads
IOActive’s global business operations, drives the company’s strategic vision and
leads IOActive’s team of world-renowned cybersecurity researchers. Under her
leadership, IOActive has expanded its service offerings across all technical and
advisory services to ensure its research helps improve customers’ security
posture as well as the state of security globally. In addition, Jennifer helped
pioneer IOActive’s Securing Smart Cities non-profit, which serves as a resource
for companies, governments, and individuals to navigate the complexity of
securing a smart city.

Jennifer is an active member of the Executive Women’s Forum, the Information
Security Systems Association and the Open Web Application Security Project.
Lauded by Forbes, The Wall Street Journal, Information Security Magazine, and
many more, she received SC Magazine’s Reboot Leadership Award for Top Management
in 2017 and CV Magazine’s IT Security CEO of the Year 2018. She serves as a
judge for the TechTrailblazers and DUO Women in Security awards and is a
frequent speaker at leading industry conferences worldwide.

Jennifer brings nearly 20 years of experience in the security industry. Prior to
IOActive, she held leadership positions at ground breaking companies such as
Sourcefire and NFR Security.

CHAPTER 05

HOW DATA GRIDS WILL POWER THE ECONOMY AND INFLUENCE OUR FUTURE

Rama Vedashree

Chief Executive Officer, Data Security Council of India

×

Prior to moving to DSCI she was Vice President, NASSCOM leading all initiatives
in Domestic IT, eGovernance and Smart Cities among others. At NASSCOM, she has
also led the Healthcare initiative in partnership with apex Health Sector body,
NATHEALTH and the NASSCOM-DSCI Cyber Security Task Force.

DSCI under her leadership is pursuing a Cyber Security Industry growth charter
to make India into a global hub for cyber security and grow to 35B$ by 2025.

With a rich and varied experience of 28 years in the Industry, she has had long
stints at NIIT Technologies, Microsoft and General Electric. Her previous roles
include that of Director in Microsoft Global Services, and Vice President, GE
India. She has experience in the diverse domains of IT consulting, Strategic
Accounts and Business Development, e-Governance projects and Business
Development for Infrastructure projects and Health and Water Sectors at GE.

She is member of many committees of Government of India, including the Data
Protection Committee, Cloud Expert Group and Financial Inclusion Advisory Board.

A Gold Medalist from University of Hyderabad, she has also completed an
Executive Education program from Harvard, and a short program in High
Performance Computing from Cornell University.

CHAPTER 06

THE FUTURE OF CLOUD

Ann Johnson

Corporate Vice President, Cybersecurity Solutions, Microsoft

×

Ann Johnson leads Enterprise & Cybersecurity at Microsoft. The focus of her
organization is to lead global enterprises on their secure digital
transformation journey. Ann is a recognized sales and operations industry leader
with a proven track record for building and leading high-performing global
enterprise software go-to-market teams. Ann has a background in cybersecurity,
infrastructure and storage and is a frequent speaker on topics of online banking
fraud, information security, healthcare security, mobile security, workforce
diversity, privacy and compliance.

Before joining Microsoft, Ann was CEO at Boundless, an open source geospatial
software and services provider. Prior to Boundless, Ann was President and COO of
Qualys, Inc., a provider of cloud security and compliance solutions. Prior to
Qualys, Ann was Vice President of World Wide Sales/IPV and Global Accounts at
RSA Security LLC, a subsidiary of EMC Corporation which provides solutions to
protect customer online identities and digital assets.

Ann is a graduate of Weber State University in Utah where she completed a dual
major in political science and communications. She currently serves on the board
of the Security Advisor Alliance and as Board Advisor to the biometric security
firm HYPR.

CHAPTER 07

UNDERSTANDING THE EXCITING, EXPONENTIAL, AND TERRIFYING FUTURE OF CYBERSECURITY

Marc Goodman

Author and Global Security Advisor

×

Marc Goodman is a New York Times Best-Selling author, global strategist and
consultant focused on the profound change technology is having on security,
business and international affairs.  He is the founder of the Future Crimes
Institute and currently serves as the Chair for Policy, Law and Ethics at
Silicon Valley’s Singularity University. Over the past twenty years, he has
built his expertise in international cyber crime and terrorism working with
organizations such as INTERPOL, the UN Counterterrorism Task Force, NATO and the
US Government.

Goodman frequently advises industry leaders, security executives, start-ups and
global policy makers on transnational cyber risk and intelligence and has
operated in more than 75 countries around the world.  His professional
experiences include working as a street police officer, undercover investigator
and counter-terrorism strategist, as well as briefing myriad cabinet ministers
and heads of government, including the White House. Goodman’s current areas of
research include the security implications of emerging technologies such as
artificial intelligence, big data, robotics, crypto-currencies, synthetic
biology, virtual reality and the Internet of Things.

CHAPTER 08

DEALING WITH THE EVOLVING ADVERSARY MINDSET

James C. Trainor

Senior Vice President, Cyber Solutions Group, Aon

×

James C. Trainor is Senior Vice President within Aon’s Cyber Solutions Group.
Mr. Trainor joined Aon in October 2016 after a distinguished career at the
Federal Bureau of Investigation, where he most recently led the Cyber Division
at FBI Headquarters.

Mr. Trainor played a critical role in devising the FBI’s national strategy to
combat cyber-crime and was the senior FBI executive responsible for all cyber
investigations. During his three year tenure in the Cyber Division, Mr. Trainor
led FBI Agents and Analysts in every major high-profile cyber investigation
involving the FBI.

In his new role, Mr. Trainor will help shape Aon’s overall cyber strategy on
behalf of clients, working closely with colleagues across technology, system
integration, risk transfer and advisory to ensure a holistic and integrated
approach.

Mr. Trainor joined the FBI as a Special Agent in 1996. Over his twenty year FBI
career, he served in both overseas and domestic assignments focused on cyber,
counterintelligence, counterterrorism, intelligence and criminal matters. He has
served in field assignments in Chicago; New Haven, CT; Boston; New York City and
at FBI Headquarters in Washington, D.C.

Mr. Trainor is a graduate of Assumption College in Worcester, Massachusetts and
obtained a Master’s in Public Administration from the University of Connecticut.
He also completed a Chief Information Security Officer (CISO) and Chief Risk
Officer (CRO) Certificate Program at Carnegie Mellon University and has GIAC
certifications in GISP, GSLC and GISF.

Mr. Trainor is the recipient of the 2016 Presidential Rank Award, the 2016 FCW
Federal 100 in Information Technology, and was recognized by Security Magazine
in 2017 as Most Influential in Security.

CHAPTER 09

THE EVOLVING ROLE OF THE CISO: FROM RISK MANAGER TO BUSINESS ENABLER

Justin Somaini

Chief Security Officer, Unity Technologies

×

Justin Somaini is Chief Security Officer at Unity Technologies. Prior to joining
Unity, he was Chief Security Officer at SAP, Chief Trust Officer at Box, and
held the role of Chief Information Security Officer at Yahoo, Symantec,
Verisign, and Charles Scwab.

