www.securityroundtable.org
Open in
urlscan Pro
104.90.160.217
Public Scan
Submitted URL: http://navigatingthedigitalage.com/
Effective URL: https://www.securityroundtable.org/navigating-the-digital-age-3rd-edition/
Submission: On May 17 via api from US — Scanned from DE
Effective URL: https://www.securityroundtable.org/navigating-the-digital-age-3rd-edition/
Submission: On May 17 via api from US — Scanned from DE
Form analysis
1 forms found in the DOMPOST https://start.paloaltonetworks.com/index.php/leadCapture/save2
<form action="https://start.paloaltonetworks.com/index.php/leadCapture/save2" method="POST" class="form-book col-sm-12">
<input type="hidden" name="type" value="pdf">
<input type="hidden" name="ip" value="104.143.83.241, 2.17.100.189">
<input type="hidden" name="date" value="2022/05/16">
<input type="hidden" name="formid" value="1086">
<input type="hidden" name="formVid" value="1086">
<input type="hidden" name="munchkinId" value="531-OCS-018">
<input type="hidden" name="lpId" value="45206">
<input id="field40" type="hidden" name="fwdURL" value="https://securityroundtable.org/ndte/NTDA-Edition-3.pdf">
<input id="field40" type="hidden" name="followUpUrl" value="">
<input type="text" name="FirstName" placeholder="First Name" required="">
<input type="text" name="LastName" placeholder="Last Name" required="">
<input type="email" name="Email" placeholder="Business Email" required="">
<input type="text" name="Title" placeholder="Job Title" required="">
<input type="text" name="Company" placeholder="Company" required="">
<input type="text" name="Phone" placeholder="Phone" required="">
<!-- <input type="text" name="Country" placeholder="Country" required> -->
<select name="Country" id="country" required="">
<option value="United States">United States</option>
<option value="Afghanistan">Afghanistan</option>
<option value="Aland Islands">Aland Islands</option>
<option value="Albania">Albania</option>
<option value="Algeria">Algeria</option>
<option value="American Samoa">American Samoa</option>
<option value="Andorra">Andorra</option>
<option value="Angola">Angola</option>
<option value="Anguilla">Anguilla</option>
<option value="Antigua And Barbuda">Antigua And Barbuda</option>
<option value="Argentina">Argentina</option>
<option value="Armenia">Armenia</option>
<option value="Aruba">Aruba</option>
<option value="Australia">Australia</option>
<option value="Austria">Austria</option>
<option value="Azerbaijan">Azerbaijan</option>
<option value="Bahamas">Bahamas</option>
<option value="Bahrain">Bahrain</option>
<option value="Bangladesh">Bangladesh</option>
<option value="Barbados">Barbados</option>
<option value="Belarus">Belarus</option>
<option value="Belgium">Belgium</option>
<option value="Belize">Belize</option>
<option value="Benin">Benin</option>
<option value="Bermuda">Bermuda</option>
<option value="Bhutan">Bhutan</option>
<option value="Bolivia">Bolivia</option>
<option value="Bosnia And Herzegovina">Bosnia And Herzegovina</option>
<option value="Botswana">Botswana</option>
<option value="Brazil">Brazil</option>
<option value="British Indian Ocean Territory">British Indian Ocean Territory</option>
<option value="Brunei Darussalam">Brunei Darussalam</option>
<option value="Bulgaria">Bulgaria</option>
<option value="Burkina Faso">Burkina Faso</option>
<option value="Burundi">Burundi</option>
<option value="Cambodia">Cambodia</option>
<option value="Cameroon">Cameroon</option>
<option value="Canada">Canada</option>
<option value="Cape Verde">Cape Verde</option>
<option value="Cayman Islands">Cayman Islands</option>
<option value="Central African Republic">Central African Republic</option>
<option value="Chad">Chad</option>
<option value="Chile">Chile</option>
<option value="China">China</option>
<option value="Christmas Island">Christmas Island</option>
<option value="Cocos (Keeling) Islands">Cocos (Keeling) Islands</option>
<option value="Colombia">Colombia</option>
<option value="Comoros">Comoros</option>
<option value="Congo">Congo</option>
<option value="Cook Islands">Cook Islands</option>
<option value="Costa Rica">Costa Rica</option>
<option value="Cote D'Ivoire">Cote D'Ivoire</option>
<option value="Croatia">Croatia</option>
<option value="Curacao">Curacao</option>
<option value="Cyprus">Cyprus</option>
<option value="Czech Republic">Czech Republic</option>
<option value="Denmark">Denmark</option>
<option value="Djibouti">Djibouti</option>
<option value="Dominica">Dominica</option>
<option value="Dominican Republic">Dominican Republic</option>
<option value="Ecuador">Ecuador</option>
<option value="Egypt">Egypt</option>
<option value="El Salvador">El Salvador</option>
<option value="Equatorial Guinea">Equatorial Guinea</option>
<option value="Eritrea">Eritrea</option>
<option value="Estonia">Estonia</option>
<option value="Ethiopia">Ethiopia</option>
<option value="Falkland Islands (Malvinas)">Falkland Islands (Malvinas)</option>
<option value="Faroe Islands">Faroe Islands</option>
<option value="Fiji">Fiji</option>
<option value="Finland">Finland</option>
<option value="France">France</option>
<option value="French Guiana">French Guiana</option>
<option value="French Polynesia">French Polynesia</option>
<option value="French Southern and Antarctic Lands">French Southern and Antarctic Lands</option>
<option value="Gabon">Gabon</option>
<option value="Gambia">Gambia</option>
<option value="Gaza">Gaza</option>
<option value="Georgia">Georgia</option>
<option value="Germany">Germany</option>
<option value="Ghana">Ghana</option>
<option value="Gibraltar">Gibraltar</option>
<option value="Greece">Greece</option>
<option value="Greenland">Greenland</option>
<option value="Grenada">Grenada</option>
<option value="Guadeloupe">Guadeloupe</option>
<option value="Guam">Guam</option>
<option value="Guatemala">Guatemala</option>
<option value="Guernsey">Guernsey</option>
<option value="Guinea">Guinea</option>
<option value="Guinea-Bissau">Guinea-Bissau</option>
<option value="Guyana">Guyana</option>
<option value="Haiti">Haiti</option>
<option value="Heard Island And Mcdonald Islands">Heard Island And Mcdonald Islands</option>
<option value="Holy See (Vatican City State)">Holy See (Vatican City State)</option>
<option value="Honduras">Honduras</option>
<option value="Hong Kong">Hong Kong</option>
<option value="Hungary">Hungary</option>
<option value="Iceland">Iceland</option>
<option value="India">India</option>
<option value="Indonesia">Indonesia</option>
<option value="Iraq">Iraq</option>
<option value="Ireland">Ireland</option>
<option value="Isle Of Man">Isle Of Man</option>
<option value="Israel">Israel</option>
<option value="Italy">Italy</option>
<option value="Jamaica">Jamaica</option>
<option value="Japan">Japan</option>
<option value="Jersey">Jersey</option>
<option value="Jordan">Jordan</option>
<option value="Kazakhstan">Kazakhstan</option>
<option value="Kenya">Kenya</option>
<option value="Kiribati">Kiribati</option>
<option value="Kosovo">Kosovo</option>
<option value="Kuwait">Kuwait</option>
<option value="Kyrgyzstan">Kyrgyzstan</option>
<option value="Laos">Laos</option>
<option value="Latvia">Latvia</option>
<option value="Lebanon">Lebanon</option>
<option value="Lesotho">Lesotho</option>
<option value="Liberia">Liberia</option>
<option value="Libya">Libya</option>
<option value="Liechtenstein">Liechtenstein</option>
<option value="Lithuania">Lithuania</option>
<option value="Luxembourg">Luxembourg</option>
<option value="Macao">Macao</option>
<option value="Macedonia">Macedonia</option>
<option value="Madagascar">Madagascar</option>
<option value="Malawi">Malawi</option>
<option value="Malaysia">Malaysia</option>
<option value="Maldives">Maldives</option>
<option value="Mali">Mali</option>
<option value="Malta">Malta</option>
<option value="Marshall Islands">Marshall Islands</option>
<option value="Martinique">Martinique</option>
<option value="Mauritania">Mauritania</option>
<option value="Mauritius">Mauritius</option>
<option value="Mayotte">Mayotte</option>
<option value="Mexico">Mexico</option>
<option value="Micronesia">Micronesia</option>
<option value="Moldova">Moldova</option>
<option value="Monaco">Monaco</option>
<option value="Mongolia">Mongolia</option>
<option value="Montenegro">Montenegro</option>
<option value="Montserrat">Montserrat</option>
<option value="Morocco">Morocco</option>
<option value="Mozambique">Mozambique</option>
<option value="Myanmar">Myanmar</option>
<option value="Namibia">Namibia</option>
<option value="Nauru">Nauru</option>
<option value="Nepal">Nepal</option>
<option value="Netherlands">Netherlands</option>
<option value="Netherlands Antilles">Netherlands Antilles</option>
<option value="New Caledonia">New Caledonia</option>
<option value="New Zealand">New Zealand</option>
<option value="Nicaragua">Nicaragua</option>
<option value="Niger">Niger</option>
<option value="Nigeria">Nigeria</option>
<option value="Niue">Niue</option>
<option value="Norfolk Island">Norfolk Island</option>
<option value="Northern Mariana Islands">Northern Mariana Islands</option>
<option value="Norway">Norway</option>
<option value="Oman">Oman</option>
<option value="Pakistan">Pakistan</option>
<option value="Palau">Palau</option>
<option value="Palestine">Palestine</option>
<option value="Panama">Panama</option>
<option value="Papua New Guinea">Papua New Guinea</option>
<option value="Paraguay">Paraguay</option>
<option value="Peru">Peru</option>
<option value="Philippines">Philippines</option>
<option value="Pitcairn Islands">Pitcairn Islands</option>
<option value="Poland">Poland</option>
<option value="Portugal">Portugal</option>
<option value="Puerto Rico">Puerto Rico</option>
<option value="Qatar">Qatar</option>
<option value="Reunion">Reunion</option>
<option value="Romania">Romania</option>
<option value="Russia">Russia</option>
<option value="Rwanda">Rwanda</option>
<option value="Saint Helena">Saint Helena</option>
<option value="Saint Kitts And Nevis">Saint Kitts And Nevis</option>
<option value="Saint Lucia">Saint Lucia</option>
<option value="Saint Pierre And Miquelon">Saint Pierre And Miquelon</option>
<option value="Saint Vincent And The Grenadines">Saint Vincent And The Grenadines</option>
<option value="Samoa">Samoa</option>
<option value="San Marino">San Marino</option>
<option value="Sao Tome And Principe">Sao Tome And Principe</option>
<option value="Saudi Arabia">Saudi Arabia</option>
<option value="Senegal">Senegal</option>
<option value="Serbia">Serbia</option>
<option value="Seychelles">Seychelles</option>
<option value="Sierra Leone">Sierra Leone</option>
<option value="Singapore">Singapore</option>
<option value="Slovakia">Slovakia</option>
<option value="Slovenia">Slovenia</option>
<option value="Solomon Islands">Solomon Islands</option>
<option value="Somalia">Somalia</option>
<option value="South Africa">South Africa</option>
<option value="South Korea">South Korea</option>
<option value="Spain">Spain</option>
