Dengarkan dan baca

Masuki dunia cerita tanpa batas

  • Baca dan dengarkan sebanyak yang Anda mau
  • Lebih dari 1 juta judul
  • Judul eksklusif + Storytel Original
  • Uji coba gratis 14 hari, lalu €9,99/bulan
  • Mudah untuk membatalkan kapan saja
Coba gratis
Details page - Device banner - 894x1036
Cover for 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business

8 Steps to Better Security: A Simple Cyber Resilience Guide for Business

2 Rating

3

Durasi
7 Jam 49 mnt
Bahasa
Inggris
Format
Kategori

Non Fiksi

Harden your business against internal and external cybersecurity threats with a single accessible resource.

In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps.

Written to be accessible to non-technical businesspeople as well as security professionals, and with insights from other security industry leaders, this important book will walk you through how to: foster a strong security culture that extends from the custodial team to the C-suite; build an effective security team, regardless of the size or nature of your business; comply with regulatory requirements, including general data privacy rules and industry-specific legislation; and test your cybersecurity, including third-party penetration testing and internal red team specialists. Perfect for CISOs, security leaders, non-technical businesspeople, and managers at any level, 8 Steps to Better Security is also a must-have resource for companies of all sizes, and in all industries.

© 2021 Ascent Audio (Audiobook): 9781663717085

Tanggal rilis

Audiobook: 26 Oktober 2021

Tag

    Yang lain juga menikmati...