CHAPTER 10

THE GREAT RESET: THE FUTURE OF WORK AND CYBERSECURITY

Gary A. Bolles

Chair for the Future of Work, Singularity University

×

Gary A. Bolles is an internationally-recognized expert and lecturer on the
future of work and of learning. His focus is on strategies for helping
individuals, organizations, communities and countries to thrive in the digital
work economy. As a partner in the boutique consulting agency Charrette LLC, he
helps clients to identify and understand trends affecting organizations and
markets, through innovation consulting, strategic conferences, strategy design
charrettes, and collaborative initiatives. As Chair for the Future of Work for
Singularity University, he leads the organization’s efforts to empower a global
community to create an abundant future of work and learning.  And as co-founder
of eParachute.com, he helps job-hunters & career changers, from youth to 50+,
with online and in-person programs inspired by “What Color Is Your Parachute?”,
the best-selling career book of all time. Bolles has also authored a series of
video courses on the future of work for LinkedIn Learning/Lynda.com, and writes
on LinkedIn.

CHAPTER 11

THE ETHICS OF TECHNOLOGY AND THE FUTURE OF HUMANITY

Gerd Leonhard

Author; Executive “Future Trainer;” Strategist; Chief Executive Officer, The
Futures Agency

×

Gerd Leonhard is a widely-known and top-rated futurist, with over 1500
engagements in 50+ countries since 2004 and a combined audience of over 1
million people. Gerd focusses on near-future, ‘nowist’ observations and
actionable foresights in the sectors of humanity, society, business and
commerce, media, technology and communications.

Gerd is also an influential author, a sought-after executive ‘future trainer’
and a trusted strategic advisor. He is the co-author of the best-selling book
The Future of Music and the author of 5 other books including ‘The Humanity
Challenge’ (June 2016). Gerd is also the host of the web-TV series TheFutureShow
and the CEO of TheFuturesAgency, a global network of over 30 leading futurists.

Gerd is considered a leading voice on a wide range of topics including digital
transformation and the opportunity-challenges of the coming exponential society,
a sustainable business and cultural ecology, social media and communications, TV
/ film, radio and broadcasting futures, mobile content and commerce, innovation,
leadership and entrepreneurship, ‘hard-future’ consumer trends, human-machine
futures and AI, cognitive computing, the IoT, big data and automation,
next-generation advertising, marketing and branding, as well as sustainability
and related ‘green future’ topics. In 2006, The Wall Street Journal called Gerd
‘one of the leading Media Futurists in the World’. In 2015, Wired Magazine
listed Gerd as #88 of the top 100 influencers in Europe. He’s #21 on the global
list of futurists.

Gerd's keynotes, speeches and presentations are renowned for their hard-hitting
and provocative yet inspiring, often humorous and always personal motivational
style. Gerd is highly regarded as a global influencer and has advised many
business leaders and government officials around the globe. His diverse client
list of over 300 companies includes UBS, Mastercard, Unilever, Lloyds Bank, WWF,
Nokia, The Guardian, Google, Sony, Telkom Indonesia, Siemens, RTL, ITV, BBC,
France Telecom, Orange, Deutsche Telekom, MTN, The Financial Times, DDB, Ogilvy,
Omnicom, IPG, The EU Commission, Mandarin Oriental Hotel Group, VISA, and many
others


PART 2


LESSONS FROM AROUND THE WORLD

chapters 13-24

CHAPTER 12

IF YOU’RE NOT COLLABORATING WITH COLLEAGUES AND COMPETITORS ON CYBER THREAT
INTELLIGENCE, BEWARE: THE BAD GUYS ARE WAY AHEAD OF YOU

Sherri Ramsay

Cybersecurity Consultant; Former Director of the U.S. National Security Agency

×

Sherri Ramsay is currently a Consultant, engaged in strategy development and
planning, coaching, partnership development, and marketing and development of
security operations centers. She is a member of the Board of Advisors for the
Hume Research Center at Virginia Tech and a member of the Board of Advisors for
TruSTAR Technology.

Ms. Ramsay is the former Director of the National Security Agency/Central
Security Service Threat Operations Center (NTOC) and a former member of the
Armed Forces Communications Electronic Administration (AFCEA) Board of
Directors. As the NTOC Director, she led discovery and characterization of
threats to national security systems, providing situational awareness for those
threats, and coordinating actionable information to counter those threats to the
DOD, DHS and FBI. At NSA, she also served as a senior leader in the Signals
Intelligence Directorate, the Technology Directorate and the Information
Assurance Directorate. Prior to joining NSA, she taught high school mathematics.

Ms. Ramsay received the Department of Defense Distinguished Civilian Service
Award (the highest award given to a DoD civilian), the Exceptional Civilian
Service Award (the highest award given to an NSA civilian), the NSA Meritorious
Civilian Service Award twice (the second highest award given to an NSA
civilian), the Presidential Rank Award, the National Intelligence Meritorious
Unit Citation, the Louis Tordella Award, and the Armed Forces Communications
Electronic Administration (AFCEA) Meritorious Service to the Intelligence
Community Award. She received the Women’s Leadership

Award from the Congressional Bipartisan SMART (Strengthening the Mid-Atlantic
Region for Tomorrow) caucus.

Ms. Ramsay graduated Magna Cum Laude with General Honors from the University of
Georgia with a Bachelor of Science degree in Mathematics and Education. She
graduated with Honors from the Johns Hopkins University with a Master’s Degree
in Computer Science. She graduated from the Industrial College of the Armed
Forces (ICAF), National Defense University, with a Master’s in National Resource
Strategy. She received a Certificate in Leadership from the University of
Virginia.

CHAPTER 13

PARTNERING TO SECURE A NEW FORM OF CRITICAL INFRASTRUCTURE

Ryan Gillis

Vice President for Cybersecurity Strategy and Global Policy, Palo Alto Networks

×

Ryan works with governments, companies and organizations around the world to
develop and implement strategies, policies and operational partnerships that
prevent successful cyberattacks. He oversees the company’s involvement in
public-private cybersecurity exercises, and is responsible for expanding
cyberthreat information sharing relationships with various government
organizations. Additionally, Ryan leads the company’s global public policy
efforts and oversees government affairs around the world.

Prior to joining Palo Alto Networks, Ryan spent nearly 15 years in government,
and with technology and defense companies. Most recently, Ryan served as a
cybersecurity official on the U.S. National Security Council staff at the White
House, and more than a decade in various positions across the Department of
Homeland Security during both Republican and Democratic administrations.

Ryan is a member of the Council on Foreign Relations and the World Economic
Forum’s expert network supporting the growth of a secure and reliable Industrial
Internet of Things (IIoT). In 2016, he also served on the CSIS Cyber Policy Task
Force to develop recommendations for the incoming U.S. administration, and he
participated in the U.S.-Australia Diplomatic Track 1.5 Cyber Dialogue. Ryan is
an elected member of the executive committee of the U.S. Information Technology
Sector Coordinating Council. He is also a recipient of the National Security
Council’s “Outstanding Service Award,” and the 2017 Federal Computer Week “Fed
100” award. Ryan is a graduate of Georgetown University.

