SECURITY THROUGH DATA

CYBER 101

  • Blog
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Entertainment
  • FAQ

Cyber Risks

  • Alerts
  • Attackers
  • Incidents
  • Threats

Cyber Education

  • Books
  • Certifications
  • Courses
  • Definitions
  • Documents
  • Domains
  • Quotes
  • Tutorials
  • Trivia
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
No Result
View All Result

Cyber Review: Cybersecurity The Lost Decade

1 min read
in Cyber Review, Cyber101

Today, we’re talking with JC Gaillard about his book Cybersecurity The Lost Decade.

He is the Founder and Managing Director of Corix Partners. He is a leading consultant, a senior executive, and a team builder with more than 25 years of experience in the field. developed in several global financial institutions in the UK and continental Europe, and a track record at driving fundamental change in the Security field across global organizations, looking beyond the technical horizon into strategy, governance, culture, and the real dynamics of transformation.

A few questions for JC Gaillard:

  1. How did you get into cybersecurity?
  2. Who is this book for?
  3. You wrote this book back in 2015 and now you have published the 5th edition. What do you think has changed from 2015 to 2022?
  4. You opened the book with a bold statement. Cybersecurity is not a risk. Why is that?

Related

Tags: Cyber ProfessionalsCyber Professionals VideosCyber ReviewCybersecurity The Lost DecadeJC Gaillard
13
VIEWS
ADVERTISEMENT

Related Posts

Structured Threat Hunting

Structured Threat Hunting

June 28, 2022
Unstructured Threat Hunting

Unstructured Threat Hunting

June 28, 2022
Endpoint Detection and Response (EDR)

Endpoint Detection and Response (EDR)

June 28, 2022
Strategic Intelligence

Strategic Intelligence

June 28, 2022

More Articles

Quotes

“The Security Architect role requires…”

March 7, 2022
Book

Forensics To Expose Cybercriminals A Complete Guide – 2019 Edition

January 19, 2022
Alerts

Fortinet Security Advisory

November 29, 2021
Alerts

CISA Adds 9 Known Exploited Vulnerabilities

April 15, 2022

TOR DARKNET: Master the Art of Invisibility

February 11, 2021
Document

The Absolute Guide to SIEM – Report

March 15, 2022

Arrested DevOps – Podcast

January 27, 2022

Sinclair Confirms Ransomware Attack That Disrupted TV Stations

October 18, 2021
Load More
ADVERTISEMENT

© 2022 | CyberMaterial | All rights reserved.

  • About us
  • Contact
  • Legal and Privacy Policy
No Result
View All Result
  • Cyber101
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Incidents
    • Threats
  • Cyber Education
    • Book
    • Certification
    • Course
    • Definition
    • Document
    • Quotes
    • Tutorials

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Posting....