<option value="Sri Lanka">Sri Lanka</option>
<option value="Suriname">Suriname</option>
<option value="Svalbard And Jan Mayen">Svalbard And Jan Mayen</option>
<option value="Swaziland">Swaziland</option>
<option value="Sweden">Sweden</option>
<option value="Switzerland">Switzerland</option>
<option value="Taiwan">Taiwan</option>
<option value="Tajikistan">Tajikistan</option>
<option value="Tanzania">Tanzania</option>
<option value="Thailand">Thailand</option>
<option value="Timor-Leste">Timor-Leste</option>
<option value="Togo">Togo</option>
<option value="Tokelau">Tokelau</option>
<option value="Tonga">Tonga</option>
<option value="Trinidad And Tobago">Trinidad And Tobago</option>
<option value="Tunisia">Tunisia</option>
<option value="Turkey">Turkey</option>
<option value="Turkmenistan">Turkmenistan</option>
<option value="Turks And Caicos Islands">Turks And Caicos Islands</option>
<option value="Tuvalu">Tuvalu</option>
<option value="Uganda">Uganda</option>
<option value="Ukraine">Ukraine</option>
<option value="United Arab Emirates">United Arab Emirates</option>
<option value="United Kingdom">United Kingdom</option>
<option value="United States Minor Outlying Islands">United States Minor Outlying Islands</option>
<option value="Uruguay">Uruguay</option>
<option value="Uzbekistan">Uzbekistan</option>
<option value="Vanuatu">Vanuatu</option>
<option value="Venezuela">Venezuela</option>
<option value="Vietnam">Vietnam</option>
<option value="Virgin Islands, British">Virgin Islands, British</option>
<option value="Virgin Islands, U.S.">Virgin Islands, U.S.</option>
<option value="Wallis And Futuna">Wallis And Futuna</option>
<option value="West Bank">West Bank</option>
<option value="Western Sahara">Western Sahara</option>
<option value="Yemen">Yemen</option>
<option value="Zambia">Zambia</option>
<option value="Zimbabwe">Zimbabwe</option>
</select>
<select name="state" id="state">
<option value="AK">Alaska</option>
<option value="AL">Alabama</option>
<option value="AR">Arkansas</option>
<option value="AZ">Arizona</option>
<option value="CA">California</option>
<option value="CO">Colorado</option>
<option value="CT">Connecticut</option>
<option value="DC">D.C.</option>
<option value="DE">Delaware</option>
<option value="FL">Florida</option>
<option value="GA">Georgia</option>
<option value="HI">Hawaii</option>
<option value="IA">Iowa</option>
<option value="ID">Idaho</option>
<option value="IL">Illinois</option>
<option value="IN">Indiana</option>
<option value="KS">Kansas</option>
<option value="KY">Kentucky</option>
<option value="LA">Louisiana</option>
<option value="MA">Massachusetts</option>
<option value="MD">Maryland</option>
<option value="ME">Maine</option>
<option value="MI">Michigan</option>
<option value="MN">Minnesota</option>
<option value="MO">Missouri</option>
<option value="MS">Mississippi</option>
<option value="MT">Montana</option>
<option value="NC">North Carolina</option>
<option value="ND">North Dakota</option>
<option value="NE">Nebraska</option>
<option value="NH">New Hampshire</option>
<option value="NJ">New Jersey</option>
<option value="NM">New Mexico</option>
<option value="NV">Nevada</option>
<option value="NY">New York</option>
<option value="OH">Ohio</option>
<option value="OK">Oklahoma</option>
<option value="OR">Oregon</option>
<option value="PA">Pennsylvania</option>
<option value="PR">Puerto Rico</option>
<option value="RI">Rhode Island</option>
<option value="SC">South Carolina</option>
<option value="SD">South Dakota</option>
<option value="TN">Tennessee</option>
<option value="TX">Texas</option>
<option value="UT">Utah</option>
<option value="VA">Virginia</option>
<option value="VT">Vermont</option>
<option value="WA">Washington</option>
<option value="WI">Wisconsin</option>
<option value="WV">West Virginia</option>
</select>
<div class="checkbox-holder mt-20">
<input type="checkbox" name="mktoOptIn" id="mktoOptIn" value="1" style="display:inline-block; width:30px; float:left; clear:none;">
<p for="mktoOptIn">Please check the box if you wish to opt-in specifically to marketing communications from Palo Alto Networks.</p>
</div>
<p class="privacy-area pb-0 pt-10">By submitting this form, you agree to our <a href="https://www.securityroundtable.org/terms/" style="color:#F05B33" target="_blank">Terms of Use</a> and acknowledge our
<a href="https://www.paloaltonetworks.com/legal-notices/privacy" style="color:#F05B33;" target="_blank">Privacy Statement</a></p>
<div class="modal-footer">
<div class="g-recaptcha mb-15 d-flex justify-content-center" data-callback="captchaComplete" data-sitekey="6LcWUAoUAAAAAPE9HFfO3AXw9E_gja4MLHG03mor">
<div style="width: 304px; height: 78px;">
<div><iframe title="reCAPTCHA"
src="https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LcWUAoUAAAAAPE9HFfO3AXw9E_gja4MLHG03mor&co=aHR0cHM6Ly93d3cuc2VjdXJpdHlyb3VuZHRhYmxlLm9yZzo0NDM.&hl=de&v=0aeEuuJmrVqDrEL39Fsg5-UJ&size=normal&cb=x47px0f6lhc3"
width="304" height="78" role="presentation" name="a-fouzv21l0t7d" frameborder="0" scrolling="no" sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"></iframe>
</div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
</div><iframe style="display: none;"></iframe>
</div>
<input type="submit" class="button-modal-form" value="Download">
<button class="btn" data-dismiss="modal" aria-label="Close">Cancel</button>
</div>
</form>
Text Content
___ NAVIGATING THE DIGITAL AGE Get Your Copy THE DEF INITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Third Edition A collection of 50 global thought leaders and visionaries centered on doing business in the Digital Age – from addressing disruptions caused by COVID-19, to driving digital transformation through innovation, to fostering a mutual understanding between technical and non-technical executives when it comes to existential issues surrounding cybersecurity. Get Your Copy GET YOUR DIGITAL COPY United States Afghanistan Aland Islands Albania Algeria American Samoa Andorra Angola Anguilla Antigua And Barbuda Argentina Armenia Aruba Australia Austria Azerbaijan Bahamas Bahrain Bangladesh Barbados Belarus Belgium Belize Benin Bermuda Bhutan Bolivia Bosnia And Herzegovina Botswana Brazil British Indian Ocean Territory Brunei Darussalam Bulgaria Burkina Faso Burundi Cambodia Cameroon Canada Cape Verde Cayman Islands Central African Republic Chad Chile China Christmas Island Cocos (Keeling) Islands Colombia Comoros Congo Cook Islands Costa Rica Cote D'Ivoire Croatia Curacao Cyprus Czech Republic Denmark Djibouti Dominica Dominican Republic Ecuador Egypt El Salvador Equatorial Guinea Eritrea Estonia Ethiopia Falkland Islands (Malvinas) Faroe Islands Fiji Finland France French Guiana French Polynesia French Southern and Antarctic Lands Gabon Gambia Gaza Georgia Germany Ghana Gibraltar Greece Greenland Grenada Guadeloupe Guam Guatemala Guernsey Guinea Guinea-Bissau Guyana Haiti Heard Island And Mcdonald Islands Holy See (Vatican City State) Honduras Hong Kong Hungary Iceland India Indonesia Iraq Ireland Isle Of Man Israel Italy Jamaica Japan Jersey Jordan Kazakhstan Kenya Kiribati Kosovo Kuwait Kyrgyzstan Laos Latvia Lebanon Lesotho Liberia Libya Liechtenstein Lithuania Luxembourg Macao Macedonia Madagascar Malawi Malaysia Maldives Mali Malta Marshall Islands Martinique Mauritania Mauritius Mayotte Mexico Micronesia Moldova Monaco Mongolia Montenegro Montserrat Morocco Mozambique Myanmar Namibia Nauru Nepal Netherlands Netherlands Antilles New Caledonia New Zealand Nicaragua Niger Nigeria Niue Norfolk Island Northern Mariana Islands Norway Oman Pakistan Palau Palestine Panama Papua New Guinea Paraguay Peru Philippines Pitcairn Islands Poland Portugal Puerto Rico Qatar Reunion Romania Russia Rwanda Saint Helena Saint Kitts And Nevis Saint Lucia Saint Pierre And Miquelon Saint Vincent And The Grenadines Samoa San Marino Sao Tome And Principe Saudi Arabia Senegal Serbia Seychelles Sierra Leone Singapore Slovakia Slovenia Solomon Islands Somalia South Africa South Korea Spain Sri Lanka Suriname Svalbard And Jan Mayen Swaziland Sweden Switzerland Taiwan Tajikistan Tanzania Thailand Timor-Leste Togo Tokelau Tonga Trinidad And Tobago Tunisia Turkey Turkmenistan Turks And Caicos Islands Tuvalu Uganda Ukraine United Arab Emirates United Kingdom United States Minor Outlying Islands Uruguay Uzbekistan Vanuatu Venezuela Vietnam Virgin Islands, British Virgin Islands, U.S. Wallis And Futuna West Bank Western Sahara Yemen Zambia Zimbabwe Alaska Alabama Arkansas Arizona California Colorado Connecticut D.C. Delaware Florida Georgia Hawaii Iowa Idaho Illinois Indiana Kansas Kentucky Louisiana Massachusetts Maryland Maine Michigan Minnesota Missouri Mississippi Montana North Carolina North Dakota Nebraska New Hampshire New Jersey New Mexico Nevada New York Ohio Oklahoma Oregon Pennsylvania Puerto Rico Rhode Island South Carolina South Dakota Tennessee Texas Utah Virginia Vermont Washington Wisconsin West Virginia Please check the box if you wish to opt-in specifically to marketing communications from Palo Alto Networks. By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement Cancel ABOUT THE BOOK > PART 1 > > THE FUTURE OF THREAT AND RISKS > > Seizing the opportunities, confronting the challenges > PART 2 > > LESSONS FROM AROUND THE WORLD > > Cybersecurity awareness, understanding and leadership > PART 3 > > MAKE SURE YOU’RE COVERED TODAY > > Best practices on people, process and technology CONTRIBUTORS AND CHAPTERS PART 1 THE FUTURE OF THREAT AND RISKS chapters 1-11 PREFACE Nikesh Arora Chief Executive Officer and Chairman, Palo Alto Networks × Nikesh Arora is Chief Executive Officer and Chairman of Palo Alto Networks. Previously, he was President and Chief Operating Officer of SoftBank Group Corp., and Senior Vice President and Chief Business Officer at Google. CHAPTER 01 ENSURING A SAFE, SECURE, AND PEOPLE-CENTERED INTERNET Vint Cerf Vice President and Chief Internet Evangelist, Google × Vinton G. Cerf is Vice President and Chief Internet Evangelist at Google. Known as a “Father of the Internet,” Cerf is co-designer of the TCP/IP protocols and architecture of the Internet. He has received numerous awards, including the U.S. National Medal of Technology, ACM Alan M. Turing award and the Presidential Medal of Freedom. CHAPTER 02 FORGET ABOUT THE NEW NORMAL. WE’RE IN THE NEW NOW. Bruce T. Crawford Retired Chief Information Officer, U.S. Army, Department of Defense × Lieutenant General Bruce T. Crawford recently culminated 34 years of service as the Army Chief Information Officer, serving as the senior government official responsible for policy and oversight of the Army’s $12.B IT portfolio. Other key assignments include senior cybersecurity and enterprise IT positions in every major theater of operations at the strategic, operational, and tactical levels. Bruce now serves on the advisory boards of Rubrick Inc, and CyberArk. CHAPTER 03 WHY OUR DIGITAL DNA MUST EVOLVE—QUICKLY Salim Ismail Founder, ExO