Quantum Cybersecurity Program Management
Ashkan Memari, Gregory J. Skulmoski
* Affiliatelinks/Werbelinks
Links auf reinlesen.de sind sogenannte Affiliate-Links. Wenn du auf so einen Affiliate-Link klickst und über diesen Link einkaufst, bekommt reinlesen.de von dem betreffenden Online-Shop oder Anbieter eine Provision. Für dich verändert sich der Preis nicht.
Naturwissenschaften, Medizin, Informatik, Technik / Informatik, EDV
Beschreibung
Quantum technology interest is accelerating for two key reasons: first, quantum technologies promise transformative capabilities. Indeed, quantum computing is seen as a strategic necessity by the world’s leading economies. Second, experts unanimously agree that a cryptographically-relevant quantum computer will have the capability to break classical encryption that keeps our data and transactions private. Thus, organizations are challenged to protect their most sensitive information data and systems before a cryptographically-relevant quantum computer is accessible to hackers despite already over-burdened cybersecurity teams.
Quantum Cybersecurity Program Management by Dr Greg Skulmoski and Dr Ashkan Memari is part of a series of books: Shields Up: Cybersecurity Project Management outlines a risk-based approach to cybersecurity project management including technology and process improvement projects. Cybersecurity Training: A Pathway to Readiness outlines best practices in training and instructional design to upskill the organization’s people. Quantum Cybersecurity builds upon Shields Up (technology and process) and Cybersecurity Training (people) to provide a program approach to deliver the diversity of quantum projects and initiatives organizations encounter.
The authors of Quantum Cybersecurity bring together best practices found in standards and frameworks in a risk-based approach to implementing a quantum program of projects. Tailored for quantum champions, IT security architects, business leaders, project managers, digital leadership, and board members, Quantum Cybersecurity offers actionable guidance. Urgent and early adopters will find a practical guide for a quick start to their quantum projects.
Kundenbewertungen
post-quantum cryptography, quantum cryptography migration, steal now decrypt later, quantum cybersecurity, cybersecurity project management, quantum cryptographic readiness