No More Magic Wands Transformative Cybersecurity Change for Everyone eBook George Finney

No More Magic Wands Transformative Cybersecurity Change for Everyone eBook George Finney
No More Magic Wands takes the very complex subject of cyber security and explains it in short fictional stories involving elves and forest animals. Finney does an excellent of making the stories cute without being cutesy and passes along information without talking below (or above) the readers level. Part of any successful security program is to have everyone involved and not make any exceptions. People are the weak link in any security system whether it is the military setting up a perimeter, a bank protecting its vault, or a company protecting its data. Perhaps on of the biggest security hacks was Stuxnet. The amazingly successful virus was discovered only by accident and was introduced by a person, intentionally or not. Finney gives examples of how the bad guys can get into the system through unknowing or overly helpful employees. Stressing, again,that security is everyone's responsibility, not just the IT department.Combining technology with elfin magic and even the Tootsie Pop owl makes for enjoyable reading and much like parables there is a lesson to be learned with each chapter of the story. Finney includes take away points and also asks open-ended questions at the conclusion of each chapter. The appendix gives an outline of the important points of the book. Computer security is the main topic of the book, but it easily translates to any physical security situation. The reader can easily take away useful information for day to day life or computer security. The stories are easy to follow and the "morals" are not hidden too deeply in the story. Most people outside of the IT circle find security boring and not really part of their jobs and security training is a bitter time. The stories act as a sugar cube to the training distracting the employees from the fact they are learning security.