CHAPTER 13

PARTNERING TO SECURE A NEW FORM OF CRITICAL INFRASTRUCTURE

Sean Morgan

Director of Cybersecurity Policy and Partnerships, Palo Alto Networks

×

Sean Morgan is Director for Cybersecurity Policy and Partnerships at Palo Alto
Networks. He has also held positions in cybersecurity at the U.S. National
Security Council and the Department of Defense.

CHAPTER 14

THE VALUE OF BEING PREPARED FOR ANYTHING

Mario Chiock

Schlumberger Fellow and CISO Emeritus, Schlumberger

×

Mario Chiock possesses over 37 years of experience in Oil Field operations, IT,
Security, Risk, Privacy and Auditing. Prior to his current role as Chief
Security Officer & Schlumberger Fellow, Mario was the CISO at Schlumberger where
he was responsible for developing the company’s worldwide, long-term cyber
security strategy. He is recognized for his leadership and management in all
aspects of cybersecurity throughout the company as well as within the community.

Through his vision, he successfully transitioned Schlumberger from legacy
firewalls to a more robust infrastructure based on next-generation firewalls.
His experience in successfully deploying advanced technologies and approaches
also spans Incident Response, Advance Threat Prevention, Digital Right
Management to watermark & fingerprint sensitive documents. He also implemented
federation services to minimize 3rd party risk and created the extended security
team to foster collaboration with other IT groups. Mario is also known for
applying his Lean Six Sigma expertise for measuring performance and creating
dashboards that have led to more simple operations and reduction of waste.

Outside of Schlumberger, Mario has been an active member of the Information
Systems Security Association (ISSA) for over 20 years; he has held numerous
board positions in the Austin, Capital of Texas Chapter, as well as the South
Texas Chapter in Houston. He was president of the South Texas Chapter in 2007,
bringing in the “Chapter of the Year” award. He continues to serve on the board.
Mario is also an active volunteer trainer for Security Certifications such as
CISM, CISA & CRISC certifications, and has mentored many successful CSO & CISO
in Austin & Houston area. He is also very active with Evanta as speaker and
instructor for their CISO Institute. In 2015 he was a speaker for the SPE and
API conference and in 2016 he was a panelist at the GEO2016 conference in
Bahrain.

Mario was recognized as one of the top 25 out of more than 10,000 security
executives in the ExecRank 2013 Security Executive Rankings, he also won the
2012 Central Information Security Executive (ISE) “People Choice Award”, in 2014
he is a recipient of the CSO40 – 2014 award, named “ISSA Fellow”, won ISC2
Americas Information Security Leadership Awards (ISLA) and won the “ISSA Honor
Roll” award. In 2017 he received the Infragard Houston award of excellence for
the Private-Public Partnership in Cybersecurity.

He is an active member of the Houston Security community and gives security
talks, training and volunteers his IT security expertise to local non-profit
organizations. He is currently a board member of the Houston InfraGard Chapter,
has served in Executive & Technical Advisory boards of many security companies
such as WatchFire (Now IBM), ISS (now IBM), Qualys, and currently is active on
the Palo Alto Networks advisory board, he is also serving in the Google Cloud
Platform advisory board and strategic advisor to Onapsis as well as Board
member.

Mario has a CISSP, CISM & CISA Certifications, and is past chair for the
American Petroleum Institute Information (API) Security Sub-Committee and was
involved in the formation of the Oil & Gas ISAC.

CHAPTER 15

REACTING TO CYBER ATTACKS DOESN’T WORK: WHY YOU NEED A PROACTIVE APPROACH

Yang Zhoulong

Vice President and Board Director, Yunda Group

×

Dr. Yang Zhoulong is Vice President and Chief Technology Officer of Yunda Group.
He is also the Deputy Chairman of China E-Commerce Logistic Industry Alliance,
and the Logistics Information Expert of China Federation of Logistics and
Purchasing. He has been working as an IT professional in the financial service
industry and e-commerce logistics for 20 years.

CHAPTER 16

THE PATH TO A SUCCESSFUL CLOUD TRANSFORMATION

Mike Towers

Chief Information Security Officer, Takeda Pharmaceuticals International

×

Mike Towers is the Chief Information Security Officer at Takeda Pharmaceuticals
International. He has worked in life sciences technology for over 25 years,
leading global security functions since 2008. He is a regular speaker on digital
trust, information risk and cybersecurity. He has received four Information
Security Executive of the Year awards within the healthcare industry and serves
on the board of the Health Information Security and Analysis Center.

CHAPTER 17

HOW TO BUILD AND DEPLOY AN AUTONOMOUS SOC

John Paul Lonie

Head of Security Operations, Iress

×

John Paul Lonie is the Head of Security Operations at Iress. He has spent the
past 25 years in financial services starting in development and IT operations
and the last 12 years in a variety of information security roles.

CHAPTER 18

SECURITY TRANSFORMATION AS A BUSINESS IMPERATIVE

John Scimone

Senior Vice President and Chief Security Officer, Dell

×

John Scimone serves as Sr. Vice President, Chief Security Officer for Dell,
where he leads the company’s global corporate security program. John’s
responsibilities span the full spectrum of strategy, planning, and operations,
aiding Dell’s businesses in the management of security risk across the physical
and cyber domains. He is also charged with the advocacy of business resilience,
including crisis management, business continuity and disaster recovery.

Before joining Dell, John served as the Global Chief Information Security
Officer for the Sony Group family of companies, where he was responsible for
building Sony’s first global information security and privacy organization and
leading strategy, policy, and operations. Prior to joining Sony, he also held a
number of leadership positions at the U.S. Department of Defense, including as
Director of Security Operations for the Secretary of Defense's communications
office, where he led the facility, personnel, and cyber security programs. John
formerly served as a member of a predecessor organization of U.S. Cyber Command,
where he led the development of enterprise information security programs that
protected information belonging to the DoD’s more than two million employees.

John holds a Bachelor of Science degree in Computer Science, with a
specialization in Information Assurance, from the Georgia Institute of
Technology. He also earned a Master of Arts degree in Strategic Intelligence,
with a specialization in Counterintelligence, from the Institute of World
Politics in Washington D.C.

CHAPTER 19

AN ANTIDOTE TO STRESS IN CYBERSECURITY

Gemma Garcia Godall

Founder, Instituto de Inteligencia Emocional

×

Gemma Garcia Godall is the Founder of Instituto de Inteligencia Emocional, where
she guides leaders, teams and organizations to shine through cultural
transformation projects. Previously, she was the Chief Executive Officer of a
leading player in the financial services industry.

CHAPTER 20

THE IMPORTANCE OF CYBERSECURITY PREPARATION AND LEADERSHIP

Stephen Moore

Vice President and Chief Security Strategist, Exabeam

×

Stephen Moore is the Vice President and Chief Security Strategist at Exabeam,
focused on driving solutions for threat detection/response and advising
customers on breach response. Prior to joining Exabeam, Stephen has held a
variety of cybersecurity practitioner and leadership roles. He spends his free
time advising industry-leading organizations, mentoring, and helping those in
need.

