• Complain

Christian Espinosa - The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity

Here you can read online Christian Espinosa - The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: Lioncrest Publishing, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Christian Espinosa The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity
  • Book:
    The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity
  • Author:
  • Publisher:
    Lioncrest Publishing
  • Genre:
  • Year:
    2021
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Cyberattackan ominous word that strikes fear in the hearts of nearly everyone, especially business owners, CEOs, and executives. With cyberattacks resulting in often devastating results, its no wonder executives hire the best and brightest of the IT world for protection. But are you doing enough? Do you understand your risks? What if the brightest arent always the best choice for your company?In The Smartest Person in the Room, Christian Espinosa shows you how to leverage your companys smartest minds to your benefit and theirs. Learn from Christians own journey from cybersecurity engineer to company CEO. He describes why a high IQ is a lost superpower when effective communication, true intelligence, and self-confidence are not embraced. With his seven-step methodology and stories from the field, Christian helps you develop your teams technical minds so they become better humans and strong leaders who excel in every role. This book provides you with an enlightening perspective of how to turn your biggest unknown weakness into your strongest defense.

Christian Espinosa: author's other books


Who wrote The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity? Find out the surname, the name of the author of the book and a list of all author's works by series.

The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Copyright 2021 Christian Espinosa All rights reserved ISBN 978-1-5445-1620-2 - photo 1

Copyright 2021 Christian Espinosa All rights reserved ISBN 978-1-5445-1620-2 - photo 2

Copyright 2021 Christian Espinosa

All rights reserved.

ISBN: 978-1-5445-1620-2

Contents
Disclaimer

There are some fantastic cybersecurity leaders and professionals out there. Im not stating otherwiseIm simply highlighting typical technical personality types that are hindering our ability to win the cybersecurity war.

Also, I have included hyperlinks as references throughout the book. At the time of publishing, these links are active. However, due to the volatile, unpredictable nature of the internet, these hyperlinks may stop working at any point in the future.

Introduction

When Dick Cheney, former Vice President of the United States, found out his pacemaker was hackable, he had his doctors disable its wireless feature. He was terrified he would be assassinated via his pacemaker.

It sounds like fake news, but its not. You probably dont have pacemaker assassins following you, but right now, you are surrounded by invisible thieves who want to break in and steal from you.

They arent trying to burglarize your house or your corporate office. They arent lurking in the bushes or wearing ski masks. The thieves Im talking about are virtual. Thats why you cant see them.

Theyre called cybercriminals, and they are incessantly looking for openings on your computer or in your data center. They want to steal your information for financial gain, for terrorism, or something far more nefariousand maybe some of these criminals are trying to hack into your life - dependent medical device as Dick Cheney feared.

Whatever their motivation is, it doesnt matter; cybercriminals want to steal your information to wreak havoc.

This matters because you are responsible for protecting your companys data. You may be the CEO, COO, or CISO of your organization, and you are accountable for keeping your clients data, your medical devices, and/or your companys patents or intellectual property (IP) safe. You are on the front lines of a war most of us cannot see, with cybercriminals on one side and the good guys, the ones trying to lock all of your virtual windows and doors to secure your data, on the other side.

If this were our house or corporate office, wed be able to see the thieves trying to break in. Because this war is happening virtually, we dont think much of it until our personal computer has been compromised or our client or medical data has been stolen. Most of us dont realize these virtual crimes are happening until its too late.

The Root of the Problem

Like thieves in the flesh, cybercriminals will always exist, and they will always try to hack into your network and steal your information. So what measures are the cybersecurity professionals like me taking to combat them? And are these methods working?

I would say they are not. In fact, I would go so far as to say these methods are failing . It seems as if every other day there is news of another major data breach. The cybercriminals are winning . Why?

Weve had this problem for years. I have seen it as an information assurance (IA) analyst, penetration tester, cybersecurity engineer, trainer, and consultant. There isnt a piece of hardware or software thats going to solve it because the people are the real issue.

Cybersecurity is a support industry, and a lot of professionals in the industry tend to forget that. These professionals think that cybersecurity is an industry unto itself, but it wouldnt exist without other industries (like manufacturing, healthcare, and financial services). Cybersecurity, like IT, supports those other industries. Heres a great definition of cybersecurity:

Measures taken to protect a computer or computer system (as on the internet) against unauthorized access or attack.

Business leaders rely on their cybersecurity staff to protect their company data. I have held executive - level positions in cybersecurity firms and founded my own company, Alpine Security, and in my more than thirty years of experience in cybersecurity and leadership, I found these technical employees are the root of the problem. Ive read the books and articles outlining overly complicated frameworks and best practices needed to win the cybersecurity war, but its the people and their egos at the nexus of the industrys failings, not the other way around.

That tells me two things: we need to come up with something different, and when we do, people need to pay attention.

The Secure Methodology

Right now, almost every business has a team of technical employees who contribute to the problems within the cybersecurity industry. Your people and their poor communication skills are the reason your data was stolen, not your lack of cutting - edge technology. Their need to be the smartest person in the room and their substandard people skills have rendered them unable to communicate clearly and work effectively with others to solve problems. Thats why were losing the cybersecurity war.

So whats the solution? How can you protect yourself?

In my experience, open communication allows us to solve problems and commit to fixing them. If we strengthen our communication skills, we can also strengthen our ability to win the cybersecurity war. However, successful open communication requires soft people skills, such as empathy, active listening, vulnerability, and trust.

Many technical people struggle with people skills because theyre often, at their cores, insecure. They are uncomfortable interacting with others because they fear the ambiguity that goes along with it. They crave certainty and prefer things to be either black or white; most cant handle the shades of gray that come with human interaction and business politics rampant in large organizations.

1s and 0s

All computers are based on bits . A bit is a 1 or a 0on or off. Thats it.

There is a correlation between the personality types of technical people and our black or white mindsets. We have chosen career fields where the fundamentals are 1s and 0s, on or off, so it makes sense we view the world as black and white, rather than with shades of gray.

Many technical people also struggle with curiosity. In public, they often lack curiosity. Yet, in private, it is my experience that technical people are very curious. Some would rather stay silent than be exposed for their lack of knowledge. These people care mainly about being the smartest person in the room, which inhibits their communication skills. Growth requires curiosity, but fear of judgment prevents many technical folk from communicating effectively at work and solving problems in cybersecurity.

Dealing with other people isnt nearly as ambiguous as it appears, though. There are simple, clear, and prioritized steps to develop and refine the people skills needed to enhance communication and improve interactions with others. Simple does not mean easy, though. I want to make that clear.

Introducing the Secure Methodology, a step - by - step guide designed to show you exactly how to boost your technical staffs people skills in order to have open, honest, and effective communication. When the communication within your organization is improved, you will be better equipped to win the cybersecurity war because everyone will be on the same page and working together to fight cybercrime.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity»

Look at similar books to The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity»

Discussion, reviews of the book The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.