So you want to write a book about AI and cybersecurity? [CSO Perspectives]
Update: 2024-11-25
Description
Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, turns over hosting duties to Caroline Wong, the Chief Strategy Officer at Cobalt to discuss the mechanics of writing a cybersecurity book about AI.
References:
Ben Smith. “Security Metrics: A Beginner’s Guide” Review [Review]. Cybersecurity Canon Project.
Caroline Wong, 2011. Security Metrics, A Beginner’s Guide [Book]. Goodreads.
Rick Howard. Security Metrics, A Beginner’s Guide [Review]. Cybersecurity Canon Project.
Learn more about your ad choices. Visit megaphone.fm/adchoices
Comments
In Channel

![So you want to write a book about AI and cybersecurity? [CSO Perspectives] So you want to write a book about AI and cybersecurity? [CSO Perspectives]](https://megaphone.imgix.net/podcasts/ba9ba1c6-a776-11ef-8877-e76898b0e095/image/a8faf2e540e1a39f41973fd62274ee60.png?ixlib=rails-4.3.1&max-w=3000&max-h=3000&fit=crop&auto=format,compress)
![Tech Investment Strategies and Overview [CISOP] Tech Investment Strategies and Overview [CISOP]](https://megaphone.imgix.net/podcasts/714ca95e-d469-11f0-b962-03da25c0eafd/image/4576c79a6260b29daaff0ea0480913c0.png?ixlib=rails-4.3.1&max-w=3000&max-h=3000&fit=crop&auto=format,compress)
![Quantum [CISOP] Quantum [CISOP]](https://megaphone.imgix.net/podcasts/f9558cb0-cb06-11f0-bde7-0f479da5a13c/image/4576c79a6260b29daaff0ea0480913c0.png?ixlib=rails-4.3.1&max-w=3000&max-h=3000&fit=crop&auto=format,compress)
![AI and cyber practicum [CISOP] AI and cyber practicum [CISOP]](https://megaphone.imgix.net/podcasts/9c467642-c94e-11f0-b4e4-97c119f0cd1f/image/4576c79a6260b29daaff0ea0480913c0.png?ixlib=rails-4.3.1&max-w=3000&max-h=3000&fit=crop&auto=format,compress)
![AI's impact on business [CISOP] AI's impact on business [CISOP]](https://megaphone.imgix.net/podcasts/0d5099ac-c3fb-11f0-ac1a-43f12b033f5a/image/4576c79a6260b29daaff0ea0480913c0.png?ixlib=rails-4.3.1&max-w=3000&max-h=3000&fit=crop&auto=format,compress)
![A midseason takeaway. [CISO Perspectives] A midseason takeaway. [CISO Perspectives]](https://megaphone.imgix.net/podcasts/e60b9a5c-b8ee-11f0-9339-83476cf1cb54/image/4576c79a6260b29daaff0ea0480913c0.png?ixlib=rails-4.3.1&max-w=3000&max-h=3000&fit=crop&auto=format,compress)
![Fraud and Identity [CISO Perspectives] Fraud and Identity [CISO Perspectives]](https://megaphone.imgix.net/podcasts/6b0f15de-b35f-11f0-95e4-c39668b06a85/image/4576c79a6260b29daaff0ea0480913c0.png?ixlib=rails-4.3.1&max-w=3000&max-h=3000&fit=crop&auto=format,compress)
![The changing face of fraud. [CISO Perspectives] The changing face of fraud. [CISO Perspectives]](https://megaphone.imgix.net/podcasts/78fd2e80-adea-11f0-818b-83f6387791db/image/4576c79a6260b29daaff0ea0480913c0.png?ixlib=rails-4.3.1&max-w=3000&max-h=3000&fit=crop&auto=format,compress)
![Privacy needs where you least expect it. [CISO Perspectives] Privacy needs where you least expect it. [CISO Perspectives]](https://megaphone.imgix.net/podcasts/0dfe86b8-ade7-11f0-a2dc-07b764f5400a/image/bed1487d4770d4dc046135517c6d5ca5.png?ixlib=rails-4.3.1&max-w=3000&max-h=3000&fit=crop&auto=format,compress)
![The impact of data privacy on cyber. [CISO Perspectives] The impact of data privacy on cyber. [CISO Perspectives]](https://megaphone.imgix.net/podcasts/f6eb5456-ade6-11f0-8072-ebf27e637743/image/bed1487d4770d4dc046135517c6d5ca5.png?ixlib=rails-4.3.1&max-w=3000&max-h=3000&fit=crop&auto=format,compress)
![Regulation takeaways with Ethan Cook. [CISO Perspectives] Regulation takeaways with Ethan Cook. [CISO Perspectives]](https://megaphone.imgix.net/podcasts/a5b3d982-ade6-11f0-9244-83ae0821c9f6/image/bed1487d4770d4dc046135517c6d5ca5.png?ixlib=rails-4.3.1&max-w=3000&max-h=3000&fit=crop&auto=format,compress)
![The return of CISO Perspectives. [CISO Perspectives] The return of CISO Perspectives. [CISO Perspectives]](https://megaphone.imgix.net/podcasts/c50b1018-9273-11f0-999a-1395058a518e/image/4576c79a6260b29daaff0ea0480913c0.png?ixlib=rails-4.3.1&max-w=3000&max-h=3000&fit=crop&auto=format,compress)


