Sounded ID: 9780998749068
ISBN: 9780998749068
Publication Date: October 02, 2018
Publisher: Pro Audio Voices
Language: English
Author Name: Peter K. Chronis
Narrator Name: Keith Sellon-Wright
The 2016 presidential election was chaotic for many
reasons. Perhaps the most troubling was news that a
foreign power used new cyber warfare tactics to influence
our views and skew the election. These new revelations
come to light as many grow weary of a new reality where
hackers always seem to be one step ahead of us.
Author Peter K. Chronis claims we need a “moonshot” to
bolster our cybersecurity—an astonishing achievement on
the scale of wiping out polio, defeating the Nazis, or
landing on the moon. The author uses inspiration and
lessons fr...
The 2016 presidential election was chaotic for many
reasons. Perhaps the most troubling was news that a
foreign power used new cyber warfare tactics to influence
our views and skew the election. These new revelations
come to light as many grow weary of a new reality where
hackers always seem to be one step ahead of us.
Author Peter K. Chronis claims we need a “moonshot” to
bolster our cybersecurity—an astonishing achievement on
the scale of wiping out polio, defeating the Nazis, or
landing on the moon. The author uses inspiration and
lessons from these other complex “moonshots” as a guide
to help us develop a comprehensive cybersecurity
strategy.
Written with a nontechnical audience in mind, The Cyber
Conundrum examines the many flaws in global
cybersecurity strategy and proposes solutions the tech
industry, governments, and companies need to explore to
address fundamental cybersecurity challenges.
Without fundamental change, our democratic institutions,
the critical services we rely on every day (electricity,
communications, financial institutions and more), and the
free flow of information are in jeopardy—making this an
issue important to everyone.
# | Title | Duration |
---|---|---|
1. | 00OpeningCredits |
0 mins 12 secs |
2. | 01Dedication |
0 mins 27 secs |
3. | 02Preface |
3 mins 02 secs |
4. | 03ANotefromtheAuthor |
1 mins 22 secs |
5. | 04Introduction |
5 mins 59 secs |
6. | 05Part1WhatsWrongwithCybersecurityChapter1LosingtheWar |
13 mins 33 secs |
7. | 06Chapter2WhyisCybersecuritySoHard |
12 mins 05 secs |
8. | 07Chapter3MakingtheCaseforChange |
13 mins 30 secs |
9. | 08Part2ExploringMoonshotsChapter4SolvingDifficultProblems |
5 mins 47 secs |
10. | 09Chapter5GettingaMantotheMoon |
10 mins 07 secs |
11. | 10Chapter6DefeatingFascism |
17 mins 10 secs |
12. | 11Chapter7EradicatingPolio |
9 mins 26 secs |
13. | 12Part3WhereDoWeFocusChapter8CybersecurityMoonshotObjectives |
9 mins 03 secs |
14. | 13Chapter9Software |
10 mins 25 secs |
15. | 14Chapter10People |
10 mins 15 secs |
16. | 15Chapter11Government |
15 mins 16 secs |
17. | 16Chapter12CorporateGovernance |
10 mins 05 secs |
18. | 17Chapter13WhereDoWeGofromHere |
7 mins 29 secs |
19. | 18AbouttheAuthor |
1 mins 16 secs |
20. | 19ClosingCredits |
0 mins 22 secs |