    1. Cybersecutity First Principles
      Cybersecutity First Principles Rick Howard
    2. Spatial Computing
      Spatial Computing Pamela Vold
    3. Certified Information Security Manager CISM Study Guide
      Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
    4. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)
      CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
    5. Web3: Charting the Internet's Next Economic and Cultural Frontier
      Web3: Charting the Internet's Next Economic and Cultural Frontier Alex Tapscott
    6. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies
      CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
    7. Cloud Security For Dummies
      Cloud Security For Dummies Ted Coombs
    8. CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1
      CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1 John Knowles
    9. Distrust: Big Data, Data-Torturing, and the Assault on Science
      Distrust: Big Data, Data-Torturing, and the Assault on Science Gary Smith
    10. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1
      CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
    11. Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration
      Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration Hans Weber
    12. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions
      Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
    13. The Energy Wars – The Future of Renewable Energy & Sustainability: How Solar, Wind, and Nuclear Are Shaping the Battle for a Greener Future
      The Energy Wars – The Future of Renewable Energy & Sustainability: How Solar, Wind, and Nuclear Are Shaping the Battle for a Greener Future James Nemeth
    14. A Brief History of a Perfect Future: Inventing the world that we can proudly leave our kids by 2050
      A Brief History of a Perfect Future: Inventing the world that we can proudly leave our kids by 2050 Paul B. Carroll
    15. The Anti-Oligarchy Constitution: Reconstructing the Economic Foundations of American Democracy
      The Anti-Oligarchy Constitution: Reconstructing the Economic Foundations of American Democracy William E. Forbath
    16. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
      Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
    17. How Big-Tech Barons Smash Innovation—and How to Strike Back
      How Big-Tech Barons Smash Innovation—and How to Strike Back Maurice E. Stucke
    18. TouchPoints: Creating Powerful Leadership Connections in the Smallest of Moments
      TouchPoints: Creating Powerful Leadership Connections in the Smallest of Moments Mette Norgaard
    19. Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1
      Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1 HUGO HOFFMAN
    20. Business Ethics for Better Behavior
      Business Ethics for Better Behavior Jason Brennan
    21. The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework
      The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Mathieu Gorge
    22. The DevSecOps Playbook: Deliver Continuous Security at Speed
      The DevSecOps Playbook: Deliver Continuous Security at Speed Sean D. Mack
    23. Inevitable: Inside the Messy, Unstoppable Transition to Electric Vehicles
      Inevitable: Inside the Messy, Unstoppable Transition to Electric Vehicles Mike Colias
    24. The Great Persuasion: Reinventing Free Markets Since the Depression
      The Great Persuasion: Reinventing Free Markets Since the Depression Angus Burgin
    25. Completing Capitalism: Heal Business to Heal the World
      Completing Capitalism: Heal Business to Heal the World Bruno Roche
    26. The Road to Reinvention: How to Drive Disruption and Accelerate Transformation
      The Road to Reinvention: How to Drive Disruption and Accelerate Transformation Josh Linkner
    27. How to Measure Anything in Cybersecurity Risk, 2nd Edition
      How to Measure Anything in Cybersecurity Risk, 2nd Edition Douglas W. Hubbard
    28. Born Digital: The Story of a Distracted Generation
      Born Digital: The Story of a Distracted Generation Robert Wigley
    29. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
      (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
    30. Modern Technology: Chemical, Electrical, Industrial, and Mechanical Engineering (4 in 1)
      Modern Technology: Chemical, Electrical, Industrial, and Mechanical Engineering (4 in 1) Phil Gilberts
    31. The Knowledge Gene
      The Knowledge Gene Lynne Kelly
    32. Long Hard Road: The Lithium-Ion Battery and the Electric Car
      Long Hard Road: The Lithium-Ion Battery and the Electric Car Charles J. Murray
    33. Maxims for Thinking Analytically: The Wisdom of Legendary Harvard Professor Richard Zeckhauser
      Maxims for Thinking Analytically: The Wisdom of Legendary Harvard Professor Richard Zeckhauser Dan Levy
    34. Hackable: How to Do Application Security Right
      Hackable: How to Do Application Security Right Ted Harrington
    35. Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI
      Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI Reid Blackman
    36. Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1
      Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1 HUGO HOFFMAN
    37. Reprogramming The American Dream: From Rural America to Silicon Valley—Making AI Serve Us All
      Reprogramming The American Dream: From Rural America to Silicon Valley—Making AI Serve Us All Greg Shaw
    38. Industrial Designs: Ideas and Inventive Problem Solving for Industrial Design
      Industrial Designs: Ideas and Inventive Problem Solving for Industrial Design Phil Gilberts
    39. Win the Game of Googleopoly: Unlocking the Secret Strategy of Search Engines
      Win the Game of Googleopoly: Unlocking the Secret Strategy of Search Engines Sean V. Bradley
    40. The Midrange Theory: Basketball’s Evolution in the Age of Analytics
      The Midrange Theory: Basketball’s Evolution in the Age of Analytics Seth Partnow
    41. Building a Cyber Risk Management Program: Evolving Security for the Digital Age
      Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen
    42. Competition Overdose: How Free Market Mythology Transformed Us from Citizen Kings to Market Servants
      Competition Overdose: How Free Market Mythology Transformed Us from Citizen Kings to Market Servants Maurice E. Stucke
