Richard Stiennon

OK
About Richard Stiennon
Richard Stiennon is an influential industry analyst. He is the author of Surviving Cyberwar (Rowman&Littlefield, 2010) and UP and to the RIGHT: Strategy and Tactics of Analyst Influence (IT-Harvest Press, 2012). There Will Be Cyberwar, is a revelation of the vulnerabilities in the Internet of Military Things. It became a Washington Post Best Seller in April, 2016. Secure Cloud Transformation: The CIO's Journey tracks the stories of 16 pioneers as they built their cloud-first strategies for IT.
Security Yearbook 2020 was launched in February, 2020. It is the only history of the IT security industry. It is updated each year with a complete directory of all the vendors of security products listed by Category and Country.
Stiennon's 28 years of tech experience, first as the founder of RustNet, an ISP in Michigan, to an ethical hacker for PricewaterhouseCoopers, then as an analyst, and as an executive at several technology firms, has given him a broad perspective in how the world of tech works.
All of Stiennon's experience shows in his latest book: Curmudgeon: How to Succeed as an Industry Analyst. Becoming an industry analyst is a great career path for anyone who is an expert in their field.
Stiennon was named one of the "50 Most Powerful People in Networking" by Network World Magazine. He has 66,000 followers on Twitter @cyberwar. He earned his B.S. in aerospace engineering from the University of Michigan and an MA in War in the modern world from King's College, London.
Customers Also Bought Items By
Are you an author?
Author Updates
-
-
-
Blog postSince the role of CISO was invented by Citibank in 1995 there have been frequent debates on reporting structure. The most common shape for that debate is: should the Chief Information Security Officer report to the CIO or the CEO? As someone who lived through the great quality revolution in automotive, I have long advocated for the CISO to report directly to the CEO. In recent months I have come to the further realization that it is time for the CIO to report to the CISO.
L5 years ago Read more -
-
-
Titles By Richard Stiennon
Military and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon argues the era of cyber warfare has already begun. Recent cyber attacks on United States government departments and the Pentagon corroborate this claim. China has compromised email servers at the German Chancellery, Whitehall, and the Pentagon. In August 2008, Russia launched a cyber attack against Georgia that was commensurate with their invasion of South Ossetia. This was the first time that modern cyber attacks were used in conjunction with a physical attack.
Every day, thousands of attempts are made to hack into America's critical infrastructure. These attacks, if successful, could have devastating consequences. In Surviving Cyberwar, Stiennon introduces cyberwar, outlines an effective defense against cyber threats, and explains how to prepare for future attacks.
The book:
- begins with Shawn Carpenter and his discovery that China had hacked into his work place, Sandia Labs;
- follows the rise of cyber espionage on the part of the Chinese People's Liberation Army (PLA) as increasingly sophisticated and overt attacks are carried out against government and military networks around the world;
- moves from cyber espionage to cyberwar itself, revealing the rise of distributed denial of service (DDoS) as a means of attacking servers, websites, and countries;
- provides a historical perspective on technology and warfare is provided, drawing on lessons learned from Sun Tsu to Lawrence of Arabia to Winston Churchill; and
- finishes by considering how major democracies are preparing for cyberwar and predicts ways that a new era of cyber conflict is going to impact the Internet, privacy, and the way the world works.
This text is a stimulating and informative look at one of the gravest threats to Homeland Security today, offering new insights to technologists on the front lines, helping policy makers understand the challenges they face, and providing guidance for every organization to help reduce exposure to cyber threats. It is essential reading for anyone concerned with the current geopolitical state of affairs.