Meet Dr. Georgianna Shea
Meet the members of Ohio State's Cyber Security Canon Committee.
Dr. Georgianna Shea
Dr. Georgianna “George” Shea serves as the Chief Technologist for FDD’s Center on Cyber and Technology Innovation (CCTI) and Transformative Cyber Innovation Lab (TCIL). In that role, she identifies cyber vulnerabilities in the United States government and private sector, devising pilot projects to demonstrate feasible technology and non-tech solutions that, if scaled, could move the needle to defend U.S. prosperity, security, and innovation.
Interview
What books are currently in your queue of reading materials?
- Countering Cyber Sabotage: Introducing Consequence-driven, Cyber-informed Engineering (CCE) by Andrew Bochman and Sarah Freeman and,
- Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks by MacDonnell Ulsch
What’s the last great Security book you read?
- The Art of War by Sun Tzu
- How to Measure Anything in Cybersecurity Risk by Douglas Hubbard
Are there any classic novels that you only recently read for the first time?
Not that I can think of.
Describe your ideal reading experience (when, where, what, how)
When I have nothing else to do, house is clean, work is on schedule, and I am alone. However, I rarely meet those criteria, so it’s usually while on a plane traveling for work. My favorite past reading experience was with my boys when they were little.
What’s your favorite book no one else has heard of?
Not sure who has or hasn’t heard of it. Paddy's Lament, Ireland 1846-1847: Prelude to Hatred by Thomas Gallagher
Which writers – novelists, playwrights, critics, journalists, poets – working today do you admire most?
Charles Bartles, Lester W. Grau, David Sanger, Brian Krebs, Samantha Ravich. Mark Montgomery
What Security book would you most like to see turned into a movie or TV show that hasn’t already been adapted?
What’s the most interesting thing you learned from a Security book recently
I love the phrase in “Countering Cyber Sabotage” that urges security people to go “beyond hope and hygiene.” I think it is a very succinct way of addressing the current inefficiencies with cybersecurity execution.
Which Security subjects do you wish more authors would write about?
I would love to see more real-world examples and instruction guides for step by step practices like test and evaluation or system security engineering. This may be a boring read, but people need solid examples.
I would also like to see more on the lessons learned from different types of breaches throughout history. How were they made possible, what was the backstory and what could have been done differently to prevent the attack.
How do you organize your books?
By genre, it drives me crazy to see books organized by color for decorating purposes, or all covered in the same color book cover.
What book did you feel as if you were supposed to like, and didn’t?
Ghost Fleet
What books are you embarrassed not to have read yet?
Any James Michener novel. He is one of my grandmother’s favorite authors and I live in Colorado.
What do you plan to read next?
- Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks by MacDonnell Ulsch
- The Perfect Weapon by David Sanger
- Marketization and Democracy: East Asian Experiences by Samantha Ravish
What book do you wish was never converted into movie?
The Girl on the Train
Which book or movie most inspired you in this field?