Skip to Content
See Yourself in Cyber
book

See Yourself in Cyber

by Ed Adams
February 2024
Beginner content levelBeginner
256 pages
5h 28m
English
Wiley
Content preview from See Yourself in Cyber

Part IICybersecurity Roles in Action

Part II of this book provides three specialty chapters intended to provide real-world context to working in the cybersecurity industry. The topics cover the prevailing technology that powers our digital world, the role of diversity in providing better security to our enterprises, and advice distilled from nearly 150 leaders and practitioners.

Chapter 6 is dedicated to software’s omnipresence and importance in cybersecurity and our daily lives. It is difficult to exist in today's modern world without depending on software in some capacity. When it comes to cybersecurity and emerging technology trends, like artificial intelligence, software is the dominant player. Knowing how to interact with, integrate, develop, and use software securely is absolutely paramount to safe cyber operations.

Chapter 7 addresses a problem and an opportunity facing the cybersecurity industry: lack of diverse talent. There are many underrepresented demographics in cybersecurity. Homogenous organizations are plagued by a lack of innovation and uninspiring cyber solutions compared to more heterogeneous groups (including cyber criminals). The chapter provides a practical framework and actionable strategies companies can adopt to improve diversity and inclusion among their cybersecurity talent pools.

Chapter 8 is a broad-reaching discussion of case studies, advice, and survey analysis collected over nearly a year. It presents snippets from interviews, informal discussions, ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Resilient Cybersecurity

Resilient Cybersecurity

Mark Dunkerley
Ransomware and Cyber Extortion: Response and Prevention

Ransomware and Cyber Extortion: Response and Prevention

Sherri Davidoff, Matt Durrin, Karen Sprenger

Publisher Resources

ISBN: 9781394225590Purchase Link