CHAPTER 21

DATA MANIPULATION, LAW ENFORCEMENT, AND OUR FUTURE: SEEKING TO BUILD TRUST IN
OUR DIGITALLY CONNECTED SYSTEMS

Philipp Amann

Head of Strategy, Europol’s European Cybercrime Centre

×

Philipp is the Head of Strategy of the European Cybercrime Centre (EC3). EC3
Strategy is responsible for the delivery of strategic, situational and tactical
cyber-related products such as the Internet Organised Crime Threat Assessment
(IOCTA). Other key areas of responsibility include prevention and awareness,
outreach, stakeholder management, training management and internet governance.

Philipp regularly presents at major international conferences and events.

Prior to joining the EC3, he held management positions with the Organization for
Security and Co- operation in Europe, the Organisation for the Prohibition of
Chemical Weapons and the International Criminal Court.

Philipp has more than 17 years of relevant working experience and hands-on
skills in information and cyber security management, policy development,
combatting cybercrime, electronic evidence management and the analysis and
management of intelligence.

He has worked in various fields, including the financial sector, global
disarmament and arms control, CBRNe, law enforcement and international law. He
is also a member of ENISA’s Permanent Stakeholder Group and the program advisory
board of the Cyber Akademie.

Philipp’s professional experience is complemented by a PhD degree and a Master’s
degree in business informatics from the University of Vienna. He also holds an
MSc in Forensic Computing and Cybercrime Investigation from the University
College Dublin, where he graduated at the top of his class.

CHAPTER 22

WHY SECURE AVAILABILITY—NOT COMPLIANCE—SHOULD BE EVERY BUSINESS LEADER’S GOAL

Danny McPherson

Executive Vice President and Chief Security Officer, Verisign

×

As senior vice president and chief security officer (CSO), Danny McPherson is
responsible for all aspects of Verisign’s information systems and services, as
well as information and corporate security. Additionally, he represents Verisign
in key forums focused on critical infrastructure, engineering, research,
security, and online trust. With over 20 years of experience in the internet
network operations, security, and telecommunications industries, McPherson
brings tremendous technical leadership and operational expertise to the company.

Prior to joining Verisign, McPherson was vice president and CSO at Arbor
Networks, where he developed solutions to detect and mitigate cyberattacks.
Before that, he held technical leadership positions in architecture, engineering
and operations with Amber Networks, Qwest Communications, Genuity, MCI
Communications, and the U.S. Army Signal Corps.

McPherson has actively participated in internet operations and standardization
since the early 1990s. He is currently a member of the Internet Corporation for
Assigned Names and Numbers (ICANN) Security and Stability Advisory Committee
(SSAC) and has served on the Internet Architecture Board (IAB), the Internet
Research Steering Group (IRSG), the U.S. Federal Communications Commission’s
(FCC) Communications Security, Reliability and Interoperability Council (CSRIC),
and the U.S. Department of Homeland Security’s Cybersecurity Subcommittee, as
well as the Online Trust Alliance (OTA) Board of Directors. He has chaired an
array of Internet Engineering Task Force (IETF) and other working groups and
committees in these and related forums.

McPherson is an active contributor in the network and security operations and
research communities and has authored several books, numerous internet protocol
standards, network and security research papers, and other publications.

CHAPTER 23

WHY CORPORATE GOVERNANCE MATTERS SO MUCH IN CYBERSECURITY

Paul Jackson

Managing Director, Asia-Pacific Leader, Cyber Risk, Kroll

×

Paul Jackson is a Managing Director and Asia-Pacific Leader for Kroll’s Cyber
Security and Investigations Practice, based in the Hong Kong office. Over a
career spanning more than 25 years of service in some of the region’s highest
levels of law enforcement and corporate enterprise, Paul has earned a stellar
record of achievement as a cyber security practitioner, strategist, and thought
leader. In addition to possessing deep knowledge regarding the region’s diverse
geopolitical and cultural complexities, Paul has developed a highly nuanced view
of global cyber security challenges from working with organizations such as
Interpol, the U.S. Secret Service’s Electronic Task Force, and Microsoft’s
Digital Crimes Consortium.

Paul started his career with the Hong Kong Police Force, and over 22 years, he
rose through the ranks to become Chief Inspector and Head of the IT Forensics
Practice, Investigation Team, and Training in the force’s Technology Crime
Division. In this role, he led multiple teams of cyber investigators, computer
forensics examiners, and police college trainers, and was policy manager for
digital evidence for the entire police force of 27,000 members. His
accomplishments included overseeing the design and construction of a
multimillion-dollar project to build the IT forensic laboratory and all
associated IT security infrastructure; heading an internal “think tank” that
provided top-level police management with strategic planning and policies
relating to technology crime trends and IT security matters; leading the
government incident response capability against cyber threats to critical
infrastructure during major events such as the Olympics, WTO meeting, ITU
Conference, and East Asian Games; and implementing an innovative incident
response methodology for live (compromised) system analysis, which was
ultimately adopted by Interpol and police forces worldwide.

During his tenure, Paul was also appointed by Interpol as course director for
the Asia-Pacific Region to develop and deliver IT investigation and forensics
training to law enforcement. His design and management of an advanced training
facility for the HKPF was later used as a template by Interpol and the Korean
Police University. Paul brought to these training efforts a wide range of
practical, frontline experience from his earlier roles as Head of the Computer
Security Unit in the Crime Prevention Bureau, Head of the Telecommunications
Liaison Office in the Criminal Intelligence Bureau, and a uniformed officer for
eight years.

After leaving the HKPF in 2010, Paul became APAC Head of Fraud and High Tech
Investigations for JP Morgan Chase Bank, and from 2012-2014, he relocated to New
York where he served as the bank’s Global Head of High- Tech/Cyber
Investigations. In this role, Paul managed a global team of cyber investigators
and responders throughout the United States, Europe, and Asia, focused on
addressing the pressing needs of managing the evolving threats faced by a global
financial institution. Executing on these objectives involved, among other
efforts, redesigning global cyber laboratories and introducing new forensic
technologies to enhance the efficiency and capacity of the team. In addition to
serving as a strategy leader, Paul personally conducted numerous investigations,
successfully resolving several major incidents that included, among others, a
well-publicized breach, data exposure, reputational issues, employee misconduct,
insider threat, and electronic fraud.

Prior to joining Kroll, Paul was APAC Managing Director for Stroz Friedberg. In
this role, Paul developed several of the firm’s products and services with an
APAC focus, and personally led client engagements in cyber security assessments,
C-level cyber incident table-top exercises, and data breach investigations. He
also served as a thought leader and represented the firm in numerous venues,
forums, and major public events.

CHAPTER 24

COMPLIANCE IS NOT A CYBERSECURITY STRATEGY

Mark Gosling

Vice President, Internal Audit, Palo Alto Networks

×

Mark Gosling is the Vice President Internal Audit at Palo Alto Networks, where
he leads the company’s internal audit, Sarbanes-Oxley compliance, and enterprise
risk management programs. In addition to assessing risks, risk management
practices and controls on behalf of the Company’s Board, Mark’s role requires
close coordination of work with multiple stakeholder groups to develop and
implement optimal risk management approaches across the enterprise.