Foundation; Board Member, XPRIZE × Best-Selling Author of Exponential Organizations; XPRIZE Foundation Board member; Founding Executive Director of Singularity University; Chairman of ExO Works; Founder, The ExO Foundation; Former Vice President of Yahoo!’s Brickhouse; AION Advisory Board member; and General Partner of Rokk3r Fuel ExO Venture Fund. Salim Ismail is the best-selling author of Exponential Organizations, a sought-after business strategist, and a renowned entrepreneur with ties to Yahoo!, Google, and Singularity University. He consults with governments and the world’s Fortune 1000 companies on innovation, institutional change and growth. Ismail has been profiled in media outlets like The New York Times, Bloomberg BusinessWeek, Fortune, Forbes, WIRED, Vogue, and the BBC. Ismail travels extensively sharing a global perspective on the impact of breakthrough technologies. His book quickly reached No. 1 on Amazon’s “Best-Sellers in Business Management,” and was also named Frost & Sullivan’s “Growth, Innovation and Leadership Book of the Year.” In presentations, he shares how any company, from a startup to a multinational, can streamline its performance and grow 10x faster than its peers. Audiences receive a tailored action plan, a new process for leading-edge thinking, and an understanding of what emerging technology trends mean for their future. Ismail’s captivating, educational, and downright jaw-dropping presentations have been called “mind-blowing” and “the best talk I’ve ever heard.” Salim founded ExO Works in 2016 to transform global business by catapulting organizations into the world of exponential thinking. ExO Works delivers a 10-week program based on concepts detailed in Exponential Organizations that fast forwards an enterprise’s mindset by two years by removing the barriers to innovation. Just as ExO Works is the face of the future of management consulting, Ismail founded The Fastrack Institute, a non-profit dedicated to accelerating technology into society. Ismail spent eight years as Singularity University’s founding Executive Director and global ambassador. SU’s goal is to “educate, inspire and empower a new generation of leaders to apply exponential technologies to address humanity’s grand challenges.” SU, whose founders hail from Google and the XPRIZE Foundation, has empowered thousands of people from more than 85 countries to apply disruptive technologies – biotechnology, artificial intelligence, and neuroscience – to more than 100 startups and countless patents and ideas. Prior to Singularity, Ismail was a vice president at Yahoo, where he built and ran Brickhouse, the company’s internal incubator. His last company, Ångströ, a news aggregation startup, was sold to Google in 2010. He has founded or operated seven early-stage companies including PubSub Concepts, which laid some of the foundation for the real-time web, and the New York Grant Company, a direct response to 9/11. In its first year, the organization attracted over 400 clients and delivered over $12 million of federal grants to the local Lower Manhattan economy. In 2017, at its fourth annual benefit gala, Endeavor Miami, the first U.S. affiliate of Endeavor, a global non-profit organization that has advised and helped scale more than 800 high-impact companies in 26 countries around the world, honored Ismail with its 2017 Impact Award. CHAPTER 04 THE EXHILARATING, EXCITING, AND SOBERING WORLD OF THE INTERNET OF THINGS: IMAGINE THE OPPORTUNITIES, AND REALIZE THE RISKS Jennifer Steffens Chief Executive Officer, IOActive × Jennifer Sunshine Steffens is the Chief Executive Officer of IOActive, a global consulting firm dedicated to making the world a safer place. She spearheads IOActive’s global business operations, drives the company’s strategic vision and leads IOActive’s team of world-renowned cybersecurity researchers. Under her leadership, IOActive has expanded its service offerings across all technical and advisory services to ensure its research helps improve customers’ security posture as well as the state of security globally. In addition, Jennifer helped pioneer IOActive’s Securing Smart Cities non-profit, which serves as a resource for companies, governments, and individuals to navigate the complexity of securing a smart city. Jennifer is an active member of the Executive Women’s Forum, the Information Security Systems Association and the Open Web Application Security Project. Lauded by Forbes, The Wall Street Journal, Information Security Magazine, and many more, she received SC Magazine’s Reboot Leadership Award for Top Management in 2017 and CV Magazine’s IT Security CEO of the Year 2018. She serves as a judge for the TechTrailblazers and DUO Women in Security awards and is a frequent speaker at leading industry conferences worldwide. Jennifer brings nearly 20 years of experience in the security industry. Prior to IOActive, she held leadership positions at ground breaking companies such as Sourcefire and NFR Security. CHAPTER 05 HOW DATA GRIDS WILL POWER THE ECONOMY AND INFLUENCE OUR FUTURE Rama Vedashree Chief Executive Officer, Data Security Council of India × Prior to moving to DSCI she was Vice President, NASSCOM leading all initiatives in Domestic IT, eGovernance and Smart Cities among others. At NASSCOM, she has also led the Healthcare initiative in partnership with apex Health Sector body, NATHEALTH and the NASSCOM-DSCI Cyber Security Task Force. DSCI under her leadership is pursuing a Cyber Security Industry growth charter to make India into a global hub for cyber security and grow to 35B$ by 2025. With a rich and varied experience of 28 years in the Industry, she has had long stints at NIIT Technologies, Microsoft and General Electric. Her previous roles include that of Director in Microsoft Global Services, and Vice President, GE India. She has experience in the diverse domains of IT consulting, Strategic Accounts and Business Development, e-Governance projects and Business Development for Infrastructure projects and Health and Water Sectors at GE. She is member of many committees of Government of India, including the Data Protection Committee, Cloud Expert Group and Financial Inclusion Advisory Board. A Gold Medalist from University of Hyderabad, she has also completed an Executive Education program from Harvard, and a short program in High Performance Computing from Cornell University. CHAPTER 06 THE FUTURE OF CLOUD Ann Johnson Corporate Vice President, Cybersecurity Solutions, Microsoft × Ann Johnson leads Enterprise & Cybersecurity at Microsoft. The focus of her organization is to lead global enterprises on their secure digital transformation journey. Ann is a recognized sales and operations industry leader with a proven track record for building and leading high-performing global enterprise software go-to-market teams. Ann has a background in cybersecurity, infrastructure and storage and is a frequent speaker on topics of online banking fraud, information security, healthcare security, mobile security, workforce diversity, privacy and compliance. Before joining Microsoft, Ann was CEO at Boundless, an open source geospatial software and services provider. Prior to Boundless, Ann was President and COO of Qualys, Inc., a provider of cloud security and compliance solutions. Prior to Qualys, Ann was Vice President of World Wide Sales/IPV and Global Accounts at RSA Security LLC, a subsidiary of EMC Corporation which provides solutions to protect customer online identities and digital assets. Ann is a graduate of Weber State University in Utah where she completed a dual major in political science and communications. She currently serves on the board of the Security Advisor Alliance and as Board Advisor to the biometric security firm HYPR. CHAPTER 07 UNDERSTANDING THE EXCITING, EXPONENTIAL, AND TERRIFYING FUTURE OF CYBERSECURITY Marc Goodman Author and Global Security Advisor × Marc Goodman is a New York Times Best-Selling author, global strategist and consultant focused on the profound change technology is having on security, business and international affairs. He is the founder of the Future Crimes Institute and currently serves as the Chair for Policy, Law and Ethics at Silicon Valley’s Singularity University. Over the past twenty years, he has built his expertise in international cyber crime and terrorism working with organizations such as INTERPOL, the UN Counterterrorism Task Force, NATO and the US Government. Goodman frequently advises industry leaders, security executives, start-ups and global policy makers on transnational cyber risk and intelligence and has operated in more than 75 countries around the world. His professional experiences include working as a street police officer, undercover investigator and counter-terrorism strategist, as well as briefing myriad cabinet ministers and heads of government, including the White House. Goodman’s current areas of research include the security implications of emerging technologies such as artificial intelligence, big data, robotics, crypto-currencies, synthetic biology, virtual reality and the Internet of Things. CHAPTER 08 DEALING WITH THE EVOLVING ADVERSARY MINDSET James C. Trainor Senior Vice President, Cyber Solutions Group, Aon × James C. Trainor is Senior Vice President within Aon’s Cyber Solutions Group. Mr. Trainor joined Aon in October 2016 after a distinguished career at the Federal Bureau of Investigation, where he most recently led the Cyber Division at FBI Headquarters. Mr. Trainor played a critical role in devising the FBI’s national strategy to combat cyber-crime and was the senior FBI executive responsible for all cyber investigations. During his three year tenure in the Cyber Division, Mr. Trainor led FBI Agents and Analysts in every major high-profile cyber investigation involving the FBI. In his new role, Mr. Trainor will help shape Aon’s overall cyber strategy on behalf of clients, working closely with colleagues across technology, system integration, risk transfer and advisory to ensure a holistic and integrated approach. Mr. Trainor joined the FBI as a Special Agent in 1996. Over his twenty year FBI career, he served in both overseas and domestic assignments focused on cyber, counterintelligence, counterterrorism, intelligence and criminal matters. He has served in field assignments in Chicago; New Haven, CT; Boston; New York City and at FBI Headquarters in Washington, D.C. Mr. Trainor is a graduate of Assumption College in Worcester, Massachusetts and obtained a Master’s in Public Administration from the University of Connecticut. He also completed a Chief Information Security Officer (CISO) and Chief Risk Officer (CRO) Certificate Program at Carnegie Mellon University and has GIAC certifications in GISP, GSLC and GISF. Mr. Trainor is the recipient of the 2016 Presidential Rank Award, the 2016 FCW Federal 100 in Information Technology, and was recognized by Security Magazine in 2017 as Most Influential in