Tags : No More Magic Wands: Transformative Cybersecurity Change for Everyone - Kindle edition by George Finney. Download it once and read it on your Kindle device, PC, phones or tablets. Use features like bookmarks, note taking and highlighting while reading No More Magic Wands: Transformative Cybersecurity Change for Everyone.,ebook,George Finney,No More Magic Wands: Transformative Cybersecurity Change for Everyone,Business & Economics Management,Computers Security General
No More Magic Wands Transformative Cybersecurity Change for Everyone eBook George Finney Reviews
George Finney has worked in Cybersecurity for over 15 years. He is currently the Chief Information Security Officer for Southern Methodist University, where he has also taught on the subject of Corporate Cybersecurity and Information Assurance. Dr Finney is an attorney and is a Certified Information Privacy Professional as well as a Certified Information Security Systems Professional and has spoken on Cybersecurity topics across the USA.
Wave your magic wand and everything will be better? Not in real life. If there really was a magic wand to be found, then thousands of companies wouldn’t become the victims of cybercriminals every year. Software could be made to run perfectly, business processes would be designed without loopholes, everyone would follow policy, and employees would be constantly vigilant. Cybercrime would be a thing of the past.
This book imagines what life would be like for a magic-wand manufacturing company, staffed entirely by elves, after knockoff wands with their label start cropping up. On top of that, their customers’ private information gets leaked and becomes scattered all across the enchanted forest. But the elves still have one magic wand. Can they use it to fix the mess? Or will they have to think of something?
As specialist in his field, Dr Finney gives a motivational and informative take on Cybersecurity and shows how we can improve our communal awareness and develop a kind of collective immunity to cybercrime. Parallel to his organizational and methodological discussion of the problem in real life, he constructs a fairy tale of elves and associated animals in an enchanted forest where heads and their team work together to prevent security breaches and protect their kingdoms from the root upwards....
A well – written work to make organisational management interesting and understandable. Each chapter covers a specific aspect with solutions. The author tells his background story, and at the end of each chapter gives a Summary and Takeaways ( important points with related questions on the contents to assess your understanding. At the end of the book, a summary of all the discussion points are given for easy reference when in a real life situation.
This book isn’t just written for technology professionals, although it may help them. It’s written for anyone and everyone who wants to make a difference and improve cybersecurity. We have nameless and faceless cyber security invaders, magic (and problems in spite) in the land of fairies. We have multiple interconnected structures, magic ideas and designs in reliance life, but it remains a continuous challenge to improve security before a security breach happens or information leaks. We need to maintain a secure platform and communications system, predict threats, procure secure IT and law enforcement in this “jungle of cyberspace” through partnerships who you can trust. You cannot just wave a wand and solve a problem.
The first lesson that students of cybersecurity learn is that there’s a constantly evolving cycle of improvement. Although basic principles will remain the same, you must always grow and adapt to various threats as they emerge. You will never arrive at a state of perfect security. No matter how good you are, you will be hacked at some point.
It may be a surprise to hear, but hackers are an important part of the security environment. Hackers help the security ecosystem improve, particularly when they reveal the vulnerabilities they find or disclose the methods they used to expose weaknesses in a company’s security measures. Imagine a young infant we don’t want the baby to get sick but, if she were never exposed to germs, her immune system wouldn’t properly develop and she could wind up being very weak and vulnerable later on in life. Without hackers, our cyber immune system wouldn’t develop and could be susceptible to worse cyber threats attacks from government-sponsored actors, large-scale organized crime, or malicious inside jobs.
Changing the culture of an organization isn’t something that any one person can do alone, but it is something that can be accomplished together. This book is a starting point for you and your team to begin building your plan.
Changing processes are difficult because it involves convincing people to make changes, but if those people have the information they need, changing processes become much more achievable. These three components—people, processes, and technology—need to do three different things prevent, detect, and respond. They have to do those three things in concert, not haphazardly.
Excerpt
“The paper man followed a crowd of elves and fairies onto the elevator. As he boarded, small pieces of paper in his knees and waist unfolded like an accordion, making him grow three inches taller. He adjusted the collar of his paper suit, allowing the newly folded pleats to fall nicely into place. He wiggled his shoulders, and a small paper flower popped joyfully out of his lapel. Nobody seemed to notice that he was made entirely of neatly folded pieces of paper. In fact, nobody noticed him at all—not the elves in uniforms or the ones in suits, not the fairies carrying their magic wands, and certainly not the turtle, who moved surprisingly quickly as he walked on his two back feet. The paper man slid to the back of the elevator, making room for several more straggling elves, before the elevator doors shut.”
Enjoy the inventive way our author brings his knowledge and experience to the public.
Scarlett Jensen
12 December 2016
No Magic Wands by George Finney gives the reader a closer look at cyber security for larger organizations. It begins with an introduction that highlights some of the reasons we all need to be aware of cyber security and why it is important that everyone is involved in making sure that the company as a whole is protected. If you think of it, that one piece of advice may be the most important part of this book. If only the tech department is handling cyber issues, the company is at risk from all other people involved in the operation. However, if everyone feels that they are part of it and are taking steps, many of them just common sense things, to be sure they are protecting themselves when they are online the the company as a whole will benefit from it. The book gives lots of tips and pieces of advice for everyone, from the lowest to the highest, at an organization to help protect themselves while in cyber space. This is a good thing. The book also gives nice summaries at the end of the chapter. This is also a good thing. What I have an issue with is the way the "story" is told to the audience. George has created a story that is a simple fantasy that has mythical characters interacting in ways that is similar to what people do in large businesses. I feel this will actually cause many people to turn away from this book because large organizations are interested in the facts and how to improve, not necessarily a story that will slowly teach them morals on self improvement. Basically, I feel the messages here are very good, but the presentation is not the best. The book was very well edited and the author has taken lots fo time to create a very nice final product.
No More Magic Wands takes the very complex subject of cyber security and explains it in short fictional stories involving elves and forest animals. Finney does an excellent of making the stories cute without being cutesy and passes along information without talking below (or above) the readers level. Part of any successful security program is to have everyone involved and not make any exceptions. People are the weak link in any security system whether it is the military setting up a perimeter, a bank protecting its vault, or a company protecting its data. Perhaps on of the biggest security hacks was Stuxnet. The amazingly successful virus was discovered only by accident and was introduced by a person, intentionally or not. Finney gives examples of how the bad guys can get into the system through unknowing or overly helpful employees. Stressing, again,that security is everyone's responsibility, not just the IT department.
Combining technology with elfin magic and even the Tootsie Pop owl makes for enjoyable reading and much like parables there is a lesson to be learned with each chapter of the story. Finney includes take away points and also asks open-ended questions at the conclusion of each chapter. The appendix gives an outline of the important points of the book. Computer security is the main topic of the book, but it easily translates to any physical security situation. The reader can easily take away useful information for day to day life or computer security. The stories are easy to follow and the "morals" are not hidden too deeply in the story. Most people outside of the IT circle find security boring and not really part of their jobs and security training is a bitter time. The stories act as a sugar cube to the training distracting the employees from the fact they are learning security.

0 Response to "≫ Read Free No More Magic Wands Transformative Cybersecurity Change for Everyone eBook George Finney"
Post a Comment