Before joining Palo Alto Networks, Mark served as Vice President Internal Audit
at NetApp and at VeriSign, and as a partner at PricewaterhouseCoopers
specializing in internal audit, compliance and risk management services for
technology companies. His career spans over 30 years, with 22 of those spent in
Silicon Valley.

Mark holds a Bachelor of Science degree in production engineering from the
University of Birmingham, UK, and is a Chartered Accountant.


PART 3


MAKE SURE YOU’RE COVERED TODAY

chapters 25-44

CHAPTER 25

WELCOME TO THE FRONTLINES OF BUSINESS AND CYBERSECURITY

Pablo Emilio Tamez López

Chief Information Security Officer, Tecnológico de Monterrey

×

As Chief Information Security Officer of Tecnológico de Monterrey, Pablo Tamez
has designed and led the cybersecurity strategy and is responsible for the
security of all Institutions which includes Higher Education, Health Care and
Retail sectors. Thought understanding of the risk landscape and security
solutions and services has constructed a centralized security architecture for
all the institutions capable of attend the security needs regarding corporate
governance, data privacy, vulnerability management, infrastructure protection,
breach response and awareness.

He has collaborated over 14 years in different companies of the private sector,
having a deep understanding of IT and Security Operations, Mr. Tamez has worked
in the security operations forefront and has led the security technologies and
services evaluation program, security operation center and incident response.

CHAPTER 26

PREPARING FOR THE COMING TECHNOLOGY TSUNAMI

William Dixon

Head of Centre for Cybersecurity, World Economic Forum

×

William Dixon is the Head of the Centre for Cybersecurity at the World Economic
Forum, focusing on the impact of next generation technology on the security, and
risk landscape. Previously, he was Global Head of Intelligence at Barclays, and
held leadership roles in the UK Civil Service.

CHAPTER 26

PREPARING FOR THE COMING TECHNOLOGY TSUNAMI

Greg Day

Vice President and Chief Security Officer, EMEA, Palo Alto Networks

×

Greg Day is Vice President and Chief Security Officer for EMEA at Palo Alto
Networks. He is also Chair for the global CSO community I-4 members advisory
committee, Chair TechUK Cybersecurity AI Working Group, and member of the World
Economic Forum’s Centre for Cyber Security. He previously held leadership roles
at FireEye, Symantec and McAfee.

CHAPTER 27

HOW TO ARTICULATE THE BUSINESS VALUE OF CYBERSECURITY

Mark Rasch

Cybersecurity and Privacy Attorney

×

Mark Rasch is a lawyer and computer security and privacy expert and an expert in
risk mitigation in Bethesda, Maryland. where he helps develop strategy and
messaging for the Information Security team.

Rasch’s career spans more than 25 years of corporate and government
cybersecurity, computer privacy, regulatory compliance, probabilistic risk
assessment, resilience, computer forensics and incident response. Earlier in his
career, Rasch was with the U.S. Department of Justice where he led the
department’s efforts to investigate and prosecute cyber and high-technology
crime, starting the computer crime unit within the Criminal Division’s Fraud
Section, efforts which eventually led to the creation of the Computer Crime and
Intellectual Property Section of the Criminal Division. He was responsible for
various high-profile computer crime prosecutions, including Kevin Mitnick, Kevin
Poulsen and Robert Tappan Morris. Mark is a frequent commentator in the media on
issues related to information security, appearing on BBC, CBC, Fox News, CNN,
NBC News, ABC News, the New York Times, the Wall Street Journal and many other
outlets.

CHAPTER 28

LANGUAGE, PLEASE: HOW YOU TALK TO BOARDS AND EXECUTIVES CAN MAKE OR BREAK YOUR
CYBERSECURITY

James Shira

Principle, Global, and U.S. Chief Information and Technology Officer
PricewaterhouseCoopers

×

James joined PricewaterhouseCoopers (PwC) in May of 2015 in the newly
established role of Network Chief Information Security Officer (CISO). The
Network CISO has been charged with leading a broad information security
transformation program across the PwC Network of Firms. Since this programs
launch in summer of 2015 significant progress has been made both in the US firm
and across the PwC member firm network. PwC Network Information Security or NIS
has established itself as an engablement function at PwC which makes an impact.

Prior to PwC, James was at Zurich Insurance Group where he started in early 2009
as the role of Head of Group IT Risk Americas. In the autumn of 2010 he was
promoted to the newly created role of Group Chief Information Security Officer.
During his tenure at Zurich, James transformed Zurich's information security
posture, developing new and innovative solutions and capabilities, leading the
Data Security Improvement initiative on behalf of the Group Executive Committee,
and working to enable Zurich employees to work in new and modern ways while
remaining secure. Prior to Zurich, James was the Chief Security Officer for
American General Financial Services (AGFS), a subsidiary of AIG. At AGFS, James
built the first security function at the company and helped shape and guide
overall security strategy at AIG. Prior to working at AIG, James was the
America’s CISO for Bank Julius Baer. While at Julius Baer, James established the
CISO role in the Americas and worked closely with Global CISO in establishing
the strategy for the information security program across the company.

James is known across the Information Security industry as change and action
oriented executive who thrives on tackling large scale challenges. Furthermore
he is also known for his approaches to people management, emerging technology
and tight integration with business strategy. In 2014, James’ transformation of
Zurich’s information security program won the ‘RSA Excellence in the field of
Information Security’ award. This award is given to the top executive in the
information security industry determined by a judging committee of industry
peers.

Outside of work James has been married to his wife Kristine since 2005. They’ve
lived in a number of places both in the US and abroad but now call Los Angeles
home since 2013. James and Kristine have two children. Jaclyn who is 3 ½ and
Finn who is 6 months. They live in Hermosa Beach which is near LAX. Beyond
family and work, James is passionate automotive enthusiast. He maintains several
vintage Porsche’s. In addition James likes to cycle and work out and is a fan of
California wine.

CHAPTER 29

TO GET AHEAD OF CYBERSECURITY THREATS, FOCUS ON PREPAREDNESS AND SUSTAINABILITY

Heather King

Former Acting Senior Director for Cybersecurity Policy, White House, National
Security Council Staff

×

Heather King presently serves as the Chief Operating Officer at the Cyber Threat
Alliance (CTA). CTA works to improve the cybersecurity of our global digital
ecosystem by enabling real-time, high-quality cyber threat information sharing
among companies and organizations in the cybersecurity field. Prior to joining
the CTA in August 2017, Heather served as the Acting Senior Director for
Cybersecurity Policy at the White House National Security Council (NSC) staff
where she was responsible for working with Federal departments and agencies on
key domestic national cybersecurity strategy and policy. Prior to that, Heather
served on the NSC staff in several roles from April 2013 to April 2017,
including Deputy Executive Secretary, Director of Critical Infrastructure
Cybersecurity, and Director of National Preparedness Policy. Before the NSC
staff, she served in a variety of roles at the Federal and state levels,
including the Department of Homeland Security, Federal Emergency Management
Agency, Virginia Department of Emergency Management, and Virginia State Police.
Heather holds an M.S. in Global Security from Virginia Polytechnic Institute and
State University and is pursuing an M.S. in Management of Information Technology
at the University of Virginia.