Security. CHAPTER 09 THE EVOLVING ROLE OF THE CISO: FROM RISK MANAGER TO BUSINESS ENABLER Justin Somaini Chief Security Officer, Unity Technologies × Justin Somaini is Chief Security Officer at Unity Technologies. Prior to joining Unity, he was Chief Security Officer at SAP, Chief Trust Officer at Box, and held the role of Chief Information Security Officer at Yahoo, Symantec, Verisign, and Charles Scwab. CHAPTER 10 THE GREAT RESET: THE FUTURE OF WORK AND CYBERSECURITY Gary A. Bolles Chair for the Future of Work, Singularity University × Gary A. Bolles is an internationally-recognized expert and lecturer on the future of work and of learning. His focus is on strategies for helping individuals, organizations, communities and countries to thrive in the digital work economy. As a partner in the boutique consulting agency Charrette LLC, he helps clients to identify and understand trends affecting organizations and markets, through innovation consulting, strategic conferences, strategy design charrettes, and collaborative initiatives. As Chair for the Future of Work for Singularity University, he leads the organization’s efforts to empower a global community to create an abundant future of work and learning. And as co-founder of eParachute.com, he helps job-hunters & career changers, from youth to 50+, with online and in-person programs inspired by “What Color Is Your Parachute?”, the best-selling career book of all time. Bolles has also authored a series of video courses on the future of work for LinkedIn Learning/Lynda.com, and writes on LinkedIn. CHAPTER 11 THE ETHICS OF TECHNOLOGY AND THE FUTURE OF HUMANITY Gerd Leonhard Author; Executive “Future Trainer;” Strategist; Chief Executive Officer, The Futures Agency × Gerd Leonhard is a widely-known and top-rated futurist, with over 1500 engagements in 50+ countries since 2004 and a combined audience of over 1 million people. Gerd focusses on near-future, ‘nowist’ observations and actionable foresights in the sectors of humanity, society, business and commerce, media, technology and communications. Gerd is also an influential author, a sought-after executive ‘future trainer’ and a trusted strategic advisor. He is the co-author of the best-selling book The Future of Music and the author of 5 other books including ‘The Humanity Challenge’ (June 2016). Gerd is also the host of the web-TV series TheFutureShow and the CEO of TheFuturesAgency, a global network of over 30 leading futurists. Gerd is considered a leading voice on a wide range of topics including digital transformation and the opportunity-challenges of the coming exponential society, a sustainable business and cultural ecology, social media and communications, TV / film, radio and broadcasting futures, mobile content and commerce, innovation, leadership and entrepreneurship, ‘hard-future’ consumer trends, human-machine futures and AI, cognitive computing, the IoT, big data and automation, next-generation advertising, marketing and branding, as well as sustainability and related ‘green future’ topics. In 2006, The Wall Street Journal called Gerd ‘one of the leading Media Futurists in the World’. In 2015, Wired Magazine listed Gerd as #88 of the top 100 influencers in Europe. He’s #21 on the global list of futurists. Gerd's keynotes, speeches and presentations are renowned for their hard-hitting and provocative yet inspiring, often humorous and always personal motivational style. Gerd is highly regarded as a global influencer and has advised many business leaders and government officials around the globe. His diverse client list of over 300 companies includes UBS, Mastercard, Unilever, Lloyds Bank, WWF, Nokia, The Guardian, Google, Sony, Telkom Indonesia, Siemens, RTL, ITV, BBC, France Telecom, Orange, Deutsche Telekom, MTN, The Financial Times, DDB, Ogilvy, Omnicom, IPG, The EU Commission, Mandarin Oriental Hotel Group, VISA, and many others PART 2 LESSONS FROM AROUND THE WORLD chapters 13-24 CHAPTER 12 IF YOU’RE NOT COLLABORATING WITH COLLEAGUES AND COMPETITORS ON CYBER THREAT INTELLIGENCE, BEWARE: THE BAD GUYS ARE WAY AHEAD OF YOU Sherri Ramsay Cybersecurity Consultant; Former Director of the U.S. National Security Agency × Sherri Ramsay is currently a Consultant, engaged in strategy development and planning, coaching, partnership development, and marketing and development of security operations centers. She is a member of the Board of Advisors for the Hume Research Center at Virginia Tech and a member of the Board of Advisors for TruSTAR Technology. Ms. Ramsay is the former Director of the National Security Agency/Central Security Service Threat Operations Center (NTOC) and a former member of the Armed Forces Communications Electronic Administration (AFCEA) Board of Directors. As the NTOC Director, she led discovery and characterization of threats to national security systems, providing situational awareness for those threats, and coordinating actionable information to counter those threats to the DOD, DHS and FBI. At NSA, she also served as a senior leader in the Signals Intelligence Directorate, the Technology Directorate and the Information Assurance Directorate. Prior to joining NSA, she taught high school mathematics. Ms. Ramsay received the Department of Defense Distinguished Civilian Service Award (the highest award given to a DoD civilian), the Exceptional Civilian Service Award (the highest award given to an NSA civilian), the NSA Meritorious Civilian Service Award twice (the second highest award given to an NSA civilian), the Presidential Rank Award, the National Intelligence Meritorious Unit Citation, the Louis Tordella Award, and the Armed Forces Communications Electronic Administration (AFCEA) Meritorious Service to the Intelligence Community Award. She received the Women’s Leadership Award from the Congressional Bipartisan SMART (Strengthening the Mid-Atlantic Region for Tomorrow) caucus. Ms. Ramsay graduated Magna Cum Laude with General Honors from the University of Georgia with a Bachelor of Science degree in Mathematics and Education. She graduated with Honors from the Johns Hopkins University with a Master’s Degree in Computer Science. She graduated from the Industrial College of the Armed Forces (ICAF), National Defense University, with a Master’s in National Resource Strategy. She received a Certificate in Leadership from the University of Virginia. CHAPTER 13 PARTNERING TO SECURE A NEW FORM OF CRITICAL INFRASTRUCTURE Ryan Gillis Vice President for Cybersecurity Strategy and Global Policy, Palo Alto Networks × Ryan works with governments, companies and organizations around the world to develop and implement strategies, policies and operational partnerships that prevent successful cyberattacks. He oversees the company’s involvement in public-private cybersecurity exercises, and is responsible for expanding cyberthreat information sharing relationships with various government organizations. Additionally, Ryan leads the company’s global public policy efforts and oversees government affairs around the world. Prior to joining Palo Alto Networks, Ryan spent nearly 15 years in government, and with technology and defense companies. Most recently, Ryan served as a cybersecurity official on the U.S. National Security Council staff at the White House, and more than a decade in various positions across the Department of Homeland Security during both Republican and Democratic administrations. Ryan is a member of the Council on Foreign Relations and the World Economic Forum’s expert network supporting the growth of a secure and reliable Industrial Internet of Things (IIoT). In 2016, he also served on the CSIS Cyber Policy Task Force to develop recommendations for the incoming U.S. administration, and he participated in the U.S.-Australia Diplomatic Track 1.5 Cyber Dialogue. Ryan is an elected member of the executive committee of the U.S. Information Technology Sector Coordinating Council. He is also a recipient of the National Security Council’s “Outstanding Service Award,” and the 2017 Federal Computer Week “Fed 100” award. Ryan is a graduate of Georgetown University. CHAPTER 13 PARTNERING TO SECURE A NEW FORM OF CRITICAL INFRASTRUCTURE Sean Morgan Director of Cybersecurity Policy and Partnerships, Palo Alto Networks × Sean Morgan is Director for Cybersecurity Policy and Partnerships at Palo Alto Networks. He has also held positions in cybersecurity at the U.S. National Security Council and the Department of Defense. CHAPTER 14 THE VALUE OF BEING PREPARED FOR ANYTHING Mario Chiock Schlumberger Fellow and CISO Emeritus, Schlumberger × Mario Chiock possesses over 37 years of experience in Oil Field operations, IT, Security, Risk, Privacy and Auditing. Prior to his current role as Chief Security Officer & Schlumberger Fellow, Mario was the CISO at Schlumberger where he was responsible for developing the company’s worldwide, long-term cyber security strategy. He is recognized for his leadership and management in all aspects of cybersecurity throughout the company as well as within the community. Through his vision, he successfully transitioned Schlumberger from legacy firewalls to a more robust infrastructure based on next-generation firewalls. His experience in successfully deploying advanced technologies and approaches also spans Incident Response, Advance Threat Prevention, Digital Right Management to watermark & fingerprint sensitive documents. He also implemented federation services to minimize 3rd party risk and created the extended security team to foster collaboration with other IT groups. Mario is also known for applying his Lean Six Sigma expertise for measuring performance and creating dashboards that have led to more simple operations and reduction of waste. Outside of Schlumberger, Mario has been an active member of the Information Systems Security Association (ISSA) for over 20 years; he has held numerous board positions in the Austin, Capital of Texas Chapter, as well as the South Texas Chapter in Houston. He was president of the South Texas Chapter in 2007, bringing in the “Chapter of the Year” award. He continues to serve on the board. Mario is also an active volunteer trainer for Security Certifications such as CISM, CISA & CRISC certifications, and has mentored many successful CSO & CISO in Austin & Houston area. He is also very active with Evanta as speaker and instructor for their CISO Institute. In 2015 he was a speaker for the SPE and API conference and in 2016 he was a panelist at the GEO2016 conference in Bahrain. Mario was recognized as one of the top 25 out of more than 10,000 security executives in the ExecRank 2013 Security Executive Rankings, he also won the 2012 Central Information Security Executive (ISE) “People Choice Award”, in 2014 he is a recipient of the CSO40 – 2014 award, named “ISSA Fellow”, won ISC2 Americas Information Security Leadership Awards (ISLA) and won the “ISSA Honor Roll” award. In 2017 he received the Infragard Houston