DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
  • Jobs
  • Vendors
Get Help
CyberMaterial
Home Cyber101 Cyber Review

Cyber Review: Cybersecurity The Lost Decade

Reading Time: 1 min read
in Cyber Review, Cyber101

Today, we’re talking with JC Gaillard about his book Cybersecurity The Lost Decade.

He is the Founder and Managing Director of Corix Partners. He is a leading consultant, a senior executive, and a team builder with more than 25 years of experience in the field. developed in several global financial institutions in the UK and continental Europe, and a track record at driving fundamental change in the Security field across global organizations, looking beyond the technical horizon into strategy, governance, culture, and the real dynamics of transformation.

A few questions for JC Gaillard:

  1. How did you get into cybersecurity?
  2. Who is this book for?
  3. You wrote this book back in 2015 and now you have published the 5th edition. What do you think has changed from 2015 to 2022?
  4. You opened the book with a bold statement. Cybersecurity is not a risk. Why is that?

Tags: Cyber ProfessionalsCyber Professionals VideosCyber ReviewCybersecurity The Lost DecadeJC Gaillard
ADVERTISEMENT

Related Posts

Cyber Attackers – Definitions

Cyber Attackers – Definitions

March 20, 2023
Malware-as-a-service – Definitions

Malware-as-a-service – Definitions

March 20, 2023
Cryptojackers – Definitions

Cryptojackers – Definitions

March 20, 2023
Grey Hat Hacker – Definitions

Grey Hat Hacker – Definitions

March 20, 2023

More Articles

Tool

Secure remove (SRM)

July 15, 2022

CyberSec First Responder: Threat Detection & Response CFR210

December 14, 2021
Incidents

UK state boarding school hit by cyberattack

March 16, 2023
Book

Key Risk Indicator A Complete Guide – 2021 Edition

June 22, 2022
Document

What Nonprofits Need to Know About Security

April 25, 2022
Incidents

Walmart Denies Being Hit by Yanlouwang Ransomware Attack

June 30, 2022
Alerts

CISA Adds 95 Known Exploited Vulnerabilities

March 3, 2022
Tool

BCP Development Software

June 16, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.