CHAPTER 29

TO GET AHEAD OF CYBERSECURITY THREATS, FOCUS ON PREPAREDNESS AND SUSTAINABILITY

Megan Stifel

Executive Director, Americas, Global Cyber Alliance

×

Megan Stifel is Executive Director, Americas, Global Cyber Alliance. She has
previously held cybersecurity leadership posts at the U.S. National Security
Council and the U.S. Department of Justice.

CHAPTER 30

LEARNING AND LEVERAGING THE WISDOM OF “SO WHAT?”

Gary McAlum

Chief Security Officer, USAA

×

Gary McAlum serves as Chief Security Officer of United Services Automobile
Association. His responsibilities include: Information Security, Privacy,
Financial Fraud Prevention & Recovery, Physical Security Operations, Corporate
Investigations, and Business Continuation. Prior to USAA, he served 25 years in
the US Air Force and a short time with Deloitte & Touche, LLP.

Throughout his military career, he worked in a variety of leadership and staff
positions within the information technology career field including:
telecommunications, satellite communications, network operations, and
information security. Gary was on the front line of military cyberspace
operations where he supported the establishment and evolution of the Joint Task
Force Global Network Operations, the organization that was the focal point for
the operation and security of DoD information systems and networks. During this
time, he was frequently called upon to provide cyber threat insights to a wide
variety of interagency forums, including the US-China Economic and Security
Review Commission, the President's National Cyber Study Group, and Congressional
testimony.

Gary holds a B.A. in Mathematics from The Citadel, an M.S. in Management
Information Systems from the University of Arizona, and an M.S. from the
National Defense University. He is a Certified Information Systems Security
Professional (CISSP), a Certified Fraud Examiner (CFE), and has completed the
NACD Cyber Risk Oversight certification course, Wharton Security Executive
Development Program and the FBI CISO Academy. He currently serves on the board
of the Internet Security Alliance (ISA) where he contributed to the development
of the “Cyber-Risk Handbook” that is promoted by the National Association of
Corporate Directors (NACD).

CHAPTER 31

HOW TO OPTIMIZE CYBERSECURITY USING MEASUREMENT

Richard Seiersen

Chief Executive Officer, Soluble.ai

×

Richard Seiersen is co-founder and CEO of Soluble. Prior to that, he spent 20
years deep in the salt mines of security operations and development. Along the
way, he became a serial CISO with stints at LendingClub, Twilio and GE. But he
got his start in security startups building vulnerability management products
for companies like Qualys and Tripwire. He’s also the co-author of “How To
Measure Anything In Cybersecurity Risk,” and the forthcoming “The Metrics
Manifesto: Confronting Security With Data.”

CHAPTER 32

MAKING CYBERSECURITY THE SMART INVESTMENT IN AN ERA OF ECONOMIC UNCERTAINTY

Matt Gyde

President and Chief Executive Officer, Security Division, NTT

×

Matt Gyde is President and Chief Executive Officer at NTT’s Security Division,
where he is also the representative director on NTT Security’s board of
directors. In his nearly 25 years in the cybersecurity industry, he has held
leadership positions at Dimension Data, Datacraft, Surf Control and Secure
Computing.

CHAPTER 33

ZERO TRUST: THE STRATEGIC APPROACH TO STOP DATA BREACHES

John Kindervag

Field Chief Technology Officer, Palo Alto Networks

×

John Kindervag joined Palo Alto Networks as Field CTO in 2017 after eight and
one-half years at Forrester Research where he was a Vice President and Principal
Analyst on the Security and Risk Team. John is considered one of the world’s
foremost cybersecurity experts. He is best known for creating the revolutionary
Zero Trust Model of Cybersecurity.

Zero Trust is widely embraced by companies as diverse as Coca Cola, Google, and
WestJet Airlines. Notably, the US House of Representatives is recommending that
all government agencies adopt Zero Trust in the wake of the OPM Data Breach.
Additionally, Chairman Jason Chaffettz wrote a bylined article in Federal News
Radio endorsing Zero Trust. These recommendations have led to increasing
adoption of Zero Trust within the United States Federal Government.

He currently advises both public and private sector organizations with the
design and building of Zero Trust Networks and other Cybersecurity topics. He
holds, or has held, numerous industry certifications, including QSA, CISSP, CEH,
and CCNA. John has a practitioner background, having served as a security
consultant, penetration tester, and security architect. He has particular
expertise in the areas of secure network design, wireless security, and
voice-over-IP hacking. He has been interviewed and published in numerous
publications, including The Wall Street Journal, Forbes, and The New York Times.
He has also appeared on television networks such as CNBC, Fox News, PBS, and
Bloomberg discussion information security topics. John has spoken at many
security conferences and events, including RSA, SXSW, ToorCon, ShmoCon, InfoSec
Europe, and InfoSec World. John has a Bachelor of Arts degree in communications
from the University of Iowa and lives in Dallas, TX.

CHAPTER 34

MAKING BOARDROOM CHANGES TODAY TO ENSURE A CYBER-SECURE TOMORROW

Kal Bittianda

Head of North America Technology Practice, Egon Zehnder

×

Based in New York, Kal Bittianda is a trusted advisor for helping companies and
leaders leverage and harness technology. As the leader of Egon Zehnder's North
America Technology Practice, he works closely with companies in the mobility,
communication, systems, software, and technology-enabled service sectors. He
also conducts executive search for chief technology, data, and information
security officers.

Before joining Egon Zehnder, Kal led business units for Kyriba (enterprise cloud
solutions), EXL (knowledge and business process outsourcing), and Inductis
(analytics consulting and services). As a Consulting Partner at Azendant and
Inductis, Kal advised C-level executives on growth strategies. Previously he was
an Engagement Manager at the Mitchell Madison Group. Kal began his career in
technology and leadership roles at Unisys and International Paper.

Kal earned a BTech in naval architecture from the Indian Institute of
Technology, in Madras/Chennai, in India, an MA in industrial engineering from
Purdue University, and an MBA from Harvard Business School. He advises nonprofit
organizations and early-stage companies in the New York area, also investing in
some of the latter. Kal has two young daughters and enjoys exploring new places
in other countries, running in marathons, and following his favorite sports
teams and athletes.

CHAPTER 34

MAKING BOARDROOM CHANGES TODAY TO ENSURE A CYBER-SECURE TOMORROW

William Houston

Advisor, Technology and Communications & Industrial Practices, Egon Zehnder

×

Will Houston, based in Washington, D.C., has more than 20 years of experience in
the industrial and technology sectors, the military, and federal government. He
is active in Egon Zehnder's Technology and Communications and Industrial
practices.

Prior to joining Egon Zehnder, Will was a Head of Strategic Partner Development
in Google's Emerging Business Development group. Previously, Will served as the
Director of Policy and Planning for Customs and Border Protection in the U.S.
Department of Homeland Security and as a consultant with Diamond Technology
Partners, where he advised Fortune 500 clients on digital strategy. Will began
his career as an Army Intelligence Officer, serving four years on active duty.
He continues to serve as a Reservist and is a Lieutenant Colonel in Cyber
Command.

