Takeaways From Five Books Executives Should Read Now

Takeaways From Five Books Executives Should Read Now

Business risk management challenges never disappear. Executives must make sure their organization’s information is as secure as possible. Nowadays, we resolve one threat only to face a more sophisticated attack.

This steady flow of danger requires a thoughtful approach to improve risk management. Instead of relying exclusively on instant analysis and the latest white papers, I prefer an eclectic approach to managing both business risk and cybersecurity challenges. At times, insights emerge from unlikely sources — like a good book that's hiding in plain sight.

Here are five books I've read that have given me surprisingly fresh awareness into better cybersecurity.

1. The Inevitable: Understanding The 12 Technological Forces That Will Shape Our Future

Written by Wired magazine co-founder/senior maverick Kevin Kelly, this book outlines a dozen accelerating forces that are already in motion and how each will inevitably dictate our lives.

While all 12 are fascinating (for instance, all surfaces will soon be touch screens), it's his vision of artificial intelligence (AI) that hits home for any leader grappling with security. Kelly points out that today's off-the-grid AI solutions will meld into a single resource, growing exponentially thanks to 7 billion humans and quintillions of transistors. It's our job to harness and apply AI to address the difference between perception and reality of cybersecurity risk.

2. Moneyball: The Art Of Winning An Unfair Game

Written by Michael Lewis (and made into a feature film), this book follows Billy Beane, the general manager of Major League Baseball's Oakland Athletics, and his drive to make the team successful on a shoestring budget. There are many layers to the book and several lessons yet to be learned.

Outspent by richer teams, Beane leveled the playing field by using statistics and analysis to better gauge a player's value. While other teams paid top dollar for stars who drove in runs and had high batting averages, Beane's research found that on base percentage and slugging percentage were better indicators of future success. Players with these stats were available for a fraction of the price. The Oakland A's succeeded while keeping their payroll down.

The parallels here are obvious. By more precisely using statistics and analysis, you can find a path to optimize protection. For example, a security alert is a common statistic. As the A's determined, not all statistics should be treated the same. The key is focusing on intelligence that delivers the best return.

3. Antifragile: Things That Gain From Disorder

Written by former hedge fund manager Nissim Nicholas Taleb, Antifragile addresses the surprising fact that rather than breaking under pressure, some things actually thrive on stress, disorder and chaos.

A real-world example is a bone in your leg, which grows stronger when exposed to heavier loads. The book discusses the many factors involved, including that an antifragile system must be made up of individual parts that are fragile themselves — thus allowing feedback so the overall system can learn and benefit from the volatility and shock.

This concept has many interesting ramifications in business, not the least of which is taking comfort in the fact that when your company survives a minor malware attack, this breach can help strengthen your overall security posture if managed correctly. Antifragility can also help you when creating your security strategy. Should you focus on ransomware or phishing? ISO framework or SOC2? How important is time to detection versus incident close?

4. Bear Snores On

Don't laugh. This classic children's book by Karma Wilson helps us see how the most insightful lessons can often be gleaned from anywhere — whether it's a bedtime story, a 1980s TV sitcom or graffiti on the side of a dumpster. Inspiration is where you find it, and this tale has some wonderful wisdom to impart. I love reading this book to my children, and I'm half tempted to read it to my colleagues as well.

While Bear hibernates, his friends gather in his cave and go on about their lives — popping popcorn, brewing tea and making stew. "But the bear snores on," as the book periodically mentions. When Bear wakes up (thanks to his big sneeze from the stew's pepper), he's cranky because his friends have had fun while he slumbered.

Therein lies the simple nugget of revelation: You can't expect good things to happen while you're not paying attention. As a CISO will tell you, it's critical to always be awake, alert, vigilant and aware of your surroundings. Don't snore on, comfortable in the existing security you've worked so hard to build. You may need a wake-up call now and again.

5. Never Split The Difference: Negotiating As If Your Life Depended On It

Written by Chris Voss, a former international hostage negotiator for the FBI, this book highlights his unique career and life experiences and offers insights on how to successfully negotiate anything.

