Recommended Cybersecurity and Privacy Reading List
Semper Sec has designed the below reading list to further educate the different levels of cybersecurity professionals. We hope to provide value to those involved with this industry and welcome all feedback in regards to the titles presented.
Top Management
The Age of AI and our Human Future by Kissinger, Henry, Eric Schmidt, and Daniel Huttenlocher
Why? Because Artificial Intelligence will increasingly affect all businesses.
The Digital Silk Road: China’s Quest to Wire the World and Win the Future by Hillman, Jonathan E.
Why? Because China is increasingly a powerful worldwide business competitor.
Tools and Weapons: The Promise and the Peril of the Digital Age by Smith, Brad, and Carol Ann Browne.
Why? Because they are top business leaders are speaking to top business leaders (and the rest of us).
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Isaacson, Walter
Why? Because it describes how an innovative business environment was created.
Privacy as Trust: Information Privacy for an Information Age by Waldman, Ari Ezra
Why? Because top management should have an overall understanding of privacy concepts.
Directors
The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win by Kim, Gene, Kevin Behr, and George Spafford
Why? Because it is a great fictional story, but with important business lessons.
The Unicorn Project: A Novel about Developers, Digital Disruption, and Thriving in the Age of Data by Kim, Jean
Why? Because it is Part II of the preceding book, also a great fictional story, but with important business lessons.
AI Ethics by Coeckelbergh, Mark.
Why? Because it is different view of the pitfalls and requirements as Artificial Intelligence becomes more pervasive.
Exploding Data: Reclaiming Our Cyber Security in the Digital Age by Chertoff, Michael
Why? Because the control of data is already pervasive.
How the World Ends: The Cyber Weapons Arms Race by Perlroth, Nicole
Why? Because senior leaders should be aware of international threats.
Privacy Program Management: Tools for Managing Privacy within Your Organization by Densmore, Russell
Why? Because senior leaders should be able to provide a more nuanced look when they talk privacy to Top Management.
Managers
Likewar: The Weaponization of Social Media by Singer, P.W. and Emerson T. Brooking
Why? Because managers need to understand social media hazards.
Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World by Menn, Joseph
Why? Because managers need to understand social media hazards.
Lights Out by Koppel, Edward J.
Why? Because managers should be aware of threats to their physical infrastructure.
Foundations of Information Privacy and Data Protection by Swire, Peter P. and Kenesa Ahmad
Why? Because managers should be able to give more privacy details to Top Management and senior leaders.
Analysts
Big Data: A Revolution That Will Transform How We Live, Work, and Think by Mayer-Schönberger, Viktor and Kenneth Cukier
Why? Because analysts need to understand big data concepts thoroughly.
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World by Schneier, Bruce.
Why? Because analysts need to understand big data concepts thoroughly.
Homeland Security: Assessing the First Five Years by Chertoff, Michael
Why? Because analysts need to know the history.
The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age by Sanger, David E.
Why? Because analysts need the ‘big picture.’
Entry Level
You need to do a lot of reading to ‘speak the language’
A Message to Garcia by Hubbard, Elbert
Why? Because if you can’t get the message to the right people, it does not matter and Chesty said so.
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground by Poulsen, Kevin
Why? Because you need to know the ‘legends’ of cybersecurity.
The President is Missing by Clinton, Bill, and James Patterson
Why? Because it is a fun book with a famous novelist with a cybersecurity slant.