The Second Economy

The Race for Trust, Treasure and Time in the Cybersecurity War

Nonfiction, Computers, Networking & Communications, Hardware, Computer Security, General Computing
Cover of the book The Second Economy by Steve Grobman, Allison Cerra, Apress
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Steve Grobman, Allison Cerra ISBN: 9781484222294
Publisher: Apress Publication: October 20, 2016
Imprint: Apress Language: English
Author: Steve Grobman, Allison Cerra
ISBN: 9781484222294
Publisher: Apress
Publication: October 20, 2016
Imprint: Apress
Language: English

Gain a practical prescription for both private and public organizations to remediate threats and maintain a competitive pace to lead and thrive in an ever-shifting environment.

In today’s hyper-connected, always-on era of pervasive mobility, cloud computing and intelligent connected devices, virtually every step we take, every transaction we initiate, and every interaction we have are supported in some way by this vast global infrastructure. This set of interconnected systems comprises the fundamental building blocks of the second economy – the very foundation of our first economy. And adversaries, whether motivated by profit, principle or province, are singularly focused on winning the race through a relentless portfolio of shifting attack vectors.

Make no mistake about it, we are running a race. This is a race against a faceless, nameless adversary – one that dictates the starting line, the rules of the road, and what trophies are at stake. Established assumptions must be challenged, strategies must be revised, and long-held practices must be upended to run this race and effectively compete. 

The Second Economy highlights a second to none approach in this fight, as the effectiveness and ROI of security solutions are increasingly measured by the business outcomes they enable.

 What You Will Learn:

  • Understand the value of time and trust in a cyber-warfare world

  • Enable agile and intelligent organizations to minimize their risk of falling victim to the next attack

  • Accelerate response time by adopting a holistic approach

  • Eliminate friction across the threat defense lifecycle, from protection to detection to correction

  • Gain a sustainable competitive advantage by seizing first mover advantage

  • Deploy solutions across an open, integrated security framework

Who This Book Is For:

Senior-level IT decision makers concerned with ascribing business value to a robust security strategy. The book also addresses business decision makers who must be educated about the pervasive and growing cyber threatscape (including CXOs, board directors, and functional leaders) as well as general business employees to understand how they may become unwitting participants in a complex cyber war.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Gain a practical prescription for both private and public organizations to remediate threats and maintain a competitive pace to lead and thrive in an ever-shifting environment.

In today’s hyper-connected, always-on era of pervasive mobility, cloud computing and intelligent connected devices, virtually every step we take, every transaction we initiate, and every interaction we have are supported in some way by this vast global infrastructure. This set of interconnected systems comprises the fundamental building blocks of the second economy – the very foundation of our first economy. And adversaries, whether motivated by profit, principle or province, are singularly focused on winning the race through a relentless portfolio of shifting attack vectors.

Make no mistake about it, we are running a race. This is a race against a faceless, nameless adversary – one that dictates the starting line, the rules of the road, and what trophies are at stake. Established assumptions must be challenged, strategies must be revised, and long-held practices must be upended to run this race and effectively compete. 

The Second Economy highlights a second to none approach in this fight, as the effectiveness and ROI of security solutions are increasingly measured by the business outcomes they enable.

 What You Will Learn:

Who This Book Is For:

Senior-level IT decision makers concerned with ascribing business value to a robust security strategy. The book also addresses business decision makers who must be educated about the pervasive and growing cyber threatscape (including CXOs, board directors, and functional leaders) as well as general business employees to understand how they may become unwitting participants in a complex cyber war.

More books from Apress

Cover of the book Introducing SQLite for Mobile Developers by Steve Grobman, Allison Cerra
Cover of the book Java Unit Testing with JUnit 5 by Steve Grobman, Allison Cerra
Cover of the book Beginning RPG Maker VX Ace by Steve Grobman, Allison Cerra
Cover of the book Practical Business Analytics Using SAS by Steve Grobman, Allison Cerra
Cover of the book Envisioning Holograms by Steve Grobman, Allison Cerra
Cover of the book Beginning App Development with Parse and PhoneGap by Steve Grobman, Allison Cerra
Cover of the book Machine Learning Applications Using Python by Steve Grobman, Allison Cerra
Cover of the book Full Stack AngularJS for Java Developers by Steve Grobman, Allison Cerra
Cover of the book Migrating to Android for iOS Developers by Steve Grobman, Allison Cerra
Cover of the book Beginning EJB 3 by Steve Grobman, Allison Cerra
Cover of the book Introduction to MATLAB for Engineers and Scientists by Steve Grobman, Allison Cerra
Cover of the book Swing for Jython by Steve Grobman, Allison Cerra
Cover of the book Expert Scripting and Automation for SQL Server DBAs by Steve Grobman, Allison Cerra
Cover of the book Objective-C Quick Syntax Reference by Steve Grobman, Allison Cerra
Cover of the book Pro Spring Boot by Steve Grobman, Allison Cerra
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy