by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : September 30, 2015
3. “Your Strategy Needs a Strategy: How to Choose and Execute the Right Approach” by Martin Reeves, Knut Haanaes and Janmejaya Sinha This book takes a meta look at business strategy by exploring five major schools of strategic thinking before proposing the concept of a “strategy palette” in which leaders synthesize elements from each of the offerings. As the authors — all of whom hail from the Boston Consulting Group — break down the pros and cons of myriad business strategies, they sprinkle in accounts of real-world business decisions. Tech giants provide examples of visionary and shaping strategies, while American Express illustrates renewal in action. In the depths of the 2008 crisis, American Express faced an uncertain future and a cash-strapped environment familiar to many federal leaders. But the company survived and thrived by slashing spending on professional services while maintaining customer service budgets and investing in future growth. “Your Strategy Needs a Strategy” targets corporate chieftains, not agency CIOs. But the many mini-sagas provide ample inspiration for federal leaders seeking to put their own “strategy palette” to use. 4. “Ghost Fleet: A Novel of the Next World War” by P.W. Singer and August Cole This science fiction novel imagines a 21st-century cold war between the United States and Russia that’s fought not only on land, air and sea but also online and in outer space — and all with weapons and systems co-developed by the federal government and Silicon Valley. The book was co-authored by two leading tech experts, P.W. Singer and August Cole, who are on the cutting edge of national security. The science fiction-like trends and technologies in the book are real, according to the authors, and could illustrate the future of a more coherent relationship between Silicon Valley and Washington. Singer and Cole advocate a closer, more agile partnership between the Defense Department, the federal government and Silicon Valley in developing federal systems and weapons. 5. “There Will Be Cyberwar: How the Move to Network-Centric War Fighting Has Set the Stage for Cyberwar” By Richard Stiennon Richard Stiennon’s book opens with an alarming fictional scenario: The Chinese military has used cyber and electronic weapons to disable U.S. naval forces guarding Taiwan. Stiennon scripts a congressional report, dated May 2018, that diagnoses what went wrong. Among the findings is that American spooks were fooled by the intentions of China’s alleged state-sponsored hacking of the U.S. industrial base. “While stealing designs of advanced military systems such as the Joint Strike Fighter and other weapons platforms was evident, it was not clear that the purpose was to discover weaknesses in those systems that the People’s Liberation Army could exploit in conflict,” he writes. The implicit warning of this fictional scenario, of course, is that it might not be fiction for long — and that it would be a shame, despite the writing on the wall, to read about it in the dry, post-mortem language of a congressional report. Stiennon, founder of cybersecurity analysis firm IT-Harvest, has made his case to FCW readers about the cyber vulnerabilities inherent in big Pentagon weapons systems like the F-35 Joint Strike Fighter jet. He expands on that argument in this book and reflects on what is and isn’t known about U.S . cyber capabilities. “We do know, thanks to the numerous breaches and failures of military operations and weapons systems, that the U.S. is woefully unprepared to counter theater cyberwar,” he writes. Although he conjures scenarios that probably aren’t far off, Stiennon’s prescriptions for bolstering network defenses are focused on present, rather than futuristic, capabilities. He recommends deploying encryption schemes across the battle commands and hardening the Defense Department’s IT supply chain. The book is an enjoyably brisk read that blurs the lines between what’s happening in cyberspace and what’s on our doorstep. As the author understands, hacking — and defending against it — takes imagination. n Bookshelf 30 September 30, 2015 FCW.COM 0930fcw_029-030.indd 30 9/9/15 9:05 AM
September 15, 2015