Negotiating highlights run the gamut, from the importance of listening and using open-ended questions to creating an illusion in the mind of the person across the table from you that they're in control. However, perhaps the most important lesson is understanding how "no" is often a better alternative than "yes." "No" actually starts the negotiation, and it's where you go from there that makes all the difference.

For almost any businessperson, the applications of this book's lessons are numerous. Whether you're negotiating a ransomware payout with a cybercriminal or additional budget from the board, you'll be well prepared for the discussion.

Put these ideas to work for you.

I've only scratched the surface here. As a cybersecurity and innovation expert who aims to stay ahead of threats and keep teams happy and productive, I invite you to take the learnings in these books to heart while preparing the most effective risk solutions.

This article was originally published on Forbes.com.

Marielos S.

I help you figure out creative ways to tell people about your products & make a plan and lead the team to turn those ideas into reality

4 年

It's the Manager by Jim Clifton and Jim Harter... must read if you manage people in any capacity.

Matt Treacey

Head of Marketing & Growth at NightCafe | Author of Natural Orders

4 年

Solid suggestions. Thanks, Akshay!

TrainOmatix (TMS)

Training Management Software for training companies, corporates and trainers!

4 年

The Entrepreneur's Framework by Joshua Davidson is first rate ...

Cherf Eddine ZAREB ???? ??? ?????

Superviseur Formateur de Centre D'Appel | Translator | Ancient languages enthusiast | Polyglot

4 年

Wow, good ones! Just for fun, my tip is "The Underground Railroad" (Colson Whitehead) for storytelling in historic context about values we hold dear.

Kayla Siegmeier

Marketing Leader | Loyalty & CRM Expert | Driving Customer Engagement & Revenue Growth through Data-Driven Strategies and MarTech Solutions

4 年

Insightful suggestions, and presumably just as relevant in a non-security context. Well done Akshay ??

要查看或添加评论,请登录

Akshay Bhargava的更多文章

  • Reaching Zen In Cybersecurity

    Reaching Zen In Cybersecurity

    Cybersecurity is not a task you can schedule time for when it's convenient. The challenges are unpredictable but…

    71 条评论
  • Stalkerware: The Growing Hidden-Software Crisis

    Stalkerware: The Growing Hidden-Software Crisis

    The defining feature of 2020 is the global coronavirus pandemic, and a grim effect of the stay-at-home orders has been…

    47 条评论
  • 3 Practices to Avoid Security Risk in A Work from Home World

    3 Practices to Avoid Security Risk in A Work from Home World

    Well before COVID-19 hastened people working from home, users embraced “bring your own device” (BYOD) practices. It…

    58 条评论
  • Democratizing Cybersecurity Protects Us All

    Democratizing Cybersecurity Protects Us All

    Cybersecurity is a sophisticated art. It can truly consume the time and resources of IT teams as they work to safeguard…

    70 条评论
  • How Boards Can Address the Growing Challenge of Cyber Threats

    How Boards Can Address the Growing Challenge of Cyber Threats

    When Honda was hit with a crippling cyberattack in early June, the company had to shut down factories worldwide and…

    42 条评论
  • How Can Your SMB Handle Ransomware and Other Cyberthreats?

    How Can Your SMB Handle Ransomware and Other Cyberthreats?

    The novel coronavirus has changed everything in 2020 and beyond for executives of small and medium-sized businesses…

  • Bring Your Own Privacy

    Bring Your Own Privacy

    Guess what. You’ve been invited to a party, and you’re the guest of honor! OK, maybe not so much a party as a mugging.

    1 条评论
  • Consumerization: A Better Answer To Cybersecurity Challenges

    Consumerization: A Better Answer To Cybersecurity Challenges

    Consumerization: The specific impact that consumer-originated technologies can have on enterprises. - Gartner More and…

    3 条评论
  • Making a standout advertisement

    Making a standout advertisement

    Of the ads you saw today, how many do you remember? Better yet, how many ads did you see? According to research by The…

    4 条评论
  • As internet turns 50, more risks and possibilities emerge

    As internet turns 50, more risks and possibilities emerge

    We occupy a richly connected world. On the internet we collapse distance and shift time.

    2 条评论

社区洞察

其他会员也浏览了