SUBSCRIBE TO EMAIL LIST – Free eBook
Spring 2020 Author’s Call: The Refractive Thinker® Vol XIX
The Refractive Thinker® Vol XIX: Social Media
Spring 2020 Author’s Call: The Refractive Thinker® Vol XVIII
The Refractive Thinker® Vol XVIII: Project Management
Fall 2018: RT: Vol XV: NON PROFITS
The Refractive Thinker® Vol XIV: HEALTH CARE
Fall 2017: RT Vol XIII: Entrepreneurship
RT Vol X: Special Military Edition Video
RT Vol X: Special Military Edition Video
Doctoral Editing Help is a Click Away
Award Winning Dissertation Editing
My promotion to full Professor was just approved. According to the feedback I’ve received, my chapter in The Refractive Thinker was a factor in establishing my scholarship credentials.Dr. Joseph PughProfessor
Cheryl is a special leader and visionary, a strong APA editor, and evolving publisher, and a great speaker. She is not afraid to fail in order to succeed and as a result accomplishes more than others might attempt.Dr. Tom WoodruffWalden UniversityGeorgetown, TX
Dr. Cheryl developed a totally new approach to publishing for The Refractive Thinker.®.Dr. Edward KnabEmbry Riddle UniversityPalm Springs, CA
Publishing in The Refractive Thinker® gives me more networking visibility. The prestige that comes with involvement in writing for The Refractive Thinker® is clear.Dr. Judy Fisher-BlandoCapella UniversityLa Mirada, CA
To find the hidden open positions, you have to network with the ‘righ’t people and the members of The Refractive Thinker® community are ‘the right people’. After a recent layoff, I reached out to The Refractive Thinker® community to assist in my job search. Success!Dr. Karleen YappColorado State University-GlobalDelran, New Jersey
The Refractive Thinker® demonstrates a clear understanding of the doctoral learner’s need for professional networking, intellectual marketing of peer works.Dr. Lucy Surhyel NewmanLagos, Nigeria
Dr. Cheryl is a very brilliant woman, teacher, coach, friend, and a leader. I was attracted to her because of her unselfishness, and a willing heart to not only share the knowledge she has with those around her, but also to empower them to look beyond themselves. Dr. Cheryl, I thank you for everything, your wisdom, coaching, and for giving me a wing to fly on. You are an amazing strong woman and a great friend that shares all she has!Eva KatushabeLas Vegas, NV
The Refractive Thinker® is a roadmap that discusses many dimensions of change management.Mary Beth HartlebPrism Global Management GroupHenderson, NV
The Refractive Thinker® series will help you integrate refractive thinking into your core strategies.Brian JudBook Marketing WorksAvon, CT
“Dear Dr. Cheryl Lentz: As we are working towards completing my book, I find that your editing is very thorough and detailed. I wish many college professors can learn from your style”. Zack Hasan, Ph.D., P.E.
SummaryThe headlines have been screaming for several years about cyber-attacks that hit every aspect of our daily lives. What once was solely the province of credit card fraud has now extended to phishing for personal details. Infections bring malicious code that does everything from destroy your hard disk to steal your personal information to encrypt your files and hold them for ransom to turn your PC or cell phone, or even TV, into a mindless drone in a massive bot army ready to wreak havoc in your digital name. Where does it stop? We can no longer trust the news now that bots push fake news to drive up clicks, we worry about the lights going off because power plants are under siege, and now we wonder if we can trust our elections.
One of the key factors that drove us to write the CISO Desk Reference Guide was the realization that we’re outmanned and out gunned. Outmanned in that we need thousands more cybersecurity specialists than are available today, and many firms are hiring their first Chief Information Security Officer (CISO). Out gunned in that the tools of the past, that aimed to deploy a firewall to protect a well-defined and completely self-contained enterprise network, are no longer even a meager deterrent for a mildly determined cybercriminal. We can no longer even draw the distinction between cybercrime and nation-state activity, as recent reports acknowledge that the criminals are almost as well equipped as the spies.
What is critically important is that we bring all the soft power and all the hard power we can muster against this threat. We envision a world that is safe from threats and to get there, society must become educated, we must act in unison, and we must become more informed consumers and a more informed electorate. As we engage more on how to make our world safer, we must recognize each person’s role and resist the temptation to assume our government or big industry bears sole responsibility. We didn’t eradicate most infectious disease in the developed world by leaving it to just the doctors, and we’re not going to rid the world of cybercrime and cyber terrorism by leaving it to the experts alone.
It is with this backdrop that Dr. Cheryl Lentz continues her award-winning Refractive Thinker® series by bringing forth PhD theses on cybersecurity in a new volume XII: Cybersecurity in an Increasingly Insecure World. In this pivotal work, her scholars are approaching the cybersecurity issue from all the right angles. Dr. Tracy Celaya and Dr. Adam Pierce look at the challenges of getting talent right in Human Resources in the Cloud: Hiring and Protecting Data and Hiring Outsourced Cybersecurity Professionals for Government Contracts, respectively. Dr. Ivan Salaberrios further explores the talent area, addressing how to hang out your own shingle. Several authors address cybersecurity issues in the realm of higher education, where profound changes must be made to bring critical skills to those who are preparing to enter the cyber workforce. These works include addressing integrity and ethics, as well as raising awareness of cybersecurity in the higher education domain, because yes, our schools are under attack as well.
These acclaimed authors bring critical thinking to many of the topics so important to the cybersecurity discussion. From setting policy as discussed by Dr. Loyce Chitambo to managing access in the cloud as put forth by Dr. Susie Schild and Dr. Robert Boggs these topics are timely and the need for scholarly treatment has never been greater.
As you read the pages ahead, we ask you to ask yourself: “What should I be doing to make a safer cyber world?” This is critically important if we’re to reap the benefits promised in this new digital age.