Acknowledgments

While one person may be responsible for actually writing a book, it is by no means a solitary pursuit. Certainly that was the case with Cyber Threat! My thinking about the evolution of the asymmetric cyber threat has been shaped by many people whose opinions and perspectives I respect. While we do not always agree on every issue, I do believe that the big cyber threat picture is coming clearly into focus and that we agree on many aspects of the problem and the solutions. Unhesitatingly, I would say that without their contributions, this book would not have been possible. In many ways this is a race against time, a race to close the gaps before the digital barbarians get through the gate. On that we all agree. Whatever deficiencies this volume may suffer are the fault of the author, not those who generously contributed their time and expertise.

The cyber threat is not just a computer or technology issue. It is a fundamental business and industry issue, comprised of technology and human behavior. It is a problem that has leached into virtually every dimension and aspect of life. As a threat, it packs a powerful blow. Balancing the threat against the necessity of all things cyber is a delicate exercise. As they say, it's complicated. It also requires many vantage points. I have been fortunate in receiving many perspectives on the subject.

Writing a book is a family affair, and this one was no exception. All we have is time, and how we spend it matters. I felt this ...

Get Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.