Will earned an AB from Princeton University, an MBA from the Wharton School, and
a master's in international relations and economics from the Johns Hopkins
School of Advanced International Studies. He was also a Fellow with the Robert
Bosch Foundation in Berlin and serves on the advisory board of the Alumni &
Friends of Princeton University ROTC. He is a passionate outdoorsman who loves
duck hunting and fly fishing.

CHAPTER 35

RECOGNIZING, DEVELOPING, AND DEPLOYING GOOD CYBERSECURITY HABITS

George Finney

Chief Security Officer, Southern Methodist University

×

George Finney is the Chief Security Officer for Southern Methodist University
and the author of “No More Magic Wands: Transformative Cybersecurity Change for
Everyone.” He has also taught Corporate Cybersecurity and Information Assurance
in the SMU School of Engineering. Before joining SMU, George worked with several
startups and global telecommunications firms designing networks, writing policy,
hardening servers, and educating users. George received his J.D. from Southern
Methodist University's Dedman School of Law and his B.A. in mathematics and
philosophy from St. John's College in Santa Fe, New Mexico.  George is a member
of the Texas CISO Council, a governing body member of the Evanta CISO Coalition,
and an advisory board member for SecureWorld. George is an licensed attorney in
the state of Texas, a Certified Information Privacy Professional, a Certified
Information Security Manager, as well as a Certified Information Security
Systems Professional and is a frequent speaker on Cybersecurity topics across
the country. His blog can be found at www.strongestelement.com where he writes
on topics focusing on improving Cybersecurity awareness through a unique
approach that combines neuroscience, psychology, and wellness.

CHAPTER 36

SOCIAL ENGINEERING ATTACKS: WE’RE ALL TARGETS

Yorck O.A. Reuber

Chief Information Technology Officer, Allianz Malaysia

×

Yorck O.A. Reuber is Chief Information Technology Officer at Allianz Malaysia.
Previously he was Chief Technology Officer for AXA IT. A certified Navy Chief
Engineering Officer, Yorck formerly held senior-level positions at IBM, Verizon,
and T-Systems.

CHAPTER 37

HOW TO MANAGE A DATA BREACH

Lisa J. Sotto

Partner and Chair of the Global Privacy and Cybersecurity Practice, Hunton
Andrews Kurth LLP

×

Lisa Sotto chairs the top-ranked Global Privacy and Cybersecurity practice at
Hunton Andrews Kurth. She is the managing partner of the firm’s New York office
and serves on the firm’s Executive Committee. Lisa has received widespread
recognition for her work in the areas of privacy and cybersecurity and was named
among the National Law Journal’s “100 Most Influential Lawyers.” She also serves
as Chairperson of the Department of Homeland Security’s Data Privacy and
Integrity Advisory Committee.

CHAPTER 38

INCIDENT RESPONSE: HOW TO DEAL WITH A CYBERATTACK

Andreas Rohr

Chief Technology Officer, Deutsche Cyber-Sicherheitsorganisation GmbH

×

Dr. Andreas Rohr is founding manager and Chief Technology Officer at the German
Cyber Security Organization GmbH. In this role, he leads cyber defense services
and security engineering for the operative business. Previously, he worked in
management positions at RWE and Volkswagen and before that was responsible for
Federal Ministry of Defense, including forensics management and auditing
security and business-critical processes and IT systems.

CHAPTER 39

DON’T WAIT FOR A BREACH TO BUILD YOUR COMMUNICATIONS STRATEGY

Robert Boyce

Managing Director, Accenture Security, Accenture

×

Robert is a Managing Director in Accenture’s Global Cybersecurity practice.
Robert responsible for growth and development of Accenture’s the Cyber Threat
Operations capabilities. He also provides hands-on consulting services to the
Global 2000 in the ares of advanced security operations, crisis preparedness and
response, and cyber defense and protection strategies.

Robert has a degree in Computer Science from University of New Brunswick.

CHAPTER 39

DON’T WAIT FOR A BREACH TO BUILD YOUR COMMUNICATIONS STRATEGY

Justin Harvey

Managing Director, Accenture Security, Accenture

×

More than 20 years of information security experience and technical knowledge
has established Justin Harvey as a trusted cyber threat security advisor to
executives and government leaders at some of the world’s largest commercial and
government organizations. His work with major global entities has taken him
across Asia to lead large-scale incident response efforts in the wake of
targeted attacks, to the Middle East to advise enterprises and ministries of
defense on threat intelligence and persistent threats, and to Australia to
direct security operations.

At Accenture, Justin is the global lead for the FusionX Incident Response
Practice; providing security thought leadership, acts as a strategic advisor on
cyberespionage, cyberwar and cybercrime to our global client base, and serves as
executive sponsor for research initiatives within Accenture Security. Prior to
joining Accenture, Justin was the CSO of Fidelis Cybersecurity after spending
time as the vice president and CTO of Global Solutions at FireEye. Prior, at
Mandiant, he worked with industry executives, thought leaders, analysts and
partners to influence the company’s industry position, shape product direction
and develop strategic partnerships.

Previously, as Chief Solutions Strategist with HP Enterprise Security, Justin
provided strategic consulting to C-level management at leading companies. At
CPSG Partners Consulting, a U.S.-based systems integrator, Justin led the
western U.S. region in delivering large-scale security projects to Fortune 100
companies. Earlier in his career, Justin provided network and system security
expertise at GTE Internetworking (now Verizon), DIGEX, Sun Microsystems,
Excite@Home and other organizations.

In 2015, Justin testified before the United States Senate Judiciary Committee’s
Subcommittee on Privacy, Technology and the Law on the topic of data brokerage
firms and consumer data security.

Justin regularly speaks at industry conferences. As a sought-after expert on
data breaches, cyberespionage and cybercrime, Justin provides commentary to
top-tier online, print and broadcast news outlets, including ABC News, BBC News,
Newsweek, The Guardian, Politico, eWeek, CSO, Financial Times, The New York
Times, U.S. News & World Report, Federal Computer Week, Reuters and the
Associated Press.

Justin is a Certified Information Systems Security Professional (CISSP) and
received advanced SCADA Red Team/Blue Team Training for critical infrastructure
threats, attacks and response from the U.S. Department of Homeland Security.

CHAPTER 40

MAKING CYBER INSURANCE A STRATEGIC TOOL IN REDUCING RISK AND IMPROVING
RESILIENCE

Robert Parisi

Managing Director and U.S. Cyber Product Leader, Marsh

×

Robert Parisi is a managing director and National Cyber Product Leader in
Marsh’s New York City headquarters. His current responsibilities include
advising clients on issues related to intellectual property, technology,
privacy, and cyber related risks as well as negotiating with the carriers on
terms and conditions. Robert is also responsible for coordinating Marsh’s Global
Cyber Network.

Prior to joining Marsh, Robert was the senior vice president and Chief
Underwriting Officer (CUO) of eBusiness Risk Solutions at AIG. Robert joined AIG
in 1998 as legal counsel for its Professional Liability group and held several
executive and legal positions, including CUO for Professional Liability and
Technology. While at AIG, Robert oversaw the creation and drafting of
underwriting guidelines and policies for all lines of Professional Liability.
Robert was also instrumental in the development of specialty reinsurance to
address aggregation of risk issues inherent in cyber, privacy and technology
insurance. In addition to working with AIG, Robert has also been in private
practice, principally as legal counsel to various Lloyds of London syndicates.