award of excellence for the Private-Public Partnership in Cybersecurity. He is an active member of the Houston Security community and gives security talks, training and volunteers his IT security expertise to local non-profit organizations. He is currently a board member of the Houston InfraGard Chapter, has served in Executive & Technical Advisory boards of many security companies such as WatchFire (Now IBM), ISS (now IBM), Qualys, and currently is active on the Palo Alto Networks advisory board, he is also serving in the Google Cloud Platform advisory board and strategic advisor to Onapsis as well as Board member. Mario has a CISSP, CISM & CISA Certifications, and is past chair for the American Petroleum Institute Information (API) Security Sub-Committee and was involved in the formation of the Oil & Gas ISAC. CHAPTER 15 REACTING TO CYBER ATTACKS DOESN’T WORK: WHY YOU NEED A PROACTIVE APPROACH Yang Zhoulong Vice President and Board Director, Yunda Group × Dr. Yang Zhoulong is Vice President and Chief Technology Officer of Yunda Group. He is also the Deputy Chairman of China E-Commerce Logistic Industry Alliance, and the Logistics Information Expert of China Federation of Logistics and Purchasing. He has been working as an IT professional in the financial service industry and e-commerce logistics for 20 years. CHAPTER 16 THE PATH TO A SUCCESSFUL CLOUD TRANSFORMATION Mike Towers Chief Information Security Officer, Takeda Pharmaceuticals International × Mike Towers is the Chief Information Security Officer at Takeda Pharmaceuticals International. He has worked in life sciences technology for over 25 years, leading global security functions since 2008. He is a regular speaker on digital trust, information risk and cybersecurity. He has received four Information Security Executive of the Year awards within the healthcare industry and serves on the board of the Health Information Security and Analysis Center. CHAPTER 17 HOW TO BUILD AND DEPLOY AN AUTONOMOUS SOC John Paul Lonie Head of Security Operations, Iress × John Paul Lonie is the Head of Security Operations at Iress. He has spent the past 25 years in financial services starting in development and IT operations and the last 12 years in a variety of information security roles. CHAPTER 18 SECURITY TRANSFORMATION AS A BUSINESS IMPERATIVE John Scimone Senior Vice President and Chief Security Officer, Dell × John Scimone serves as Sr. Vice President, Chief Security Officer for Dell, where he leads the company’s global corporate security program. John’s responsibilities span the full spectrum of strategy, planning, and operations, aiding Dell’s businesses in the management of security risk across the physical and cyber domains. He is also charged with the advocacy of business resilience, including crisis management, business continuity and disaster recovery. Before joining Dell, John served as the Global Chief Information Security Officer for the Sony Group family of companies, where he was responsible for building Sony’s first global information security and privacy organization and leading strategy, policy, and operations. Prior to joining Sony, he also held a number of leadership positions at the U.S. Department of Defense, including as Director of Security Operations for the Secretary of Defense's communications office, where he led the facility, personnel, and cyber security programs. John formerly served as a member of a predecessor organization of U.S. Cyber Command, where he led the development of enterprise information security programs that protected information belonging to the DoD’s more than two million employees. John holds a Bachelor of Science degree in Computer Science, with a specialization in Information Assurance, from the Georgia Institute of Technology. He also earned a Master of Arts degree in Strategic Intelligence, with a specialization in Counterintelligence, from the Institute of World Politics in Washington D.C. CHAPTER 19 AN ANTIDOTE TO STRESS IN CYBERSECURITY Gemma Garcia Godall Founder, Instituto de Inteligencia Emocional × Gemma Garcia Godall is the Founder of Instituto de Inteligencia Emocional, where she guides leaders, teams and organizations to shine through cultural transformation projects. Previously, she was the Chief Executive Officer of a leading player in the financial services industry. CHAPTER 20 THE IMPORTANCE OF CYBERSECURITY PREPARATION AND LEADERSHIP Stephen Moore Vice President and Chief Security Strategist, Exabeam × Stephen Moore is the Vice President and Chief Security Strategist at Exabeam, focused on driving solutions for threat detection/response and advising customers on breach response. Prior to joining Exabeam, Stephen has held a variety of cybersecurity practitioner and leadership roles. He spends his free time advising industry-leading organizations, mentoring, and helping those in need. CHAPTER 21 DATA MANIPULATION, LAW ENFORCEMENT, AND OUR FUTURE: SEEKING TO BUILD TRUST IN OUR DIGITALLY CONNECTED SYSTEMS Philipp Amann Head of Strategy, Europol’s European Cybercrime Centre × Philipp is the Head of Strategy of the European Cybercrime Centre (EC3). EC3 Strategy is responsible for the delivery of strategic, situational and tactical cyber-related products such as the Internet Organised Crime Threat Assessment (IOCTA). Other key areas of responsibility include prevention and awareness, outreach, stakeholder management, training management and internet governance. Philipp regularly presents at major international conferences and events. Prior to joining the EC3, he held management positions with the Organization for Security and Co- operation in Europe, the Organisation for the Prohibition of Chemical Weapons and the International Criminal Court. Philipp has more than 17 years of relevant working experience and hands-on skills in information and cyber security management, policy development, combatting cybercrime, electronic evidence management and the analysis and management of intelligence. He has worked in various fields, including the financial sector, global disarmament and arms control, CBRNe, law enforcement and international law. He is also a member of ENISA’s Permanent Stakeholder Group and the program advisory board of the Cyber Akademie. Philipp’s professional experience is complemented by a PhD degree and a Master’s degree in business informatics from the University of Vienna. He also holds an MSc in Forensic Computing and Cybercrime Investigation from the University College Dublin, where he graduated at the top of his class. CHAPTER 22 WHY SECURE AVAILABILITY—NOT COMPLIANCE—SHOULD BE EVERY BUSINESS LEADER’S GOAL Danny McPherson Executive Vice President and Chief Security Officer, Verisign × As senior vice president and chief security officer (CSO), Danny McPherson is responsible for all aspects of Verisign’s information systems and services, as well as information and corporate security. Additionally, he represents Verisign in key forums focused on critical infrastructure, engineering, research, security, and online trust. With over 20 years of experience in the internet network operations, security, and telecommunications industries, McPherson brings tremendous technical leadership and operational expertise to the company. Prior to joining Verisign, McPherson was vice president and CSO at Arbor Networks, where he developed solutions to detect and mitigate cyberattacks. Before that, he held technical leadership positions in architecture, engineering and operations with Amber Networks, Qwest Communications, Genuity, MCI Communications, and the U.S. Army Signal Corps. McPherson has actively participated in internet operations and standardization since the early 1990s. He is currently a member of the Internet Corporation for Assigned Names and Numbers (ICANN) Security and Stability Advisory Committee (SSAC) and has served on the Internet Architecture Board (IAB), the Internet Research Steering Group (IRSG), the U.S. Federal Communications Commission’s (FCC) Communications Security, Reliability and Interoperability Council (CSRIC), and the U.S. Department of Homeland Security’s Cybersecurity Subcommittee, as well as the Online Trust Alliance (OTA) Board of Directors. He has chaired an array of Internet Engineering Task Force (IETF) and other working groups and committees in these and related forums. McPherson is an active contributor in the network and security operations and research communities and has authored several books, numerous internet protocol standards, network and security research papers, and other publications. CHAPTER 23 WHY CORPORATE GOVERNANCE MATTERS SO MUCH IN CYBERSECURITY Paul Jackson Managing Director, Asia-Pacific Leader, Cyber Risk, Kroll × Paul Jackson is a Managing Director and Asia-Pacific Leader for Kroll’s Cyber Security and Investigations Practice, based in the Hong Kong office. Over a career spanning more than 25 years of service in some of the region’s highest levels of law enforcement and corporate enterprise, Paul has earned a stellar record of achievement as a cyber security practitioner, strategist, and thought leader. In addition to possessing deep knowledge regarding the region’s diverse geopolitical and cultural complexities, Paul has developed a highly nuanced view of global cyber security challenges from working with organizations such as Interpol, the U.S. Secret Service’s Electronic Task Force, and Microsoft’s Digital Crimes Consortium. Paul started his career with the Hong Kong Police Force, and over 22 years, he rose through the ranks to become Chief Inspector and Head of the IT Forensics Practice, Investigation Team, and Training in the force’s Technology Crime Division. In this role, he led multiple teams of cyber investigators, computer forensics examiners, and police college trainers, and was policy manager for digital evidence for the entire police force of 27,000 members. His accomplishments included overseeing the design and construction of a multimillion-dollar project to build the IT forensic laboratory and all associated IT security infrastructure; heading an internal “think tank” that provided top-level police management with strategic planning and policies relating to technology crime trends and IT security matters; leading the government incident response capability against cyber threats to critical infrastructure during major events such as the Olympics, WTO meeting, ITU Conference, and East Asian Games; and implementing an innovative incident response methodology for live (compromised) system analysis, which was ultimately adopted by Interpol and police forces worldwide. During his tenure, Paul was also appointed by Interpol as course director for the Asia-Pacific Region to develop and deliver IT investigation and forensics training to law enforcement. His design and management of an advanced training facility for the HKPF was later used as a template by Interpol and the Korean Police University. Paul brought to