Écouter et lire

Entrez dans un monde infini d'histoires

  • Lire et écouter autant que vous le voulez
  • Plus d'un million de titres
  • Titres exclusifs + créations originales Storytel
  • 14 jours d'essai gratuit, puis 9,99 € par mois
  • Annulation facile à tout moment
Essayer gratuitement
Details page - Device banner - 894x1036

The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer

1 Évaluations

3

Durée
6H 55min
Langues
Anglais
Format
Catégorie

Documents et essais

The topic of security culture is mysterious and confusing to most leaders. But it doesn't have to be. In The Security Culture Playbook, Perry Carpenter and Kai Roer deliver experience-driven, actionable insights into how to transform your organization's security culture and reduce human risk at every level. This book exposes the gaps between how organizations have traditionally approached human risk and it provides security and business executives with the necessary information and tools needed to understand, measure, and improve facets of security culture across the organization.

The book offers: an exposé of what security culture really is and how it can be measured; a careful exploration of the seven dimensions that comprise security culture; practical tools for managing your security culture program, such as the Security Culture Framework and the Security Culture Maturity Model; and insights into building support within the executive team and Board of Directors for your culture management program.

Also including several revealing interviews from security culture thought leaders in a variety of industries, The Security Culture Playbook is an essential resource for cybersecurity professionals, risk and compliance managers, executives, board members, and other business leaders seeking to proactively manage and reduce risk.

© 2022 Ascent Audio (Livre audio ): 9781663720160

Date de sortie

Livre audio : 26 juillet 2022

Mots-clés

    D'autres ont également apprécié ...

    1. A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Bruce Schneier
    2. If It's Smart, It's Vulnerable Mikko Hypponen
    3. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
    4. Cybersecurity and Cyberwar: What Everyone Needs to Know Allan Friedman
    5. Project Zero Trust: A Story about a Strategy for Aligning Security and the Business George Finney
    6. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Bruce Schneier
    7. Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Ray A. Rothrock
    8. We Have Root: Even More Advice from Schneier on Security Bruce Schneier
    9. Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
    10. Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Eric Cole
    11. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
    12. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
    13. A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
    14. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
    15. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
    16. Cybercrime Investigators Handbook Graeme Edwards
    17. How I Rob Banks: And Other Such Places FC
    18. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
    19. Cybersecurity Program Development for Business: The Essential Planning Guide Chris Moschovitis
    20. Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 John Knowles
    21. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide: 2nd Edition Ben Malisow
    22. Cybersecurity For Dummies Joseph Steinberg
    23. Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
    24. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
    25. Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration Hans Weber
    26. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Cliff Stoll
    27. Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
    28. The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Mathieu Gorge
    29. The Art of Deception: Controlling the Human Element of Security William L. Simon
    30. Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
    31. Cyberdeterrence and Cyberwar Martin C. Libicki
    32. Security Awareness For Dummies Ira Winkler, CISSP
    33. Cybersecutity First Principles Rick Howard
    34. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
    35. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
    36. Unmasking the Social Engineer: The Human Element of Security Paul Ekman
    37. Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen
    38. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
    39. Social Engineering: The Art of Human Hacking Christopher Hadnagy
    40. Ransomware Protection Playbook Roger A. Grimes
    41. Cryptography: The Key to Digital Security, How It Works, and Why It Matters Keith Martin
    42. Cloud Security For Dummies Ted Coombs
    43. Defensive Security Handbook: Best Practices for Securing Infrastructure (2nd Edition) Amanda Berlin
    44. The CISO Evolution: Business Knowledge for Cybersecurity Executives Kyriakos Lambros
    45. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
    46. Targeted: My Inside Story of Cambridge Analytica and How Trump, Brexit and Facebook Broke Democracy Brittany Kaiser
    47. Pegasus: The Story of the World's Most Dangerous Spyware Laurent Richard
    48. Permanent Record: A Memoir of a Reluctant Whistleblower Edward Snowden

    L’offre Storytel :

    • Accès à la bibliothèque complète

    • Mode enfant

    • Annulez à tout moment

    15 heures

    Pour accompagner vos loisirs

    9.99€ /mois
    30 jours gratuits
    • 1 compte

    • 15 heures/mois

    Essayer maintenant

    30 heures

    Pour vos trajets quotidiens

    14.99€ /mois
    30 jours gratuits
    • 1 compte

    • 30 heures/mois

    Essayer maintenant

    45 heures

    Pour écouter tous les jours

    17.99€ /mois
    30 jours gratuits
    • 1 compte

    • 45 heures/mois

    Essayer maintenant