Leadership in AI for Cybersecurity
A guide for the Practitioner Leader
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.
Add to Cart failed.
Por favor prueba de nuevo más tarde
Error al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tarde
Error al eliminar de la lista de deseos.
Por favor prueba de nuevo más tarde
Error al añadir a tu biblioteca
Por favor intenta de nuevo
Error al seguir el podcast
Intenta nuevamente
Error al dejar de seguir el podcast
Intenta nuevamente
Obtén 30 días de Standard gratis
$8.99 al mes después de que termine la prueba. Cancela en cualquier momento
Compra ahora por $9.95
-
Narrado por:
-
Virtual Voice
-
De:
-
David Tuffley
Este título utiliza narración de voz virtual
Voz Virtual es una narración generada por computadora para audiolibros..
Leadership in AI for Cybersecurity is written for the security professional who senses that gap and intends to close it. Its author, David Tuffley PhD, is an internationally recognised cybersecurity researcher and writer whose work sits at the intersection of operational security leadership, AI governance, and the human dimensions of digital risk. This is not a book of theory without application, nor a vendor prospectus dressed up as strategy. It is a rigorous, practically grounded, and at times uncomfortable reckoning with what effective security leadership actually requires when intelligent machines become both weapon and shield.
The book opens by mapping the new terrain. The SolarWinds compromise — one of the most consequential supply chain attacks in history — provides an early case study, not as a technical post-mortem but as a leadership autopsy. What failed there was not detection capability. What failed was the organisational and strategic thinking that surrounds it. The CISO, the book argues, can no longer afford to be a technical guardian who occasionally attends board meetings. The role demands strategic fluency, earned credibility across the C-suite and the frontline alike, and a cognitive shift from reactive defence to proactive anticipation.
From this foundation the book moves into the daily reality of leading people inside AI-augmented security operations. How do you build genuine AI literacy across a team without producing the shallow familiarity that is, in some ways, more dangerous than ignorance? How do you redesign roles when automated systems absorb tier-one triage? How do you hire for the judgment and curiosity that no algorithm will replicate? These are not rhetorical questions. Each receives a considered answer, grounded in case studies drawn from healthcare providers, financial institutions, professional services firms, and government agencies.
The strategic chapters address risk quantification, threat intelligence, and incident response — not as processes to be optimised in isolation, but as leadership disciplines. The book is especially sharp on the command challenge of AI-assisted incident response: when a system can act in milliseconds, the question of who retains authority — and how — becomes urgent in ways that traditional IR playbooks cannot accommodate.
Governance, ethics, and accountability form the book's moral core. The chapter on the ethics of automated defence confronts the attribution problem head-on: when an autonomous system responds to an attack, crossing legal or ethical lines in the process, who is responsible? The treatment of regulatory literacy is similarly unsentimental, guiding readers through the patchwork of GDPR, the EU AI Act, NIST frameworks, and sector-specific obligations without pretending that compliance and security are the same thing.
The book closes by looking forward — at adversarial AI, at deepfakes and model poisoning and prompt injection as strategic threats, at the approaching horizon of quantum computing, autonomous agents, and AI-versus-AI conflict.
The answer, it turns out, is demanding. But it is also within reach — for those willing to read carefully, think honestly, and lead with both technical fluency and human judgment. This book shows them how.
adbl_web_anon_alc_button_suppression_c
Todavía no hay opiniones