Skip to main content
  • Book
  • © 2021

The CISO’s Next Frontier

AI, Post-Quantum Cryptography and Advanced Security Paradigms

Authors:

  • Discusses how artificial intelligence can prevent cyber-attacks
  • Optimize organizational security by following the cybersecurity ethics for artificial intelligence
  • Provides information on how to avoid Solarwinds-type attacks, learn defense techniques against advanced malware, DDoS attacks, and ransomware
  • Provides information on how to keep an organization safe in AWS and Azure cloud environments with security monitoring
  • Introduces how to minimize attack surface and reduce cyber-attacks by implementing Zero Trust with least privilege

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 79.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (46 chapters)

  1. Front Matter

    Pages i-xliii
  2. Post Quantum Cryptography

    1. Front Matter

      Pages 1-1
    2. Are You Ready for Quantum Computing ?

      • Raj Badhwar
      Pages 3-14
    3. The Need for Post-Quantum Cryptography

      • Raj Badhwar
      Pages 15-30
    4. Quantum Encryption Is Not a Paradox

      • Raj Badhwar
      Pages 31-38
  3. Artificial Intelligence and Machine Learning for Cyber

    1. Front Matter

      Pages 39-39
    2. AI Code of Ethics for Cybersecurity

      • Raj Badhwar
      Pages 41-44
    3. The Case for AI /ML in Cybersecurity

      • Raj Badhwar
      Pages 45-73
  4. Secure Remote Work

    1. Front Matter

      Pages 75-75
    2. Specialty Malware and Backdoors for VDI

      • Raj Badhwar
      Pages 105-110
  5. Data Security

    1. Front Matter

      Pages 111-111
    2. The Future State of Data Security

      • Raj Badhwar
      Pages 113-121
    3. Cybersecurity Enabled by Zero Trust

      • Raj Badhwar
      Pages 123-129
    4. Cyber Deception Systems

      • Raj Badhwar
      Pages 145-154

About this book

This book provides an advanced understanding of cyber threats as well as the risks companies are facing. It includes a detailed analysis of many technologies and approaches important to decreasing, mitigating or remediating those threats and risks. Cyber security technologies discussed in this book are futuristic and current. Advanced security topics such as secure remote work, data security, network security, application and device security, cloud security, and cyber risk and privacy are presented in this book. At the end of every chapter, an evaluation of the topic from a CISO’s perspective is provided. This book also addresses quantum computing, artificial intelligence and machine learning for cyber security


The opening chapters describe the power and danger of quantum computing, proposing two solutions for protection from probable quantum computer attacks:  the tactical enhancement of existing algorithms to make them quantum-resistant, and the strategic implementation of quantum-safe algorithms and cryptosystems. The following chapters make the case for using supervised and unsupervised AI/ML to develop predictive, prescriptive, cognitive and auto-reactive threat detection, mitigation, and remediation capabilities against advanced attacks perpetrated by sophisticated threat actors, APT and polymorphic/metamorphic malware.


CISOs must be concerned about current on-going sophisticated cyber-attacks, and can address them with advanced security measures. The latter half of this book discusses some current sophisticated cyber-attacks and available protective measures enabled by the advancement of cybersecurity capabilities in various IT domains. Chapters 6-10 discuss secure remote work; chapters 11-17, advanced data security paradigms; chapters 18-28, Network Security; chapters 29-35, application and device security; chapters 36-39, Cloud security; and chapters 40-46 organizational cyber risk measurementand event probability.


Security and IT engineers, administrators and developers, CIOs, CTOs, CISOs, and CFOs will want to purchase this book. Risk personnel, CROs, IT and Security Auditors as well as security researchers and journalists will also find this useful.

Reviews

“Raj Badhwar has written an interesting book meant to help those tasked with information security. … This is a comprehensive book covering a wide range of topics. For the CISO or security professional looking to get a deeper understanding of the topics their security teams will have to deal with, The CISO’s Next Frontier does a good job of helping senior information security professionals understand what their teams in the trenches face.” (Ben Rothke, Security Management, sm.asisonline.org, August 23, 2022)

Authors and Affiliations

  • Ashburn, USA

    Raj Badhwar

About the author

Raj Badhwar has 25+ years of experience within the Cybersecurity and IT industry. He is currently the CISO for Voya Financial, and has previously held senior Security and IT leadership roles at AIG, BAE Systems Inc., Bank of America, Time Warner Cable, AOL Time Warner, and Sprint. 


Raj is a currently a director and secretary of the board of the National Technology Security Coalition (NTSC). He also serves on the cybersecurity advisory boards of Pace University, Rutgers University, and Ithaca College; the customer advisory board for Venafi; and the CISO advisory council for Infosys. 


Raj is a certified information systems security professional (CISSP), a certified ethical hacker (CEH), and a FINRA licensed securities professional (Series 99). He has co-authored 14 security patents, and has written and presented in the areas of advanced encryption, post-quantum cryptography, zero trust networks, cloud security pat-terns, and secure remote work paradigms. He has also been inter-viewed as a cybersecurity subject matter expert by WSJ. Raj is proficient in three languages, and conversant in another three languages. 


Raj graduated from George Washington University (GWU) with an MS in Information Systems Technology and also holds a BS in Electrical and Electronics engineering from Karnatak University. Raj is an alumnus of St Francis College, Lucknow.

Bibliographic Information

  • Book Title: The CISO’s Next Frontier

  • Book Subtitle: AI, Post-Quantum Cryptography and Advanced Security Paradigms

  • Authors: Raj Badhwar

  • DOI: https://doi.org/10.1007/978-3-030-75354-2

  • Publisher: Springer Cham

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021

  • Hardcover ISBN: 978-3-030-75353-5Published: 07 August 2021

  • Softcover ISBN: 978-3-030-75356-6Published: 08 August 2022

  • eBook ISBN: 978-3-030-75354-2Published: 05 August 2021

  • Edition Number: 1

  • Number of Pages: XLIII, 387

  • Number of Illustrations: 3 b/w illustrations, 11 illustrations in colour

  • Topics: Mobile and Network Security, Artificial Intelligence, Systems and Data Security, Quantum Computing

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 79.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access