{"id":123978,"date":"2021-01-27T06:00:37","date_gmt":"2021-01-27T14:00:37","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=123978"},"modified":"2021-01-27T05:50:26","modified_gmt":"2021-01-27T13:50:26","slug":"navigating-the-digital-age","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2021\/01\/navigating-the-digital-age\/","title":{"rendered":"Announcing Navigating the Digital Age, Third Edition"},"content":{"rendered":"<p>Global leaders have long recognized the power of digital technologies. Over the past year, new challenges and opportunities have brought that into sharper focus than ever before. Nearly every organization faced the daunting task of securing their people, scaling remote work, protecting critical assets and ensuring business continuity.<\/p>\n<p>There was precious little room for gaps in cybersecurity, while world events continue to put pressure on organizations in unexpected ways. What does it mean to navigate the digital age, when so much is changing day by day?<\/p>\n<p>How can business and technology leaders ensure the security of their organizations while keeping pace with accelerated digital transformation such as the shift to cloud, the rise of machine learning and the growth of the Internet of Things?<\/p>\n<p>To help executives understand what it takes to prepare for the unexpected and stay vigilant in maintaining modern cybersecurity best practices, Palo Alto Networks has published the third edition of <a href=\"https:\/\/www.securityroundtable.org\/navigating-the-digital-age-3rd-edition\" rel=\"nofollow,noopener\" ><em>Navigating the Digital Age<\/em><\/a><em>.<\/em><\/p>\n<p>In this book, 50 thought leaders share their ideas on a range of vital topics, from addressing disruptions caused by COVID-19, to driving business transformation through innovation. Some of the best cybersecurity minds across the world have chimed in, and new authors in this edition include:<\/p>\n<p><strong>Nikesh Arora,<\/strong> CEO and Chairman, Palo Alto Networks<img loading=\"lazy\" decoding=\"async\"  class=\"alignright wp-image-123992 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2021\/01\/Navigating-Digital-Age-Image.png\" alt=\"Navigating the Digital Age, Third Edition, book cover\" width=\"300\" height=\"411\" \/><\/p>\n<p><strong>Gary Bolles, <\/strong>Chair for the Future of Work, Singularity University<\/p>\n<p><strong>Vint Cerf, <\/strong>Vice President and Chief Internet Evangelist, Google<\/p>\n<p><strong>Mario Chiock, <\/strong>Fellow and CISO Emeritus, Schlumberger<\/p>\n<p><strong>Bruce Crawford, <\/strong>Retired CIO, U.S. Army, Department of Defense<\/p>\n<p><strong>William Dixon, <\/strong>Head of the Centre for Cybersecurity, World Economic Forum<\/p>\n<p><strong>Gemma Garcia Godall, <\/strong>Founder, Instituto de Inteligencia Emocional<\/p>\n<p><strong>Matt Gyde, <\/strong>CEO, Security Division, NTT<\/p>\n<p><strong>John Paul Lonie, <\/strong>Head of Security Operations, Iress<\/p>\n<p><strong>Sean Morgan, <\/strong>Director of Cybersecurity Policy and Partnerships, Palo Alto Networks<\/p>\n<p><strong>Richard Seiersen, <\/strong>CEO of Soluble<\/p>\n<p><strong>Mike Towers, <\/strong>CISO, Takeda Pharmaceuticals International<\/p>\n<p><strong>Yang Zhoulong<\/strong>, Vice President and Board Director, Yunda Group<\/p>\n<p>Designed to educate the C-suite and board members about cybersecurity, this book covers plenty of ground. It is not meant to be read front to back. Flip through the pages and read the chapters that are most relevant to you. Keep it on your desk or laptop for reference. We hope this collection of ideas will help lead you to a safer and more secure future.<\/p>\n<p>Get your digital copy of<a href=\"https:\/\/www.securityroundtable.org\/navigating-the-digital-age-3rd-edition\" rel=\"nofollow,noopener\" > <em>Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers<\/em><\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Navigating the Digital Age, Third Edition, shares digital transformation insights from some of the best cybersecurity minds from around the world.<\/p>\n","protected":false},"author":663,"featured_media":123979,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[308,6724],"tags":[7443,120,7442],"coauthors":[7444],"class_list":["post-123978","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-announcement","category-points-of-view","tag-cxo-2","tag-cybersecurity","tag-thought-leadership"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2021\/01\/Man-at-Lecture.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/123978","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/663"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=123978"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/123978\/revisions"}],"predecessor-version":[{"id":124442,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/123978\/revisions\/124442"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/123979"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=123978"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=123978"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=123978"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=123978"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}