SUBSCRIBE TO EMAIL LIST – Free eBook
Spring 2020 Author’s Call: The Refractive Thinker® Vol XIX
The Refractive Thinker® Vol XIX: Social Media
Spring 2020 Author’s Call: The Refractive Thinker® Vol XVIII
The Refractive Thinker® Vol XVIII: Project Management
Fall 2018: RT: Vol XV: NON PROFITS
The Refractive Thinker® Vol XIV: HEALTH CARE
Fall 2017: RT Vol XIII: Entrepreneurship
RT Vol X: Special Military Edition Video
RT Vol X: Special Military Edition Video
Doctoral Editing Help is a Click Away
Award Winning Dissertation Editing
Dr. Cheryl developed a totally new approach to publishing for The Refractive Thinker.®.Dr. Edward KnabEmbry Riddle UniversityPalm Springs, CA
The Refractive Thinker® is a roadmap that discusses many dimensions of change management.Mary Beth HartlebPrism Global Management GroupHenderson, NV
Publishing in The Refractive Thinker® gives me more networking visibility. The prestige that comes with involvement in writing for The Refractive Thinker® is clear.Dr. Judy Fisher-BlandoCapella UniversityLa Mirada, CA
Cheryl is a special leader and visionary, a strong APA editor, and evolving publisher, and a great speaker. She is not afraid to fail in order to succeed and as a result accomplishes more than others might attempt.Dr. Tom WoodruffWalden UniversityGeorgetown, TX
To find the hidden open positions, you have to network with the ‘righ’t people and the members of The Refractive Thinker® community are ‘the right people’. After a recent layoff, I reached out to The Refractive Thinker® community to assist in my job search. Success!Dr. Karleen YappColorado State University-GlobalDelran, New Jersey
The Refractive Thinker® demonstrates a clear understanding of the doctoral learner’s need for professional networking, intellectual marketing of peer works.Dr. Lucy Surhyel NewmanLagos, Nigeria
The Refractive Thinker® series will help you integrate refractive thinking into your core strategies.Brian JudBook Marketing WorksAvon, CT
The authors contributing to this series are some of the best critical thinkers in their field of study.Dr. Rich SchuttlerPro Progress AcademyPhoenix, AZ
Publishing is an expensive venture, time consuming, and most times heartbreaking just trying to get through the door. Who has an easy time with rejection of what may be potentially life changing theories? Join The Refractive Thinker® Family where academic writing is economically published.Dr. Beverly CarterNew Rochelle, New York
“Dear Dr. Cheryl Lentz: As we are working towards completing my book, I find that your editing is very thorough and detailed. I wish many college professors can learn from your style”. Zack Hasan, Ph.D., P.E.
SummaryJoin Bill Bonney, Matt Stamper, and Gary Hayslip and contributing scholars for this next volume in the 15 time award winning series as they discuss current research regarding the challenges of the world of cybersecurity and its effects in and on the marketplace. This volume contains research shaping the conversation regarding what the future may hold to protect businesses and consumers regarding the perils of digital technology. As you read the pages ahead, we ask you to ask yourself: “What should I be doing to make a safer cyber world?” This is critically important if we’re to reap the benefits promised in this new digital age.
Marketing Video: https://www.youtube.com/watch?v=UqW8UN8A-gc&t=34s
One of the key factors that drove us to write the CISO Desk Reference Guide was the realization that we’re outmanned and out gunned. Outmanned in that we need thousands more cybersecurity specialists than are available today, and many firms are hiring their first Chief Information Security Officer (CISO). Out gunned in that the tools of the past, that aimed to deploy a firewall to protect a well-defined and completely self-contained enterprise network, are no longer even a meager deterrent for a mildly determined cybercriminal. We can no longer even draw the distinction between cybercrime and nation-state activity, as recent reports acknowledge that the criminals are almost as well equipped as the spies.
What is critically important is that we bring all the soft power and all the hard power we can muster against this threat. We envision a world that is safe from threats and to get there, society must become educated, we must act in unison, and we must become more informed consumers and a more informed electorate. As we engage more on how to make our world safer, we must recognize each person’s role and resist the temptation to assume our government or big industry bears sole responsibility. We didn’t eradicate most infectious disease in the developed world by leaving it to just the doctors, and we’re not going to rid the world of cybercrime and cyber terrorism by leaving it to the experts alone.
It is with this backdrop that Dr. Cheryl Lentz continues her award-winning Refractive Thinker® series by bringing forth PhD theses on cybersecurity in a new volume XII: Cybersecurity in an Increasingly Insecure World. In this pivotal work, her scholars are approaching the cybersecurity issue from all the right angles. Dr. Tracy Celaya and Dr. Adam Pierce look at the challenges of getting talent right in Human Resources in the Cloud: Hiring and Protecting Data and Hiring Outsourced Cybersecurity Professionals for Government Contracts, respectively. Dr. Ivan Salaberrios further explores the talent area, addressing how to hang out your own shingle. Several authors address cybersecurity issues in the realm of higher education, where profound changes must be made to bring critical skills to those who are preparing to enter the cyber workforce. These works include addressing integrity and ethics, as well as raising awareness of cybersecurity in the higher education domain, because yes, our schools are under attack as well.
These acclaimed authors bring critical thinking to many of the topics so important to the cybersecurity discussion. From setting policy as discussed by Dr. Loyce Chitambo to managing access in the cloud as put forth by Dr. Susie Schild and Dr. Robert Boggs these topics are timely and the need for scholarly treatment has never been greater.
As you read the pages ahead, we ask you to ask yourself: “What should I be doing to make a safer cyber world?” This is critically important if we’re to reap the benefits promised in this new digital age.
Cyber-attacks increase on a daily basis requiring organizational leaders to prepare people, systems, and processes to cross-functionally handle security. Otherwise, organizations can suffer high cost losses of revenue, talent, data, property, and more. This chapter examines the role of data security in implementing cloud technology for HR, talent acquisition, and security awareness training and development. With senior executive support, HR and IT can partner to provide a solid line of defense for information security.
Healthcare industry professional face evolving medical technology, new regulatory requirements, and they operate in challenging economic conditions. Armed knowledge of cybersecurity drivers, professionals can make investment decisions that balance healthcare business risks and patient safety needs. Failing to make careful and thoughtful decisions may cause financial damage or worse; a security breach may result the death of a patient. Business executives and cybersecurity professionals govern cybersecurity programs. However, healthcare executives who become refractive thinkers look beyond traditional technologies and practices to integrate knowledge of the total cybersecurity landscape in innovative ways to minimize risk to their organization’s assets and the safety of the lives entrusted to their care.