Summary of The Cybersecurity Playbook

Looking for the book?
We have the summary! Get the key insights in just 10 minutes.

The Cybersecurity Playbook book summary

Editorial Rating



  • Applicable
  • For Beginners
  • Engaging


Having lived through disastrous hacks and breaches at McAfee, one of the world’s foremost security software firms, author Allison Cerra proves an effective evangelizer for the everyday importance of corporate cybersecurity. Cerra offers detailed advice for each key player in the constant battle against hackers and cybercriminals, none more important than employees themselves. Her practical checklists for lead security officers, boards, the C-suite and HR and marketing professionals make this brief, accessible and engaging guide useful to building cybersecurity into the corporate culture.

About the Author

Allison Cerra leads McAfee’s marketing and communications teams as SVP and chief marketing officer. In this role, she has seen firsthand the reputational and financial risks wrought by lax cybersecurity measures.


Much of corporate cybersecurity depends on the good habits of employees.

One in five security breaches involves a mistake by a negligent employee. Mundane but important practices by employees in the firm represent one of the most vital defenses to cybercrime. These include creating strong passwords, changing them often, and not reusing them. Employees should familiarize themselves with common hacker tactics, including phishing emails. They should check with IT security before using cloud services and tools, use encrypted thumb drives, report suspicious emails and activity, never leave laptops and other devices with sensitive information unattended, and simply realize that hacker prevention doesn’t just fall to the cybersecurity team – everyone must contribute.

In most organizations, phishing emails succeed in fooling about 4% of employees and/or executives. Phishing emails – often in the guise of a message from a leader or colleague – invite the recipient to click on a link or download a file. When they do, they may compromise their credentials, introduce a virus or give a hacker entry to the firm’s networks. Employees need awareness training...

Comment on this summary

More on this topic

Unilever’s Bobby Ford Discusses How to Secure Your Digital Business
Tools and Weapons
What Is the Real Cost of a Breach?
The AI Organization
Data Feminism
2020 Tech Trends Report

Related Channels