Dr. Cheryl is a very brilliant woman, teacher, coach, friend, and a leader. I was attracted to her because of her unselfishness, and a willing heart to not only share the knowledge she has with those around her, but also to empower them to look beyond themselves. Dr. Cheryl, I thank you for everything, your wisdom, coaching, and for giving me a wing to fly on. You are an amazing strong woman and a great friend that shares all she has!Eva KatushabeLas Vegas, NV
Dr. Cheryl developed a totally new approach to publishing for The Refractive Thinker.®.Dr. Edward KnabEmbry Riddle UniversityPalm Springs, CA
“Dear Dr. Cheryl Lentz: As we are working towards completing my book, I find that your editing is very thorough and detailed. I wish many college professors can learn from your style”. Zack Hasan, Ph.D., P.E.
To find the hidden open positions, you have to network with the ‘righ’t people and the members of The Refractive Thinker® community are ‘the right people’. After a recent layoff, I reached out to The Refractive Thinker® community to assist in my job search. Success!Dr. Karleen YappColorado State University-GlobalDelran, New Jersey
My promotion to full Professor was just approved. According to the feedback I’ve received, my chapter in The Refractive Thinker was a factor in establishing my scholarship credentials.Dr. Joseph PughProfessor
Publishing in The Refractive Thinker® gives me more networking visibility. The prestige that comes with involvement in writing for The Refractive Thinker® is clear.Dr. Judy Fisher-BlandoCapella UniversityLa Mirada, CA
The Refractive Thinker® demonstrates a clear understanding of the doctoral learner’s need for professional networking, intellectual marketing of peer works.Dr. Lucy Surhyel NewmanLagos, Nigeria
The Refractive Thinker® series will help you integrate refractive thinking into your core strategies.Brian JudBook Marketing WorksAvon, CT
The Refractive Thinker Press is an established brand, doing an incredible job marketing the books and authors on social media. My colleagues expressed their admiration for my publications, seeing my books on Amazon, Barns & Nobles, & other websites/bookstores. I have been invited to several Think-Tanks, fellowships, and Visiting Scholar appointments, where different committee members cited seeing my books in blogs, press-releases, Google Scholar, and university libraries. The RT press increased … Read moreDr. Emad RahimEndowed Entrepreneur-in-Residence, Oklahoma State University Visiting Scholar, Rutgers University
Publishing is an expensive venture, time consuming, and most times heartbreaking just trying to get through the door. Who has an easy time with rejection of what may be potentially life changing theories? Join The Refractive Thinker® Family where academic writing is economically published.Dr. Beverly CarterNew Rochelle, New York
RT Vol XII: FOREWORD
From the Book: The Refractive Thinker® Vol XII: CYBERSECURITY
SummaryThe headlines have been screaming for several years about cyber-attacks that hit every aspect of our daily lives. What once was solely the province of credit card fraud has now extended to phishing for personal details. Infections bring malicious code that does everything from destroy your hard disk to steal your personal information to encrypt your files and hold them for ransom to turn your PC or cell phone, or even TV, into a mindless drone in a massive bot army ready to wreak havoc in your digital name. Where does it stop? We can no longer trust the news now that bots push fake news to drive up clicks, we worry about the lights going off because power plants are under siege, and now we wonder if we can trust our elections.
One of the key factors that drove us to write the CISO Desk Reference Guide was the realization that we’re outmanned and out gunned. Outmanned in that we need thousands more cybersecurity specialists than are available today, and many firms are hiring their first Chief Information Security Officer (CISO). Out gunned in that the tools of the past, that aimed to deploy a firewall to protect a well-defined and completely self-contained enterprise network, are no longer even a meager deterrent for a mildly determined cybercriminal. We can no longer even draw the distinction between cybercrime and nation-state activity, as recent reports acknowledge that the criminals are almost as well equipped as the spies.
What is critically important is that we bring all the soft power and all the hard power we can muster against this threat. We envision a world that is safe from threats and to get there, society must become educated, we must act in unison, and we must become more informed consumers and a more informed electorate. As we engage more on how to make our world safer, we must recognize each person’s role and resist the temptation to assume our government or big industry bears sole responsibility. We didn’t eradicate most infectious disease in the developed world by leaving it to just the doctors, and we’re not going to rid the world of cybercrime and cyber terrorism by leaving it to the experts alone.
It is with this backdrop that Dr. Cheryl Lentz continues her award-winning Refractive Thinker® series by bringing forth PhD theses on cybersecurity in a new volume XII: Cybersecurity in an Increasingly Insecure World. In this pivotal work, her scholars are approaching the cybersecurity issue from all the right angles. Dr. Tracy Celaya and Dr. Adam Pierce look at the challenges of getting talent right in Human Resources in the Cloud: Hiring and Protecting Data and Hiring Outsourced Cybersecurity Professionals for Government Contracts, respectively. Dr. Ivan Salaberrios further explores the talent area, addressing how to hang out your own shingle. Several authors address cybersecurity issues in the realm of higher education, where profound changes must be made to bring critical skills to those who are preparing to enter the cyber workforce. These works include addressing integrity and ethics, as well as raising awareness of cybersecurity in the higher education domain, because yes, our schools are under attack as well.
These acclaimed authors bring critical thinking to many of the topics so important to the cybersecurity discussion. From setting policy as discussed by Dr. Loyce Chitambo to managing access in the cloud as put forth by Dr. Susie Schild and Dr. Robert Boggs these topics are timely and the need for scholarly treatment has never been greater.
As you read the pages ahead, we ask you to ask yourself: “What should I be doing to make a safer cyber world?” This is critically important if we’re to reap the benefits promised in this new digital age.