these training efforts a wide range of practical, frontline experience from his earlier roles as Head of the Computer Security Unit in the Crime Prevention Bureau, Head of the Telecommunications Liaison Office in the Criminal Intelligence Bureau, and a uniformed officer for eight years. After leaving the HKPF in 2010, Paul became APAC Head of Fraud and High Tech Investigations for JP Morgan Chase Bank, and from 2012-2014, he relocated to New York where he served as the bank’s Global Head of High- Tech/Cyber Investigations. In this role, Paul managed a global team of cyber investigators and responders throughout the United States, Europe, and Asia, focused on addressing the pressing needs of managing the evolving threats faced by a global financial institution. Executing on these objectives involved, among other efforts, redesigning global cyber laboratories and introducing new forensic technologies to enhance the efficiency and capacity of the team. In addition to serving as a strategy leader, Paul personally conducted numerous investigations, successfully resolving several major incidents that included, among others, a well-publicized breach, data exposure, reputational issues, employee misconduct, insider threat, and electronic fraud. Prior to joining Kroll, Paul was APAC Managing Director for Stroz Friedberg. In this role, Paul developed several of the firm’s products and services with an APAC focus, and personally led client engagements in cyber security assessments, C-level cyber incident table-top exercises, and data breach investigations. He also served as a thought leader and represented the firm in numerous venues, forums, and major public events. CHAPTER 24 COMPLIANCE IS NOT A CYBERSECURITY STRATEGY Mark Gosling Vice President, Internal Audit, Palo Alto Networks × Mark Gosling is the Vice President Internal Audit at Palo Alto Networks, where he leads the company’s internal audit, Sarbanes-Oxley compliance, and enterprise risk management programs. In addition to assessing risks, risk management practices and controls on behalf of the Company’s Board, Mark’s role requires close coordination of work with multiple stakeholder groups to develop and implement optimal risk management approaches across the enterprise. Before joining Palo Alto Networks, Mark served as Vice President Internal Audit at NetApp and at VeriSign, and as a partner at PricewaterhouseCoopers specializing in internal audit, compliance and risk management services for technology companies. His career spans over 30 years, with 22 of those spent in Silicon Valley. Mark holds a Bachelor of Science degree in production engineering from the University of Birmingham, UK, and is a Chartered Accountant. PART 3 MAKE SURE YOU’RE COVERED TODAY chapters 25-44 CHAPTER 25 WELCOME TO THE FRONTLINES OF BUSINESS AND CYBERSECURITY Pablo Emilio Tamez López Chief Information Security Officer, Tecnológico de Monterrey × As Chief Information Security Officer of Tecnológico de Monterrey, Pablo Tamez has designed and led the cybersecurity strategy and is responsible for the security of all Institutions which includes Higher Education, Health Care and Retail sectors. Thought understanding of the risk landscape and security solutions and services has constructed a centralized security architecture for all the institutions capable of attend the security needs regarding corporate governance, data privacy, vulnerability management, infrastructure protection, breach response and awareness. He has collaborated over 14 years in different companies of the private sector, having a deep understanding of IT and Security Operations, Mr. Tamez has worked in the security operations forefront and has led the security technologies and services evaluation program, security operation center and incident response. CHAPTER 26 PREPARING FOR THE COMING TECHNOLOGY TSUNAMI William Dixon Head of Centre for Cybersecurity, World Economic Forum × William Dixon is the Head of the Centre for Cybersecurity at the World Economic Forum, focusing on the impact of next generation technology on the security, and risk landscape. Previously, he was Global Head of Intelligence at Barclays, and held leadership roles in the UK Civil Service. CHAPTER 26 PREPARING FOR THE COMING TECHNOLOGY TSUNAMI Greg Day Vice President and Chief Security Officer, EMEA, Palo Alto Networks × Greg Day is Vice President and Chief Security Officer for EMEA at Palo Alto Networks. He is also Chair for the global CSO community I-4 members advisory committee, Chair TechUK Cybersecurity AI Working Group, and member of the World Economic Forum’s Centre for Cyber Security. He previously held leadership roles at FireEye, Symantec and McAfee. CHAPTER 27 HOW TO ARTICULATE THE BUSINESS VALUE OF CYBERSECURITY Mark Rasch Cybersecurity and Privacy Attorney × Mark Rasch is a lawyer and computer security and privacy expert and an expert in risk mitigation in Bethesda, Maryland. where he helps develop strategy and messaging for the Information Security team. Rasch’s career spans more than 25 years of corporate and government cybersecurity, computer privacy, regulatory compliance, probabilistic risk assessment, resilience, computer forensics and incident response. Earlier in his career, Rasch was with the U.S. Department of Justice where he led the department’s efforts to investigate and prosecute cyber and high-technology crime, starting the computer crime unit within the Criminal Division’s Fraud Section, efforts which eventually led to the creation of the Computer Crime and Intellectual Property Section of the Criminal Division. He was responsible for various high-profile computer crime prosecutions, including Kevin Mitnick, Kevin Poulsen and Robert Tappan Morris. Mark is a frequent commentator in the media on issues related to information security, appearing on BBC, CBC, Fox News, CNN, NBC News, ABC News, the New York Times, the Wall Street Journal and many other outlets. CHAPTER 28 LANGUAGE, PLEASE: HOW YOU TALK TO BOARDS AND EXECUTIVES CAN MAKE OR BREAK YOUR CYBERSECURITY James Shira Principle, Global, and U.S. Chief Information and Technology Officer PricewaterhouseCoopers × James joined PricewaterhouseCoopers (PwC) in May of 2015 in the newly established role of Network Chief Information Security Officer (CISO). The Network CISO has been charged with leading a broad information security transformation program across the PwC Network of Firms. Since this programs launch in summer of 2015 significant progress has been made both in the US firm and across the PwC member firm network. PwC Network Information Security or NIS has established itself as an engablement function at PwC which makes an impact. Prior to PwC, James was at Zurich Insurance Group where he started in early 2009 as the role of Head of Group IT Risk Americas. In the autumn of 2010 he was promoted to the newly created role of Group Chief Information Security Officer. During his tenure at Zurich, James transformed Zurich's information security posture, developing new and innovative solutions and capabilities, leading the Data Security Improvement initiative on behalf of the Group Executive Committee, and working to enable Zurich employees to work in new and modern ways while remaining secure. Prior to Zurich, James was the Chief Security Officer for American General Financial Services (AGFS), a subsidiary of AIG. At AGFS, James built the first security function at the company and helped shape and guide overall security strategy at AIG. Prior to working at AIG, James was the America’s CISO for Bank Julius Baer. While at Julius Baer, James established the CISO role in the Americas and worked closely with Global CISO in establishing the strategy for the information security program across the company. James is known across the Information Security industry as change and action oriented executive who thrives on tackling large scale challenges. Furthermore he is also known for his approaches to people management, emerging technology and tight integration with business strategy. In 2014, James’ transformation of Zurich’s information security program won the ‘RSA Excellence in the field of Information Security’ award. This award is given to the top executive in the information security industry determined by a judging committee of industry peers. Outside of work James has been married to his wife Kristine since 2005. They’ve lived in a number of places both in the US and abroad but now call Los Angeles home since 2013. James and Kristine have two children. Jaclyn who is 3 ½ and Finn who is 6 months. They live in Hermosa Beach which is near LAX. Beyond family and work, James is passionate automotive enthusiast. He maintains several vintage Porsche’s. In addition James likes to cycle and work out and is a fan of California wine. CHAPTER 29 TO GET AHEAD OF CYBERSECURITY THREATS, FOCUS ON PREPAREDNESS AND SUSTAINABILITY Heather King Former Acting Senior Director for Cybersecurity Policy, White House, National Security Council Staff × Heather King presently serves as the Chief Operating Officer at the Cyber Threat Alliance (CTA). CTA works to improve the cybersecurity of our global digital ecosystem by enabling real-time, high-quality cyber threat information sharing among companies and organizations in the cybersecurity field. Prior to joining the CTA in August 2017, Heather served as the Acting Senior Director for Cybersecurity Policy at the White House National Security Council (NSC) staff where she was responsible for working with Federal departments and agencies on key domestic national cybersecurity strategy and policy. Prior to that, Heather served on the NSC staff in several roles from April 2013 to April 2017, including Deputy Executive Secretary, Director of Critical Infrastructure Cybersecurity, and Director of National Preparedness Policy. Before the NSC staff, she served in a variety of roles at the Federal and state levels, including the Department of Homeland Security, Federal Emergency Management Agency, Virginia Department of Emergency Management, and Virginia State Police. Heather holds an M.S. in Global Security from Virginia Polytechnic Institute and State University and is pursuing an M.S. in Management of Information Technology at the University of Virginia. CHAPTER 29 TO GET AHEAD OF CYBERSECURITY THREATS, FOCUS ON PREPAREDNESS AND SUSTAINABILITY Megan Stifel Executive Director, Americas, Global Cyber Alliance × Megan Stifel is Executive Director, Americas, Global Cyber Alliance. She has previously held cybersecurity leadership posts at the U.S. National Security Council and the U.S. Department of Justice. CHAPTER 30 LEARNING AND LEVERAGING THE WISDOM OF “SO WHAT?” Gary McAlum Chief Security Officer, USAA × Gary McAlum serves as Chief Security Officer of United Services Automobile Association. His responsibilities include: Information Security, Privacy, Financial Fraud Prevention & Recovery, Physical Security Operations, Corporate Investigations, and Business Continuation. Prior to USAA, he served 25 years in the US Air Force and a short time with Deloitte & Touche, LLP. Throughout his military career, he worked in a variety of leadership and staff positions within the information technology career field including: telecommunications, satellite communications, network operations, and information security. Gary was on the front line of military cyberspace operations where he supported the establishment and evolution of the Joint Task Force Global Network Operations, the organization that was the focal point for the operation and security of DoD information systems and networks. During this time, he was frequently called upon to provide cyber threat insights to a wide variety of interagency forums, including the US-China Economic and Security Review Commission, the President's National Cyber Study Group, and Congressional testimony. Gary holds a B.A. in Mathematics from The Citadel, an M.S. in Management Information Systems from the University of Arizona, and an M.S. from the National Defense University. He is a Certified Information Systems Security Professional (CISSP), a Certified Fraud Examiner (CFE), and has completed the NACD Cyber Risk Oversight certification course, Wharton Security Executive Development Program and the FBI CISO Academy. He currently serves on the board of the Internet Security Alliance (ISA) where he contributed to the development of the “Cyber-Risk Handbook” that is promoted by the National Association of Corporate Directors (NACD). CHAPTER 31 HOW TO OPTIMIZE CYBERSECURITY USING MEASUREMENT Richard Seiersen Chief Executive Officer, Soluble.ai × Richard Seiersen is co-founder and CEO of Soluble. Prior to that, he spent 20 years deep in the salt mines of security operations and development. Along the way, he became a serial CISO with stints at LendingClub, Twilio and GE. But he got his start in security startups building vulnerability management products for companies like Qualys and Tripwire. He’s also the co-author of “How To Measure Anything In Cybersecurity Risk,” and the forthcoming “The Metrics Manifesto: Confronting Security With Data.” CHAPTER 32 MAKING CYBERSECURITY THE SMART INVESTMENT IN AN ERA OF ECONOMIC UNCERTAINTY Matt Gyde President and Chief Executive Officer, Security Division, NTT × Matt Gyde is President and Chief Executive Officer at NTT’s Security Division, where he is also the representative director on NTT Security’s board of directors. In his nearly 25 years in the cybersecurity industry, he has held leadership positions at Dimension Data, Datacraft, Surf Control and Secure Computing. CHAPTER 33 ZERO TRUST: THE STRATEGIC APPROACH TO STOP DATA BREACHES John Kindervag Field Chief Technology Officer, Palo Alto Networks × John Kindervag joined Palo Alto Networks as Field CTO in 2017 after eight and one-half years at Forrester Research where he was a Vice President and Principal Analyst on the Security and Risk Team. John is considered one of the world’s foremost cybersecurity experts. He is best known for creating the revolutionary Zero Trust Model of Cybersecurity. Zero Trust is widely embraced by companies as diverse as Coca Cola, Google, and WestJet Airlines. Notably, the US House of Representatives is recommending that all government agencies adopt Zero Trust in the wake of the OPM Data Breach. Additionally, Chairman Jason Chaffettz wrote a bylined article in Federal News Radio endorsing Zero Trust. These recommendations have led to increasing adoption of Zero Trust within the United States Federal Government. He currently advises both public and private sector organizations with the design and building of Zero Trust Networks and other Cybersecurity topics. He holds, or has held, numerous industry certifications, including QSA, CISSP, CEH, and CCNA. John has a practitioner background, having served as a security consultant, penetration tester, and security architect. He has particular expertise in the areas of secure network design, wireless security, and voice-over-IP hacking. He has been interviewed and published in numerous publications, including The Wall Street Journal, Forbes, and The New York Times. He has also appeared on television networks such as CNBC, Fox News, PBS, and Bloomberg discussion information security topics. John has spoken at many security conferences and events, including RSA, SXSW, ToorCon, ShmoCon, InfoSec Europe, and InfoSec World. John has a Bachelor of Arts degree in communications from the University of Iowa and lives in Dallas, TX. CHAPTER 34 MAKING BOARDROOM CHANGES TODAY TO ENSURE A CYBER-SECURE TOMORROW Kal Bittianda Head of North America Technology Practice, Egon Zehnder × Based in New York, Kal Bittianda is a trusted advisor for helping companies and leaders leverage and harness technology. As the leader of Egon Zehnder's North America Technology Practice, he works closely with companies in the mobility, communication, systems, software, and technology-enabled service sectors. He also conducts executive search for chief technology, data, and information security officers. Before joining Egon Zehnder, Kal led business units for Kyriba (enterprise cloud solutions), EXL (knowledge and business process outsourcing), and Inductis (analytics consulting and services). As a Consulting Partner at Azendant and Inductis, Kal advised C-level executives on growth strategies. Previously he was an Engagement Manager at the Mitchell Madison Group. Kal began his career in technology and leadership roles at Unisys and International Paper. Kal earned a BTech in naval architecture from the Indian Institute of Technology, in Madras/Chennai, in India, an MA in industrial engineering from Purdue University, and an MBA from Harvard Business School. He advises nonprofit organizations and early-stage companies in the New York area, also investing in some of the latter. Kal has two young daughters and enjoys exploring new places in other countries, running in marathons, and following his favorite sports teams and athletes. CHAPTER 34 MAKING BOARDROOM CHANGES TODAY TO ENSURE A CYBER-SECURE TOMORROW William Houston Advisor, Technology and Communications & Industrial Practices, Egon Zehnder × Will Houston, based in Washington, D.C., has more than 20 years of experience in the industrial and technology sectors, the military, and federal government. He is active in Egon Zehnder's Technology and Communications and Industrial practices. Prior to joining Egon Zehnder, Will was a Head of Strategic Partner Development in Google's Emerging Business Development group. Previously, Will served as the Director of Policy and Planning for Customs and Border Protection in the U.S. Department of Homeland Security and as a consultant with Diamond Technology Partners, where he advised Fortune 500 clients on digital strategy. Will began his career as an Army Intelligence Officer, serving four years on active duty. He continues to serve as a Reservist and is a Lieutenant Colonel in Cyber Command. Will earned an AB from Princeton University, an MBA from the Wharton School, and a master's in international relations and economics from the Johns Hopkins School of Advanced International Studies. He was also a Fellow with the Robert Bosch Foundation in Berlin and serves on the advisory board of the Alumni & Friends of Princeton University ROTC. He is a passionate outdoorsman who loves duck hunting and fly fishing. CHAPTER 35 RECOGNIZING, DEVELOPING, AND DEPLOYING GOOD CYBERSECURITY HABITS George Finney Chief Security Officer, Southern Methodist University × George Finney is the Chief Security Officer for Southern Methodist University and the author of “No More Magic Wands: Transformative Cybersecurity Change for Everyone.” He has also taught Corporate Cybersecurity and Information Assurance in the SMU School of Engineering. Before joining SMU, George worked with several startups and global telecommunications firms designing networks, writing policy, hardening servers, and educating users. George received his J.D. from Southern Methodist University's Dedman School of Law and his B.A. in mathematics and philosophy from St. John's College in Santa Fe, New Mexico. George is a member of the Texas CISO Council, a governing body member of the Evanta CISO Coalition, and an advisory board member for SecureWorld. George is an licensed attorney in the state of Texas, a Certified Information Privacy Professional, a Certified Information Security Manager, as well as a Certified Information Security Systems Professional and is a frequent speaker on Cybersecurity topics across the country. His blog can be found at www.strongestelement.com where he writes on topics focusing on improving Cybersecurity awareness through a unique approach that combines neuroscience, psychology, and wellness. CHAPTER 36 SOCIAL ENGINEERING ATTACKS: WE’RE ALL TARGETS Yorck O.A. Reuber Chief Information Technology Officer, Allianz Malaysia × Yorck O.A. Reuber is Chief Information Technology Officer at Allianz Malaysia. Previously he was Chief Technology Officer for AXA IT. A certified Navy Chief Engineering Officer, Yorck formerly held senior-level positions at IBM, Verizon, and T-Systems. CHAPTER 37 HOW TO MANAGE A DATA BREACH Lisa J. Sotto Partner and Chair of the Global Privacy and Cybersecurity Practice, Hunton Andrews Kurth LLP × Lisa Sotto chairs the top-ranked Global Privacy and Cybersecurity practice at Hunton Andrews Kurth. She is the managing partner of the firm’s New York office and serves on the firm’s Executive Committee. Lisa has received widespread recognition for her work in the areas of privacy and cybersecurity and was named among the National Law Journal’s “100 Most Influential Lawyers.” She also serves as Chairperson of the Department of Homeland Security’s Data Privacy and Integrity Advisory Committee. CHAPTER 38 INCIDENT RESPONSE: HOW TO DEAL WITH A CYBERATTACK Andreas Rohr Chief Technology Officer, Deutsche Cyber-Sicherheitsorganisation GmbH × Dr. Andreas Rohr is founding manager and Chief Technology Officer at the German Cyber Security Organization GmbH. In this role, he leads cyber defense services and security engineering for the operative business. Previously, he worked in management positions at RWE and Volkswagen and before that was responsible for Federal Ministry of Defense, including forensics management and auditing security and business-critical processes and IT systems. CHAPTER 39 DON’T WAIT FOR A BREACH TO BUILD YOUR COMMUNICATIONS STRATEGY Robert Boyce Managing Director, Accenture Security, Accenture × Robert is a Managing Director in Accenture’s Global Cybersecurity practice. Robert responsible for growth and development of Accenture’s the Cyber Threat Operations capabilities. He also provides hands-on consulting services to the Global 2000 in the ares of advanced security operations, crisis preparedness and response, and cyber defense and protection strategies. Robert has a degree in Computer Science from University of New Brunswick. CHAPTER 39 DON’T WAIT FOR A BREACH TO BUILD YOUR COMMUNICATIONS STRATEGY Justin Harvey Managing Director, Accenture Security, Accenture × More than 20 years of information security experience and technical knowledge has established Justin Harvey as a trusted cyber threat security advisor to executives and government leaders at some of the world’s largest commercial and government organizations. His work with major global entities has taken him across Asia to lead large-scale incident response efforts in the wake of targeted attacks, to the Middle East to advise enterprises and ministries of defense on threat intelligence and persistent threats, and to Australia to direct security operations. At Accenture, Justin is the global lead for the FusionX Incident Response Practice; providing security thought leadership, acts as a strategic advisor on cyberespionage, cyberwar and cybercrime to our global client base, and serves as executive sponsor for research initiatives within Accenture Security. Prior to joining Accenture, Justin was the CSO of Fidelis Cybersecurity after spending time as the vice president and CTO of Global Solutions at FireEye. Prior, at Mandiant, he worked with industry executives, thought leaders, analysts and partners to influence the company’s industry position, shape product direction and develop strategic partnerships. Previously, as Chief Solutions Strategist with HP Enterprise Security, Justin provided strategic consulting to C-level management at leading companies. At CPSG Partners Consulting, a U.S.