Escucha y lee

Descubre un mundo infinito de historias

  • Lee y escucha todo lo que quieras
  • Más de 500 000 títulos
  • Títulos exclusivos + Storytel Originals
  • 14 días de prueba gratis, luego $24,900 COP/al mes
  • Cancela cuando quieras
Descarga la app
CO -Device Banner Block 894x1036

The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework

Duración
7H 6min
Idioma
Inglés
Format
Categoría

No ficción

We’ve all read the cybersecurity horror stories: a prominent company exposes the private information of their customers only to scramble after the fact to apologize and safeguard the data. Cybersecurity is often an afterthought, a much lower priority than profit—until a data breach threatens the bottom line anyway.

In The Cyber-Elephant in the Boardroom, data security expert and CEO Mathieu Gorge, along with a host of guests, shows why protecting a company’s data should be top of mind for C-suites and corporate boards. With the innovative 5 Pillars of Security Framework, any C-level executive can understand their organization’s cyber risk and the steps they need to take to protect their information. There’s a cyber-elephant in the boardroom and it needs to be addressed!

© 2023 Advantage Media Group, Inc. (Audiolibro ): 9798887502410

Fecha de lanzamiento

Audiolibro : 24 de abril de 2023

Etiquetas

    Otros también disfrutaron ...

    1. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
    2. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
    3. Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Eric Cole
    4. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
    5. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
    6. Cybersecurity For Dummies Joseph Steinberg
    7. Cybersecutity First Principles Rick Howard
    8. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
    9. A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
    10. A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Bruce Schneier
    11. Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
    12. Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen
    13. If It's Smart, It's Vulnerable Mikko Hypponen
    14. Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
    15. Project Zero Trust: A Story about a Strategy for Aligning Security and the Business George Finney
    16. Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions Daniel Lohrmann
    17. Cyber Security for Decision Makers Jarno Limnéll
    18. Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
    19. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
    20. Cybersecurity Program Development for Business: The Essential Planning Guide Chris Moschovitis
    21. We Have Root: Even More Advice from Schneier on Security Bruce Schneier
    22. Cybersecurity and Cyberwar: What Everyone Needs to Know Allan Friedman
    23. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition Mike Chapple
    24. The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Perry Carpenter
    25. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
    26. Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration Hans Weber
    27. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Bruce Schneier
    28. The Art of Deception: Controlling the Human Element of Security William L. Simon
    29. Biggest Cyber Crimes in the History Introbooks Team
    30. Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Ray A. Rothrock
    31. Cybersecurity Career Master Plan: Proven techniques and effective tips to help you advance in your cybersecurity career Dr. Gerald Auger
    32. Cloud Security For Dummies Ted Coombs
    33. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide: 2nd Edition Ben Malisow
    34. Inside Cyber Warfare: Mapping the Cyber Underworld (3rd Edition) Jeffrey Caruso
    35. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
    36. Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
    37. Industry of Anonymity: Inside the Business of Cybercrime Jonathan Lusthaus
    38. Cybercrime Investigators Handbook Graeme Edwards
    39. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
    40. Breached!: Why Data Security Law Fails and How to Improve It Daniel J. Solove
    41. Social Engineering: The Art of Human Hacking Christopher Hadnagy
    42. Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit Chris Castaldo
    43. Capital and Ideology Thomas Piketty
    44. The Effective Executive: The Definitive Guide to Getting the Right Things Done Peter F. Drucker
    45. The Future of Competititve Strategy Mohan Subramaniam
    46. Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Seth Stephens-Davidowitz
    47. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III