The CISO’s Next Frontier

The CISO’s Next Frontier

Raj Badhwar

86,20 €
IVA incluido
Consulta disponibilidad
Editorial:
Springer Nature B.V.
Año de edición:
2021
Materia
Inteligencia artificial
ISBN:
9783030753535

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

This book provides an advanced understanding of cyber threats as well as the risks companies are facing. It includes a detailed analysis of many technologies and approaches important to decreasing, mitigating or remediating those threats and risks. Cyber security technologies discussed in this book are futuristic and current. Advanced security topics such as secure remote work, data security, network security, application and device security, cloud security, and cyber risk and privacy are presented in this book. At the end of every chapter, an evaluation of the topic from a CISO’s perspective is provided. This book also addresses quantum computing, artificial intelligence and machine learning for cyber securityThe opening chapters describe the power and danger of quantum computing, proposing two solutions for protection from probable quantum computer attacks:  the tactical enhancement of existing algorithms to make them quantum-resistant, and the strategic implementation of quantum-safe algorithms and cryptosystems. The following chapters make the case for using supervised and unsupervised AI/ML to develop predictive, prescriptive, cognitive and auto-reactive threat detection, mitigation, and remediation capabilities against advanced attacks perpetrated by sophisticated threat actors, APT and polymorphic/metamorphic malware.CISOs must be concerned about current on-going sophisticated cyber-attacks, and can address them with advanced security measures. The latter half of this book discusses some current sophisticated cyber-attacks and available protective measures enabled by the advancement of cybersecurity capabilities in various IT domains. Chapters 6-10 discuss secure remote work; chapters 11-17, advanced data security paradigms; chapters 18-28, Network Security; chapters 29-35, application and device security; chapters 36-39, Cloud security; and chapters 40-46 organizational cyber risk measurement and event probability.Security and IT engineers, administrators and developers, CIOs, CTOs, CISOs, and CFOs will want to purchase this book. Risk personnel, CROs, IT and Security Auditors as well as security researchers and journalists will also find this useful.

Artículos relacionados

  • Artificial Cognition Systems
    ...
  • Cross-Disciplinary Applications of Artificial Intelligence and Pattern Recognition
    Vijay Kumar Mago
    The need for intelligent machines in areas such as medical diagnostics, biometric security systems, and image processing motivates researchers to develop and explore new techniques, algorithms, and applications in this evolving field. Cross-Disciplinary Applications of Artificial Intelligence and Pattern Recognition: Advancing Technologies provides a common platform for researc...
  • Emerging Applications of Natural Language Processing
    Over the last few years, the area of Natural Language Processing has drastically grown in recognition, not only within the research and development community, but also with industry professionals. As NLP continues to be discussed and researched, certain areas continue to grow and mature. As a result, the need for advanced research and information is in high demand. Emerging App...
  • Androids, Cyborgs, and Robots in Contemporary Culture and Society
    Steven John Thompson
    Mankind’s dependence on artificial intelligence and robotics is increasing rapidly as technology becomes more advanced. Finding a way to seamlessly intertwine these two worlds will help boost productivity in society and aid in a variety of ways in modern civilization. Androids, Cyborgs, and Robots in Contemporary Culture and Society is an essential scholarly resource that delve...
  • Deep Learning Innovations and Their Convergence With Big Data
    The expansion of digital data has transformed various sectors of business such as healthcare, industrial manufacturing, and transportation. A new way of solving business problems has emerged through the use of machine learning techniques in conjunction with big data analytics. Deep Learning Innovations and Their Convergence With Big Data is a pivotal reference for the latest sc...
  • Computational Psychoanalysis and Formal Bi-Logic Frameworks
    Giuseppe Iurato
    Computational psychoanalysis is a new field stemming from Freudian psychoanalysis. The new area aims to understand the primary formal structures and running mechanisms of the unconscious while implementing them into computer sciences. Computational Psychoanalysis and Formal Bi-Logic Frameworks provides emerging information on this new field which uses psychoanalysis and the unc...

Otros libros del autor

  • The CISO’s Next Frontier
    Raj Badhwar
    This book provides an advanced understanding of cyber threats as well as the risks companies are facing. It includes a detailed analysis of many technologies and approaches important to decreasing, mitigating or remediating those threats and risks. Cyber security technologies discussed in this book are futuristic and current. Advanced security topics such as secure remote work,...
    Disponible

    69,11 €

  • The CISO’s Transformation
    Raj Badhwar
    The first section of this book addresses the evolution of CISO (chief information security officer) leadership, with the most mature CISOs combining strong business and technical leadership skills. CISOs can now add significant value when they possess an advanced understanding of cutting-edge security technologies to address the risks from the nearly universal operational depen...
    Disponible

    80,65 €