Book Release: Modern Cybersecurity - Tales from the Near-Distant Future

by

The speed of change and the tools of adversaries make it extremely hard to envision a long-term, executable vision for the future of security. However, without pondering what the near-distant future looks like, we miss the opportunity to influence that future. In the release of our new book, "Modern Cybersecurity: Tales from the Near-Distant Future", we asked seven cybersecurity practitioners to provide us with a story of what they are currently doing as they transform the cybersecurity programs within their companies, and what they envision the near-distant future will look like because of those transformations.

They have done a wonderful job of providing us with roadmaps you can use to move forward, to be able to speak with your development and security teams, to be able to explain to the business how you intend to create a foundation for cybersecurity. This book is a series of short stories that can be read in any order, dependent upon your area of interest. It is available on Amazon, or you can download a digital version for free.

I suggest you start with Sounil Yu's chapter, Security for Modern Cyber Assets. This will give an overview of a new meaning of cyber assets, using the Cyber Defense Matrix to help move through the concepts. From there, it's yours to explore.

  • Security for Modern Cyber Assets - Sounil Yu (JupiterOne)
  • Preparing Your Organization to Adopt a Security Practice - Yolonda Smith (sweetgreen)
  • The Future of Security Cloud Native - Caroline Wong (Cobalt.io)
  • Reinventing the Cybersecurity Workforce - Sushila Nair (NTT DATA Services)
  • Hardening the Value Stream - Bryan Finster (DoD Platform One)
  • Metrics that Matter: The Business Context of Cyber Risk Management - Keyaan Williams (Cyber Leadership Forum)
  • Knowledge without Action is a Wasted Opportunity - Jennifer Czaplewski (Target)

There is a consistency within the storylines presented. If you read closely, the authors present a way to talk about security in terms of business outcomes. Security becomes a part of good business practices, whether through building cross-functional teams, understanding the metrics in order to make better business decisions, or agreeing that quality in a product includes building in cybersecurity from the beginning.

Thank you for participating in the launch of our book. If you enjoy it, please leave a review on Amazon

Modern Cybersecurity - Tales from the Near-Distant Future

 

Mark Miller
Mark Miller

Mark Miller speaks and writes extensively on DevSecOps and Cybersecurity. He has published 9 books, including "Modern Cybersecurity: Tales from the Near-Distant Future"

Keep Reading

How are CAASM and CSPM different? | JupiterOne
June 13, 2024
Blog
How are CAASM and CSPM different?

Comparing Cloud Security Posture Management to Cyber Asset Attack Surface Management

CAASM and IAM to Strengthen Your Security Posture | JupiterOne
June 5, 2024
Blog
CAASM and IAM to Strengthen Your Security Posture

Discover how CAASM and IAM can reduce security risks from over privileged accounts and inefficient user deprovisioning.

Next-Gen CMDB or Paradigm Shift? CAASM Leads the Way to Proactive Defense | JupiterOne
May 30, 2024
Blog
Next-Gen CMDB or Paradigm Shift? CAASM Leads the Way to Proactive Defense

CAASM empowers proactive defense by integrating internal insights and external threat visibility, enabling prioritization of critical cybersecurity risks.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.