The Book


The Vanishing Security Perimeter

With the advent of growing complex on-premises and hybrid cloud environments, BYOD and IoT, the security perimeter has disappeared. Identity is the new threat vector. The emergence of evolving advanced security analytics solutions represents Borderless Behavior Analytics – a comprehensive answer to address this growing challenge. In "Borderless Behavior Analytics – Who's Inside? What're They Doing?" – now in its second edition – twelve CISO and CIO leaders share their insights on this next generation of technology evolution and the challenges behind it.

"Existing security defenses were built to protect an enterprise architecture that no longer exists."

                                                 Joe Sullivan – Former Uber CSO, Past Facebook CISO

Author & Contributors


 

Saryu Nayyar

AUTHOR — CEO, Gurucul, a recognized visionary in the information security and risk industry, she held leadership roles with Oracle, Sun Microsystems, Ernst & Young and Disney.

Connect

Jerry  Archer

CSO of Major Financial Services Company, with 30 years of security experience at leading companies and government agencies, including Intuit, Visa, and the CIA.

Connect

Gary Eppinger

Global VP, CISO, for Carnival Corporation, ranked 24th in ExecRank’s “Top Security Executives”, has experience in a wide range of verticals.

Connect

Gary Harbison

CISO for Monsanto, has over 20 years of experience in information security, including multiple Fortune 500 companies and the US Dept. of Defense.

Connect

Leslie K. Lambert

Former CISO, Sun Microsystems & Juniper Networks, has 30 years experience in IS, intrusion detection, threat assessments and mitigation. ​

Connect

Robert Rodriguez

Chairman, Founder of the Security Innovation Network™ (SINET), advancing public and private sector innovations in cybersecurity.

Connect

Joe Sullivan

CISO at Cloudflare Inc. Former CSO of Uber; Past CISO of Facebook; a member of President Obama’s Commission on Enhancing National Cybersecurity.

Connect

Teri Takai

CIO at large, she served as CIO and EVP of Meridian Health Plan, CIO for the Department of Defense and the State of California.​

Connect

Devin Bhatt

CISO and Chief Privacy Officer, U.S. Federal Agency; past VP and CISO, WEX Inc.; CSO, Airline Reporting Company (ARC); CSO magazine's Compass award winner (2007)

Connect

Nilesh Dherange

CTO, Gurucul, technologist and leader at three software startups; built a roles and compliance product acquired by Sun Microsystems; Co-founder BON Marketing Group

Connect

Jairo Orea

CISO for Kimberly-Clark, previously Chief Information Security Architect at UnitedHealth Group; Chief Architect for the Trusted Cloud Initiative (Cloud Security Alliance)

Connect

Jim Routh

CSO for Aetna; Chairman, NH-ISAC board; past FS-ISAC board member; Global Head, App and Mobile Security JP Morgan Chase; CISO for KPMG, DTCC and American Express

Connect

William Scandrett

William Scandrett

CISO, Allina Health, past CISO for HealthEast; Information Security Director role, Ameriprise Financial, led the IT Compliance program at GMAC ResCap

Connect

“Borderless Behavior Analytics" identifies the challenges behind a critical new class of security threat which CISOs should be aware of. The experts provide informative and insightful information. This book should be a standard reference for security leaders.

   - Renee Guttmann-Stark, CISO
“This book represents one of the important new entries in the CIO and CISO’s library."

   - Vishal Salvi, CISO, Infosys

Buy the Book


 

Borderless Behavior Analytics Book Small

 Now Available:

Print $24.95

Kindle $8.95

Recent Blogs


The Vanishing Security Perimeter

The security perimeter has faded. Old defenses for environments can no longer be relied upon to ensure an organization’s protection from rising threats.

What is the Threat Surface Equation?

In her Borderless Behavior Analytics chapter, entitled Identity, Access Risks and Access Outliers, CIO at Large Teri Takai offers a number of relevant observations.

Predictive Security Analytics Use Cases

The range of predictive security analytics use cases a UEBA-IdA (user and entity behavior analytics – identity analytics) vendor offers fundamentally defines the maturity of their solution...