While at Marsh, Robert has worked extensively with Marsh clients in all
industries, assisting them in analysis of their risk as well as in the placement
of coverage for cyber and privacy risks.

CHAPTER 41

HOW YOU SHOULD USE CYBERSECURITY TECHNOLOGY TO IMPROVE BUSINESS OUTCOMES

Naveen Zutshi

Senior Vice President and Chief Information Officer, Palo Alto Networks

×

Naveen Zutshi joined Palo Alto Networks as Sr. Vice President and Chief
Information Officer in December 2015. In this role he is responsible for Palo
Alto Network’s Information technology solutions, driving a comprehensive
strategy for information technology that will help scale the company rapidly,
deliver on innovative solutions globally, and build a world class IT
organization.

Naveen’s experience spans applications, software development, infrastructure and
leading organizations in large scale enterprises to small startups. Prior to
Palo Alto Networks, Naveen was Senior Vice President, Technology at Gap Inc.
responsible for the company’s infrastructure, operations, and information
security organizations. Before Gap, Naveen spent three years as Vice President,
Technology and Operations for Encover, a SaaS CRM company. In this role, Naveen
was responsible for developing and bringing to market Service SaaS software.
Prior to Encover, Naveen spent seven years with Cisco, serving in both
infrastructure and applications roles with an emphasis on sales productivity and
infrastructure automation. Prior to Cisco, Naveen spent six years with Wal-Mart,
serving in a variety of IT/development positions including responsible for
building applications that connected buyers to hundreds of thousands of
suppliers worldwide.

He earned a BE in Computer Engineering from Bangalore University and an MBA from
University of Arkansas.

CHAPTER 42

WHEN IT COMES TO SHADOW IT, WHAT YOU DON’T KNOW— AND DON’T PREPARE FOR—CAN HURT
YOU

Alice Cooper

Global Head of Derivative Trade Processing IT, BNP Paribas CIB

×

Alice Cooper is Global Head of Derivative Trade Processing IT at BNP Paribas
CIB. She has held a wide range of responsibilities at BNP Paribas across a
number of IT functions for trades processing, credit, and equity. Previously,
she worked at Mitsubishi Bank and Citibank.

CHAPTER 43

UNLOCKING PRODUCTIVITY WITH SECURITY

Siân John

MBE — Chief Security Advisor, Microsoft

×

Siân John is an executive security advisor in the enterprise cybersecurity group
at Microsoft. Siân has worked in cyber security since 1997, and has worked at
the Houses of Parliament, Ubizen and Symantec.

In her current role Siân works with Microsoft’s UK customers to help them to
develop their cyber security strategy, security best practices and to understand
how Microsoft’s technology and services can help support digital transformation
and cloud services.

Siân is passionate in advocating the role that Cyber Security must play in
enabling the modern digital economy. Over more than 20 years she has worked with
customers across the public and private sector to help them understand their
risk posture and practical steps then can take to manage it.

Siân is the chair of the Digital Economy Programme Advisory Board for the
Engineering and Physical Sciences Research Council and a member of the TechUK
cybersecurity management committee.

Siân was made an MBE for services to Cyber Security in the New Years Honours
List for 2018.

CHAPTER 44

HOW WE CAN CHANGE OUR APPROACH TO CYBERSECURITY TODAY

Nir Zuk

Founder and Chief Technology Officer, Palo Alto Networks

×

Nir Zuk brings a wealth of network security expertise and industry experience to
Palo Alto Networks. Prior to co-founding Palo Alto Networks, Nir was CTO at
NetScreen Technologies, which was acquired by Juniper Networks in 2004. Prior to
NetScreen, Nir was co-founder and CTO at OneSecure, a pioneer in intrusion
prevention and detection appliances. Nir was also a principal engineer at Check
Point Software Technologies, and was one of the developers of stateful
inspection technology.




GET THE BOOK

Get Your Digital Copy


PDF EPub for e-readers Mobi for e-readers Physical Book
×

Navigating the Digital Age, Second Edition is published by Palo Alto Networks.
As a company, alleviating the problem of cybercrime is at the heart of
everything we do. Our goal is to offer cybersecurity education and training to
students of all backgrounds around the globe through the Global Cybersecurity
Education Fund. Every action we take, and your readership of this book, gets us
one step further on our mission to protect our way of life in the Digital Age.

All proceeds for sale on Amazon.com will go toward this fund.




LATEST ARTICLES

May 3, 2022 / by Ed Harris

THE KEYS TO CISO ROLE SUCCESS—PART TWO: ELEVATING YOUR STATURE

May 3, 2022 / by Ed Harris

THE KEYS TO CISO ROLE SUCCESS—PART ONE: ENTERING A NEW ROLE

Apr 14, 2022 / by Krishnan Chellakarai

HOW GREATER DIVERSITY CAN HELP FILL THE CYBER TALENT GAP

Apr 8, 2022 / by Unit 42

WHAT EXECUTIVES NEED TO KNOW ABOUT SPRINGSHELL (AKA SPRING4SHELL)

Feb 16, 2022 / by Derrick Lowe

MAKING CYBER RESILIENCY A PRIORITY IN HEALTHCARE: MY ADVICE FOR LEADERS

Feb 1, 2022 / by Gary Johnson

WE ALL NEED A STRONGER CYBERSECURITY POSTURE. HERE’S HOW. (HINT: FIRST, IT’S A
MINDSET)

Feb 1, 2022 / by Tarun Khandelwal

THE MACHINES ARE COMING: FINANCIAL SERVICES CAN REDUCE THE BLAST SURFACE WITH
ZERO TRUST

Feb 1, 2022 / by Gemma Garcia Godall

AN ANTIDOTE TO STRESS IN CYBERSECURITY

Get the latest actionable insights on Security Roundtable


 * 
 * 

 * About Us
 * Terms
 * Privacy
 * Contact

powered by

 * 
 * 
 * 
 * 
 * 



×
We Value Your Privacy
Settings
NextRoll, Inc. ("NextRoll") and our advertising partners use cookies and similar
technologies on this site and use personal data (e.g., your IP address). If you
consent, the cookies, device identifiers, or other information can be stored or
accessed on your device for the purposes described below. You can click "Allow
All" or "Decline All" or click Settings above to customize your consent.
NextRoll and our advertising partners process personal data to: ● Store and/or
access information on a device; ● Create a personalized content profile; ●
Select personalised content; ● Personalized ads, ad measurement and audience
insights; ● Product development. For some of the purposes above, our advertising
partners: ● Use precise geolocation data. Some of our partners rely on their
legitimate business interests to process personal data. View our advertising
partners if you wish to provide or deny consent for specific partners, review
the purposes each partner believes they have a legitimate interest for, and
object to such processing.
If you select Decline All, you will still be able to view content on this site
and you will still receive advertising, but the advertising will not be tailored
for you. You may change your setting whenever you see the Manage consent
preferences on this site.
Decline All
Allow All
Manage consent preferences