Part 1: The Biggest Breaches.- Chapter 1: The Root Causes.- Chapter 2: The Capital One Breach.- Chapter 3: The Marriott Breach.- Chapter 4: The Equifax Breach.- Chapter 5: Facebook Security Issues and the 2016 US Presidential Election.- Chapter 6: The OPM Breaches of 2014 and 2015.- Chapter 7: The Yahoo Breaches of 2013 and 2014.- Chapter 8: The Target and JPMorgan Chase Breaches of 2013 and 2014.- Part 2: How to Recover.- Chapter 9: The Seven Habits of Highly Effective Security.- Chapter 10: Advice for Boards of Directors.- Chapter 11: Advice for Technology and Security Leaders.- Chapter 12: Technology Defenses to Fight the Root Causes of Breach: Part One.- Chapter 13: Technology Defenses to Fight the Root Causes of Breach: Part Two.- Chapter 14: Cybersecurity Investments.- Chapter 15: Advice for Consumers.- Chapter 16: Applying Your Skills to Cybersecurity.- Chapter 17: Recap.-
Dr. Neil Daswani is Co-Director of the Stanford Advanced
Security Certification program, and is President of Daswani
Enterprises, his security consulting and training firm. He has
served in a variety of research, development, teaching, and
executive management roles at Symantec, LifeLock, Twitter, Dasient,
Google, Stanford University, NTT DoCoMo USA Labs, Yodlee, and
Telcordia Technologies (formerly Bellcore). At Symantec, he was
Chief Information Security Officer (CISO) for the Consumer Business
Unit, and at LifeLock he was the company-wide CISO. Neil has served
as Executive-in-Residence at Trinity Ventures (funders of Auth0,
New Relic, Aruba, Starbucks, and Bulletproof). He is an investor in
and advisor to several cybersecurity startup companies and venture
capital funds, including Benhamou Global Ventures, Firebolt,
Gravity Ranch Ventures, Security Leadership Capital, and Swift VC.
Neil is also co-author of Foundations of Security: What Every
Programmer Needs to Know(Apress).
Neil's DNA is deeply rooted in security research and development.
He has dozens of technical articles published in top academic and
industry conferences (ACM, IEEE, USENIX, RSA, BlackHat, and OWASP),
and he has been granted over a dozen US patents. He frequently
gives talks at industry and academic conferences, and has been
quoted by publications such as The New York Times, USA Today, and
CSO Magazine. He earned PhD and MS degrees in computer science at
Stanford University, and he holds a BS in computer science with
honors with distinction from Columbia University.
Dr. Moudy Elbayadi has more than 20 years of experience and
has worked with a number of high-growth companies and across a
variety of industries, including mobile and SaaS consumer services,
and security and financial services. Having held C-level positions
for leading solution providers, Dr. Elbayadi has a unique
360-degree view of consumer and enterprise SaaS businesses. Hehas a
consistent track record of defining technology and product
strategies that accelerate growth.
As CTO of Shutterfly, Dr. Elbayadi oversees all technology
functions including product development, cybersecurity, DevOps, and
machine learning/AI R&D functions. In this capacity he is
leading the technology platform transformation. Prior to
Shutterfly, Dr. Elbayadi held the position of SVP, Product &
Technology for Brain Corp, a San Diego-based AI company creating
transformative core technology for the robotics industry.
As advisor, Dr. Elbayadi has been engaged by CEOs and senior
executives of companies ranging from $10M to $2B in revenues.
Representative engagements include public cloud strategy, platform
integration and M&A strategy. He has advised numerous VC firms
on technology and prospective investments.
Dr. Elbayadi earned a doctorate in leadership and change from
Antioch University, a master’s degree in organizational leadership
from Chapman University, and a master’s degree in business
administration from the University of Redlands.
“There is a detailed table of contents and good index, and chapters conclude with succinct summaries. In essence, Daswani and Elbayadi have brought Fowler’s 2016 work [2] up to date. This is an excellent reference for anyone working in the area of ICT cybersecurity. Management in particular will find it useful, as the authors have tried to keep technical jargon to a minimum … that can be taken to protect and minimize the impact of cyberattacks on organizations.” (David B. Henderson, Computing Reviews, March 31, 2023)
![]() |
Ask a Question About this Product More... |
![]() |