{"id":2280,"date":"2020-02-25T02:25:04","date_gmt":"2020-02-24T23:25:04","guid":{"rendered":"http:\/\/kusuaks7\/?p=1885"},"modified":"2024-01-04T09:51:29","modified_gmt":"2024-01-04T09:51:29","slug":"cyber-minds-expert-insights-on-blockchain-and-much-more","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/fintech\/cyber-minds-expert-insights-on-blockchain-and-much-more\/","title":{"rendered":"Cyber Minds: Expert Insights on Blockchain and Much More"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2280\" class=\"elementor elementor-2280\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-7be02890 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7be02890\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-221363ff\" data-id=\"221363ff\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f0bee95 elementor-widget elementor-widget-text-editor\" data-id=\"f0bee95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe new book \u201cCyber Minds\u201d offers insights on cybersecurity perspectives and recommendations across the cloud, data, AI, blockchain and IoT. The interviews make this book a must read for cyber and technology pros.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8990290 elementor-widget elementor-widget-text-editor\" data-id=\"8990290\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/in\/shirarubinoff\/\" rel=\"noopener\">Shira Rubinoff<\/a>\u00a0is the president and co-founder of Prime Tech Partners, which is a unique incubator in NYC. She is also the president of SecureMySocial, which warns people of social media problems in real time.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a0a012f elementor-widget elementor-widget-text-editor\" data-id=\"a0a012f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIn Shira\u2019s new book\u00a0<a href=\"https:\/\/www.amazon.com\/Cyber-Minds-cybersecurity-artificial-intelligence\/dp\/178980700X\" rel=\"noopener\"><em>Cyber Minds<\/em><\/a>, we see a unique mix of cutting-edge perspectives on blockchain and where it is going, insights on several hot technologies like AI and the Internet of Things (IoT) as well as solid cybersecurity advice for technology and business leaders.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4bab16c elementor-widget elementor-widget-text-editor\" data-id=\"4bab16c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tCutting right to the core, this book offers the best practical content I have seen regarding blockchain\u2019s potential, future and cybersecurity opportunities and drawbacks. The materials on blockchain, which includes interviews with thought leaders in the area, are simply ground-breaking.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e373d6 elementor-widget elementor-widget-text-editor\" data-id=\"5e373d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tHere\u2019s an excerpt from page 52 regarding blockchain:\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0179ee2 elementor-widget elementor-widget-text-editor\" data-id=\"0179ee2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n\u201cIf you look into the financial services space, we\u2019ve blueprinted the financial architecture and sort of overlaid it with the crypto industry. When you look at that, you realize that within five year, something amazing has been built. We\u2019ve got exchanges, wallets, mining, interfaces, and so on. It\u2019s all moving towards institutional grade infrastructure.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-93b5bb9 elementor-widget elementor-widget-text-editor\" data-id=\"93b5bb9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tLogistics is another example. In the past few weeks, we\u2019ve heard the news of the biggest competitors in logistics coming together. I believe it was DHL, UPS, and FedEx coming together to think about how they can use blockchain to reduce and merge the burden of governance in the system. We\u2019ll get more efficient Internet safety from that.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18c25f1 elementor-widget elementor-widget-text-editor\" data-id=\"18c25f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tBlockchain is being used by farmers for cattle feeding and in Switzerland, it\u2019s starting to be used in the watch industry and the butter industry among others. \u2026\u201d\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aea0224 elementor-widget elementor-widget-text-editor\" data-id=\"aea0224\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tHere&#8217;s one other excerpt that I like from page 60 (quoting Sally Eaves) on the leading blockchain sectors:\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5ffa33d elementor-widget elementor-widget-text-editor\" data-id=\"5ffa33d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t&#8220;Yes, I would say two sectors (are leading) &#8211; financial services and supply chain. We are going to see more development in both, but I would love to showcase a sector outside of this too: healthcare.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-612b312 elementor-widget elementor-widget-text-editor\" data-id=\"612b312\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tI am seeing a lot of research and development focused on the &#8216;marriage&#8217; of AI and blockchain technologies. As an example, we have opportunity to use blockchain as a method of security for our DNA data, negating fears of it being misused &#8211; while AI can enable rich insights to be anonymously extracted from it. &#8230;&#8221;\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-45c116f elementor-widget elementor-widget-heading\" data-id=\"45c116f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3><strong>Input from Experts<\/strong><\/h3><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c1be8b elementor-widget elementor-widget-text-editor\" data-id=\"7c1be8b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThis book gets five stars from me for the blockchain material alone, but it also offers interviews and recommendations on cloud security, IoT, artificial intelligence (AI) and much more. From my perspective, the advice offered from these top global leaders is excellent:\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65a1e4b elementor-widget elementor-widget-text-editor\" data-id=\"65a1e4b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n \t<li>General Gregory Touhill, former Federal Chief Information Security Officer of the United States<\/li>\n \t<li>Kevin L. Jackson, CEO and Founder, GovCloud<\/li>\n \t<li>Mark Lynd, Digital Business Leader, NETSYNC<\/li>\n \t<li>Joseph Steinberg, Internet Security advisor and thought leader<\/li>\n \t<li>Jim Reavis, Co-Founder and CEO, Cloud Security Alliance<\/li>\n \t<li>Dr. Tom Kellerman, Chief Cybersecurity Officer for Carbon Black Inc and Vice Chair of Strategic Cyber Ventures Board<\/li>\n \t<li>Mary Ann Davidson, Chief Security Officer, Oracle<\/li>\n \t<li>Dr. Sally Eaves, Emergent Technology CTO, Global Strategy Advisor \u2013 Blockchain AI FinTech, Social Impact award winner, keynote speaker and