Escucha y lee

Entra en un mundo infinito de historias

  • Vive la experiencia de leer y escuchar todo lo que quieras
  • Más de 650.000 títulos
  • Títulos en exclusiva y Storytel Originals
  • Primeros 14 días gratis, luego 8,99 €/mes
  • Cancela cuando quieras
Suscríbete ahora
Details page - Device banner - 894x1036

The CISO Evolution: Business Knowledge for Cybersecurity Executives

2 Calificaciones

4

Duración
13H 7min
Idioma
Inglés
Format
Categoría

No ficción

Learn to effectively deliver business aligned cybersecurity outcomes

In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.

The authors use illustrative stories to show professionals how to establish an executive presence and avoid the most common pitfalls experienced by technology experts when speaking and presenting to executives. The book will show you how to:

● Inspire trust in senior business leaders by properly aligning and setting expectations around risk appetite and capital allocation

● Properly characterize the indispensable role of cybersecurity in your company's overall strategic plan

● Acquire the necessary funding and resources for your company's cybersecurity program and avoid the stress and anxiety that comes with underfunding

© 2022 Ascent Audio (Audiolibro ): 9781663718549

Fecha de lanzamiento

Audiolibro : 1 de marzo de 2022

Etiquetas

    Otros también disfrutaron ...

    1. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
    2. Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Eric Cole
    3. Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
    4. Cybersecutity First Principles Rick Howard
    5. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
    6. Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
    7. Cyber Privacy: Who Has Your Data and Why You Should Care April Falcon Doss
    8. Cybersecurity and Cyberwar: What Everyone Needs to Know Allan Friedman
    9. Permanent Record: A Memoir of a Reluctant Whistleblower Edward Snowden
    10. Pegasus: The Story of the World's Most Dangerous Spyware Laurent Richard
    11. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Bruce Schneier
    12. Data Science John D. Kelleher
    13. What is the Dark Web?: The truth about the hidden part of the internet Evan J. Rodgers
    14. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
    15. Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors Perry Carpenter
    16. Cybersecurity Career Master Plan: Proven techniques and effective tips to help you advance in your cybersecurity career Dr. Gerald Auger
    17. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
    18. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
    19. Cybersecurity For Dummies Joseph Steinberg
    20. Cybersecurity Program Development for Business: The Essential Planning Guide Chris Moschovitis
    21. Navigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-Suite Helen Patton
    22. A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
    23. Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen
    24. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
    25. Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
    26. CISSP All-in-One Exam Guide, Ninth Edition Fernando Maymi
    27. A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Bruce Schneier
    28. The Art of Deception: Controlling the Human Element of Security William L. Simon
    29. Project Zero Trust: A Story about a Strategy for Aligning Security and the Business George Finney
    30. Cloud Security For Dummies Ted Coombs
    31. Cybercrime Investigators Handbook Graeme Edwards
    32. Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Ray A. Rothrock
    33. RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals Brown Brown
    34. We Have Root: Even More Advice from Schneier on Security Bruce Schneier
    35. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
    36. Unmasking the Social Engineer: The Human Element of Security Paul Ekman
    37. Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration Hans Weber
    38. The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Perry Carpenter
    39. The Pentester BluePrint: Starting a Career as an Ethical Hacker Phillip L. Wylie
    40. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
    41. The Failure of Risk Management: Why It's Broken and How to Fix It 2nd Edition Douglas W. Hubbard
    42. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide: 2nd Edition Ben Malisow
    43. Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
    44. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
    45. Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions Daniel Lohrmann
    46. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
    47. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN

    Elige el plan:

    • Más de 650.000 títulos

    • Kids mode

    • Modo sin conexión

    • Cancela cuando quieras

    ¡Más popular!

    Unlimited

    Para los que quieren escuchar y leer sin límites.

    8.99 € /mes
    14 días gratis
    • 1 cuenta

    • Acceso ilimitado

    • Escucha y lee los títulos que quieras

    • Modo sin conexión + Kids Mode

    • Cancela en cualquier momento

    Suscríbete ahora

    Family

    Para los que quieren compartir historias con su familia y amigos.

    Desde 15.99 €/mes
    • 2-3 cuentas

    • Acceso ilimitado

    • Escucha y lee los títulos que quieras

    • Modo sin conexión + Kids Mode

    • Cancela en cualquier momento

    2 cuentas

    15.99 € /mes
    Pruébalo ahora