-based systems integrator, Justin led the western U.S. region in delivering large-scale security projects to Fortune 100 companies. Earlier in his career, Justin provided network and system security expertise at GTE Internetworking (now Verizon), DIGEX, Sun Microsystems, Excite@Home and other organizations. In 2015, Justin testified before the United States Senate Judiciary Committee’s Subcommittee on Privacy, Technology and the Law on the topic of data brokerage firms and consumer data security. Justin regularly speaks at industry conferences. As a sought-after expert on data breaches, cyberespionage and cybercrime, Justin provides commentary to top-tier online, print and broadcast news outlets, including ABC News, BBC News, Newsweek, The Guardian, Politico, eWeek, CSO, Financial Times, The New York Times, U.S. News & World Report, Federal Computer Week, Reuters and the Associated Press. Justin is a Certified Information Systems Security Professional (CISSP) and received advanced SCADA Red Team/Blue Team Training for critical infrastructure threats, attacks and response from the U.S. Department of Homeland Security. CHAPTER 40 MAKING CYBER INSURANCE A STRATEGIC TOOL IN REDUCING RISK AND IMPROVING RESILIENCE Robert Parisi Managing Director and U.S. Cyber Product Leader, Marsh × Robert Parisi is a managing director and National Cyber Product Leader in Marsh’s New York City headquarters. His current responsibilities include advising clients on issues related to intellectual property, technology, privacy, and cyber related risks as well as negotiating with the carriers on terms and conditions. Robert is also responsible for coordinating Marsh’s Global Cyber Network. Prior to joining Marsh, Robert was the senior vice president and Chief Underwriting Officer (CUO) of eBusiness Risk Solutions at AIG. Robert joined AIG in 1998 as legal counsel for its Professional Liability group and held several executive and legal positions, including CUO for Professional Liability and Technology. While at AIG, Robert oversaw the creation and drafting of underwriting guidelines and policies for all lines of Professional Liability. Robert was also instrumental in the development of specialty reinsurance to address aggregation of risk issues inherent in cyber, privacy and technology insurance. In addition to working with AIG, Robert has also been in private practice, principally as legal counsel to various Lloyds of London syndicates. While at Marsh, Robert has worked extensively with Marsh clients in all industries, assisting them in analysis of their risk as well as in the placement of coverage for cyber and privacy risks. CHAPTER 41 HOW YOU SHOULD USE CYBERSECURITY TECHNOLOGY TO IMPROVE BUSINESS OUTCOMES Naveen Zutshi Senior Vice President and Chief Information Officer, Palo Alto Networks × Naveen Zutshi joined Palo Alto Networks as Sr. Vice President and Chief Information Officer in December 2015. In this role he is responsible for Palo Alto Network’s Information technology solutions, driving a comprehensive strategy for information technology that will help scale the company rapidly, deliver on innovative solutions globally, and build a world class IT organization. Naveen’s experience spans applications, software development, infrastructure and leading organizations in large scale enterprises to small startups. Prior to Palo Alto Networks, Naveen was Senior Vice President, Technology at Gap Inc. responsible for the company’s infrastructure, operations, and information security organizations. Before Gap, Naveen spent three years as Vice President, Technology and Operations for Encover, a SaaS CRM company. In this role, Naveen was responsible for developing and bringing to market Service SaaS software. Prior to Encover, Naveen spent seven years with Cisco, serving in both infrastructure and applications roles with an emphasis on sales productivity and infrastructure automation. Prior to Cisco, Naveen spent six years with Wal-Mart, serving in a variety of IT/development positions including responsible for building applications that connected buyers to hundreds of thousands of suppliers worldwide. He earned a BE in Computer Engineering from Bangalore University and an MBA from University of Arkansas. CHAPTER 42 WHEN IT COMES TO SHADOW IT, WHAT YOU DON’T KNOW— AND DON’T PREPARE FOR—CAN HURT YOU Alice Cooper Global Head of Derivative Trade Processing IT, BNP Paribas CIB × Alice Cooper is Global Head of Derivative Trade Processing IT at BNP Paribas CIB. She has held a wide range of responsibilities at BNP Paribas across a number of IT functions for trades processing, credit, and equity. Previously, she worked at Mitsubishi Bank and Citibank. CHAPTER 43 UNLOCKING PRODUCTIVITY WITH SECURITY Siân John MBE — Chief Security Advisor, Microsoft × Siân John is an executive security advisor in the enterprise cybersecurity group at Microsoft. Siân has worked in cyber security since 1997, and has worked at the Houses of Parliament, Ubizen and Symantec. In her current role Siân works with Microsoft’s UK customers to help them to develop their cyber security strategy, security best practices and to understand how Microsoft’s technology and services can help support digital transformation and cloud services. Siân is passionate in advocating the role that Cyber Security must play in enabling the modern digital economy. Over more than 20 years she has worked with customers across the public and private sector to help them understand their risk posture and practical steps then can take to manage it. Siân is the chair of the Digital Economy Programme Advisory Board for the Engineering and Physical Sciences Research Council and a member of the TechUK cybersecurity management committee. Siân was made an MBE for services to Cyber Security in the New Years Honours List for 2018. CHAPTER 44 HOW WE CAN CHANGE OUR APPROACH TO CYBERSECURITY TODAY Nir Zuk Founder and Chief Technology Officer, Palo Alto Networks × Nir Zuk brings a wealth of network security expertise and industry experience to Palo Alto Networks. Prior to co-founding Palo Alto Networks, Nir was CTO at NetScreen Technologies, which was acquired by Juniper Networks in 2004. Prior to NetScreen, Nir was co-founder and CTO at OneSecure, a pioneer in intrusion prevention and detection appliances. Nir was also a principal engineer at Check Point Software Technologies, and was one of the developers of stateful inspection technology. GET THE BOOK Get Your Digital Copy PDF EPub for e-readers Mobi for e-readers Physical Book × Navigating the Digital Age, Second Edition is published by Palo Alto Networks. As a company, alleviating the problem of cybercrime is at the heart of everything we do. Our goal is to offer cybersecurity education and training to students of all backgrounds around the globe through the Global Cybersecurity Education Fund. Every action we take, and your readership of this book, gets us one step further on our mission to protect our way of life in the Digital Age. All proceeds for sale on Amazon.com will go toward this fund. LATEST ARTICLES May 3, 2022 / by Ed Harris THE KEYS TO CISO ROLE SUCCESS—PART TWO: ELEVATING YOUR STATURE May 3, 2022 / by Ed Harris THE KEYS TO CISO ROLE SUCCESS—PART ONE: ENTERING A NEW ROLE Apr 14, 2022 / by Krishnan Chellakarai HOW GREATER DIVERSITY CAN HELP FILL THE CYBER TALENT GAP Apr 8, 2022 / by Unit 42 WHAT EXECUTIVES NEED TO KNOW ABOUT SPRINGSHELL (AKA SPRING4SHELL) Feb 16, 2022 / by Derrick Lowe MAKING CYBER RESILIENCY A PRIORITY IN HEALTHCARE: MY ADVICE FOR LEADERS Feb 1, 2022 / by Gary Johnson WE ALL NEED A STRONGER CYBERSECURITY POSTURE. HERE’S HOW. (HINT: FIRST, IT’S A MINDSET) Feb 1, 2022 / by Tarun Khandelwal THE MACHINES ARE COMING: FINANCIAL SERVICES CAN REDUCE THE BLAST SURFACE WITH ZERO TRUST Feb 1, 2022 / by Gemma Garcia Godall AN ANTIDOTE TO STRESS IN CYBERSECURITY Get the latest actionable insights on Security Roundtable * * * About Us * Terms * Privacy * Contact powered by * * * * * × We Value Your Privacy Settings NextRoll, Inc. ("NextRoll") and our advertising partners use cookies and similar technologies on this site and use personal data (e.g., your IP address). If you consent, the cookies, device identifiers, or other information can be stored or accessed on your device for the purposes described below. You can click "Allow All" or "Decline All" or click Settings above to customize your consent. NextRoll and our advertising partners process personal data to: ● Store and/or access information on a device; ● Create a personalized content profile; ● Select personalised content; ● Personalized ads, ad measurement and audience insights; ● Product development. For some of the purposes above, our advertising partners: ● Use precise geolocation data. Some of our partners rely on their legitimate business interests to process personal data. View our advertising partners if you wish to provide or deny consent for specific partners, review the purposes each partner believes they have a legitimate interest for, and object to such processing. If you select Decline All, you will still be able to view content on this site and you will still receive advertising, but the advertising will not be tailored for you. You may change your setting whenever you see the Manage consent preferences on this site. Decline All Allow All Manage consent preferences