author<\/li>\n \t<li>Dr. Guenther Dobrauz, Partner with PwC in Zurich and Leader of PwC Legal Switzerland<\/li>\n \t<li>Barmak Meftah, President, AT&amp;T Cybersecurity<\/li>\n \t<li>Cleve Adams, CEO, Site 1001 (AI and big data based smart building company)<\/li>\n \t<li>Ann Johnson, Corporate Vice President \u2013 Cybersecurity Solutions Group, Microsoft<\/li>\n \t<li>Barbara Humpton, CEO, Siemens USA<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c3a540 elementor-widget elementor-widget-text-editor\" data-id=\"1c3a540\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<strong>Topics Covered in Book Cyber Minds<\/strong>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47ea8a7 elementor-widget elementor-widget-image\" data-id=\"47ea8a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/media.erepublic.com\/image\/cyber_minds_-2.jpg\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3870b94 elementor-widget elementor-widget-text-editor\" data-id=\"3870b94\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tHere\u2019s an overview of the topics covered in the book:\n<ol>\n \t<li>Integrating Humans and Technology \u2013 Four Steps to Cyber Hygiene<\/li>\n \t<li>How Risky Behavior Leads to Data Breaches<\/li>\n \t<li>Blockchain \u2013 The Unwritten Chapter on Cybersecurity<\/li>\n \t<li>Cybersecurity in the Cloud \u2013 What You Need to Know<\/li>\n \t<li>The World&#8217;s Biggest Data Breaches \u2013 Proactive and Reactive Approaches<\/li>\n \t<li>Trends in Cybersecurity<\/li>\n \t<li>Staying Cybersecure in the IoT Revolution<\/li>\n \t<li>Cyberwars \u2013 Bringing Military Lessons to Modern Information Security<\/li>\n \t<li>Can Artificial Intelligence (AI) be Trusted to Run Cybersecurity?<\/li>\n \t<li>Conclusion<\/li>\n<\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2eae688 elementor-widget elementor-widget-text-editor\" data-id=\"2eae688\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tI also like the straightforward and easy-to-understand steps that Ms. Rubinoff uses to describe cyberhygiene, and those sections in the beginning and ending serve as a primer for readers who have less experience and insight into cybersecurity challenges. The workforce development strategies include:\n<ul>\n \t<li>Continuous training<\/li>\n \t<li>Global awareness<\/li>\n \t<li>Updated security and patching<\/li>\n \t<li>Zero trust<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dcc5879 elementor-widget elementor-widget-text-editor\" data-id=\"dcc5879\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAfter giving you these guidelines, Shira warns about the most common behaviors that could lead to a data breach and the psychology behind them.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7bd38a elementor-widget elementor-widget-text-editor\" data-id=\"a7bd38a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThis YouTube video show you Ms. Rubinoff\u2019s excellent speaking skills and abilities in communication on technical topics.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5caf6f2 elementor-widget elementor-widget-video\" data-id=\"5caf6f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=_fWRTxt_91A&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-27490b7 elementor-widget elementor-widget-heading\" data-id=\"27490b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3><strong>Final Thoughts<\/strong><\/h3><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-22c6ba4 elementor-widget elementor-widget-text-editor\" data-id=\"22c6ba4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe interviews and insights offered in this book make it an excellent choice for technology, security and business leaders to learn the latest approaches and thinking on cybersecurity on a range of hot tech topics. I find the insights and interviews discussing topics like blockchain and cloud computing to be very insightful and different.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c62af78 elementor-widget elementor-widget-text-editor\" data-id=\"c62af78\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tI have no hesitation in strongly recommending this book and giving it 5 stars.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb9bbe1 elementor-widget elementor-widget-text-editor\" data-id=\"eb9bbe1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tOriginal <a id=\"ember2742\" href=\"http:\/\/article.in\/\" target=\"_blank\" rel=\"noopener noreferrer\">article.in<\/a>\u00a0<a id=\"ember2743\" href=\"http:\/\/govtech.com\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-artdeco-is-focused=\"true\">govtech.com<\/a>.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The new book &ldquo;Cyber Minds&rdquo; offers insights on cybersecurity perspectives and recommendations across the cloud, data, AI, blockchain and IoT.&nbsp;&nbsp; The interviews and insights offered in this book make it an excellent choice for technology, security and business leaders to learn the latest approaches and thinking on cybersecurity on a range of hot tech topics. The insights and interviews discussing topics like blockchain and cloud computing are very insightful and different.&nbsp;<\/p>\n","protected":false},"author":154,"featured_media":3786,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[192],"tags":[98],"ppma_author":[2650],"class_list":["post-2280","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-fintech","tag-blockchain"],"authors":[{"term_id":2650,"user_id":154,"is_guest":0,"slug":"dan-lohrmann","display_name":"Dan Lohrmann","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","user_url":"","last_name":"Lohrmann","first_name":"Dan","job_title":"","description":"Daniel J. Lohrmann, an internationally recognized cybersecurity leader, technologist, keynote speaker and author, is the Chief Strategist &amp; Chief Security Officer at Security Mentor, Inc. He was recognized as the global CISO of the Year for security product and services companies by <a href=\"http:\/\/cybersecuritybreakthrough.com\/award-winners\/\">Cybersecurity Breakthrough Awards<\/a> in September 2017. He has advised senior leaders at the White House, National Governor&rsquo;s Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, fortune 500 companies, small businesses and non-profit institutions.&nbsp;He led Michigan government&rsquo;s cybersecurity and technology infrastructure teams from 2002 to&nbsp;2014<br \/>\n&nbsp;"}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/154"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=2280"}],"version-history":[{"count":6,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2280\/revisions"}],"predecessor-version":[{"id":35375,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2280\/revisions\/35375"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/3786"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=2280"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=2280"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=2280"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=2280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}