Authors:
- Discusses how artificial intelligence can prevent cyber-attacks
- Optimize organizational security by following the cybersecurity ethics for artificial intelligence
- Provides information on how to avoid Solarwinds-type attacks, learn defense techniques against advanced malware, DDoS attacks, and ransomware
- Provides information on how to keep an organization safe in AWS and Azure cloud environments with security monitoring
- Introduces how to minimize attack surface and reduce cyber-attacks by implementing Zero Trust with least privilege
Buy it now
Buying options
Tax calculation will be finalised at checkout
Other ways to access
This is a preview of subscription content, log in via an institution to check for access.
Table of contents (46 chapters)
-
Front Matter
-
Post Quantum Cryptography
-
Front Matter
-
-
Artificial Intelligence and Machine Learning for Cyber
-
Front Matter
-
About this book
The opening chapters describe the power and danger of quantum computing, proposing two solutions for protection from probable quantum computer attacks: the tactical enhancement of existing algorithms to make them quantum-resistant, and the strategic implementation of quantum-safe algorithms and cryptosystems. The following chapters make the case for using supervised and unsupervised AI/ML to develop predictive, prescriptive, cognitive and auto-reactive threat detection, mitigation, and remediation capabilities against advanced attacks perpetrated by sophisticated threat actors, APT and polymorphic/metamorphic malware.
CISOs must be concerned about current on-going sophisticated cyber-attacks, and can address them with advanced security measures. The latter half of this book discusses some current sophisticated cyber-attacks and available protective measures enabled by the advancement of cybersecurity capabilities in various IT domains. Chapters 6-10 discuss secure remote work; chapters 11-17, advanced data security paradigms; chapters 18-28, Network Security; chapters 29-35, application and device security; chapters 36-39, Cloud security; and chapters 40-46 organizational cyber risk measurementand event probability.
Security and IT engineers, administrators and developers, CIOs, CTOs, CISOs, and CFOs will want to purchase this book. Risk personnel, CROs, IT and Security Auditors as well as security researchers and journalists will also find this useful.
Reviews
Authors and Affiliations
-
Ashburn, USA
Raj Badhwar
About the author
Raj is a currently a director and secretary of the board of the National Technology Security Coalition (NTSC). He also serves on the cybersecurity advisory boards of Pace University, Rutgers University, and Ithaca College; the customer advisory board for Venafi; and the CISO advisory council for Infosys.
Raj is a certified information systems security professional (CISSP), a certified ethical hacker (CEH), and a FINRA licensed securities professional (Series 99). He has co-authored 14 security patents, and has written and presented in the areas of advanced encryption, post-quantum cryptography, zero trust networks, cloud security pat-terns, and secure remote work paradigms. He has also been inter-viewed as a cybersecurity subject matter expert by WSJ. Raj is proficient in three languages, and conversant in another three languages.
Raj graduated from George Washington University (GWU) with an MS in Information Systems Technology and also holds a BS in Electrical and Electronics engineering from Karnatak University. Raj is an alumnus of St Francis College, Lucknow.
Bibliographic Information
Book Title: The CISO’s Next Frontier
Book Subtitle: AI, Post-Quantum Cryptography and Advanced Security Paradigms
Authors: Raj Badhwar
DOI: https://doi.org/10.1007/978-3-030-75354-2
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021
Hardcover ISBN: 978-3-030-75353-5Published: 07 August 2021
Softcover ISBN: 978-3-030-75356-6Published: 08 August 2022
eBook ISBN: 978-3-030-75354-2Published: 05 August 2021
Edition Number: 1
Number of Pages: XLIII, 387
Number of Illustrations: 3 b/w illustrations, 11 illustrations in colour
Topics: Mobile and Network Security, Artificial Intelligence, Systems and Data Security, Quantum Computing