    43. GINI: Capitalism, Cryptocurrencies & the Battle for Human Rights
      GINI: Capitalism, Cryptocurrencies & the Battle for Human Rights Ferris Eanfar
    44. Chemical Engineering: Design and Analysis of Chemical Process Engineering
      Chemical Engineering: Design and Analysis of Chemical Process Engineering Phil Gilberts
    45. Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers
      Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers Robb Wilson
    46. The Cloud Revolution: How the Convergence of New Technologies Will Unleash the Next Economic Boom and A Roaring 2020s
      The Cloud Revolution: How the Convergence of New Technologies Will Unleash the Next Economic Boom and A Roaring 2020s Mark P. Mills
    47. How to Speak Science: Gravity, Relativity, and Other Ideas That Were Crazy until Proven Brilliant
      How to Speak Science: Gravity, Relativity, and Other Ideas That Were Crazy until Proven Brilliant Bruce Benamran
    48. Probability Theory
      Probability Theory Introbooks Team
    49. Yellen: The Trailblazing Economist Who Navigated an Era of Upheaval
      Yellen: The Trailblazing Economist Who Navigated an Era of Upheaval Jon Hilsenrath
    50. The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power
      The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power Joseph Turow
    51. RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals
      RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals Brown Brown
    52. The Cost of Free Money: How Unfettered Capital Threatens Our Economic Future
      The Cost of Free Money: How Unfettered Capital Threatens Our Economic Future Paola Subacchi
    53. The Tyranny of Dead Ideas: Revolutionary Thinking for a New Age of Prosperity
      The Tyranny of Dead Ideas: Revolutionary Thinking for a New Age of Prosperity Matt Miller
    54. Winner Sells All: Amazon, Walmart, and the Battle for Our Wallets
      Winner Sells All: Amazon, Walmart, and the Battle for Our Wallets Jason Del Rey
    55. Edge of Armageddon: The Imminent Nuclear Consequence
      Edge of Armageddon: The Imminent Nuclear Consequence Robert Enochs
    56. Beyond the Valley: How Innovators around the World Are Overcoming Inequality and Creating the Technologies of Tomorrow
      Beyond the Valley: How Innovators around the World Are Overcoming Inequality and Creating the Technologies of Tomorrow Ramesh Srinivasan
    57. Game Theory: Applications to Economics and Economic Theory
      Game Theory: Applications to Economics and Economic Theory Daniel Shore
    58. Economic Warfare: Secrets of Wealth Creation in the Age of Welfare Politics
      Economic Warfare: Secrets of Wealth Creation in the Age of Welfare Politics Herman Cain
    59. The Digital Helix: Transforming Your Organization's DNA to Thrive in the Digital Age
      The Digital Helix: Transforming Your Organization's DNA to Thrive in the Digital Age Chris Aarons
    60. Not Very Intelligent Design: On the Origin, Creation and Evolution of the Theory of Intelligent Design
      Not Very Intelligent Design: On the Origin, Creation and Evolution of the Theory of Intelligent Design Neel Ingman
    61. Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
      Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors Perry Carpenter
    62. The Health Hazard: Take control, Restore Wellbeing and Optimise Impact
      The Health Hazard: Take control, Restore Wellbeing and Optimise Impact Alison Coughlan
    63. Social Capital: Life online in the shadow of Ireland’s tech boom
      Social Capital: Life online in the shadow of Ireland’s tech boom Aoife Barry
    64. The Rise of the Cobot: Grow Your Business Exponentially with Collaborative Artificial Intelligence
      The Rise of the Cobot: Grow Your Business Exponentially with Collaborative Artificial Intelligence John Rauscher
    65. Designing Transformative Experiences: A Toolkit for Leaders, Trainers, Teachers, and other Experience Designers
      Designing Transformative Experiences: A Toolkit for Leaders, Trainers, Teachers, and other Experience Designers Brad McLain
    66. The Deal Maker: How William C. Durant Made General Motors
      The Deal Maker: How William C. Durant Made General Motors Axel Madsen
    67. Cracking the China Conundrum: Why Conventional Economic Wisdom Is Wrong
      Cracking the China Conundrum: Why Conventional Economic Wisdom Is Wrong Yukon Huang
    68. The Boomerang Principle: Inspire Lifetime Loyalty from Your Employees
      The Boomerang Principle: Inspire Lifetime Loyalty from Your Employees Lee Caraher
    69. Haptics
      Haptics Lynette Jones
    70. Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1
      Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS
    71. Diplomacy Conversations: How to Win at Diplomacy, Or Strategy for Face-to-Face, Online, and Tournaments
      Diplomacy Conversations: How to Win at Diplomacy, Or Strategy for Face-to-Face, Online, and Tournaments Erik van Mechelen
    72. The Art of Attack: Attacker Mindset for Security Professionals
      The Art of Attack: Attacker Mindset for Security Professionals Maxie Reynolds
    73. The Miracle: The Epic Story of Asia's Quest for Wealth
      The Miracle: The Epic Story of Asia's Quest for Wealth Michael Schuman
    74. Exchange-Traded Funds For Dummies
      Exchange-Traded Funds For Dummies Russell Wild
    75. Winning at the Acquisition Game : Tools, Templates and Best Practices Across the M&A Process: Tools, Templates, and Best Practices Across the M&A Process
      Winning at the Acquisition Game : Tools, Templates and Best Practices Across the M&A Process: Tools, Templates, and Best Practices Across the M&A Process Timothy Galpin

    Selalu dengan Storytel

    • Lebih dari 900.000 judul

    • Mode Anak (lingkungan aman untuk anak)

    • Unduh buku untuk akses offline

    • Batalkan kapan saja

    Terpopuler

    Premium

    Bagi yang ingin mendengarkan dan membaca tanpa batas.

    Rp39000 /bulan
    7 hari gratis
    • 1 akun

    • Akses Tanpa Batas

    • Akses bulanan tanpa batas

    • Batalkan kapan saja

    • Judul dalam bahasa Inggris dan Indonesia

    Coba sekarang

    Premium 6 bulan

    Bagi yang ingin mendengarkan dan membaca tanpa batas

    Rp189000 /6 bulan
    7 hari gratis
    Hemat 19%
    • 1 akun

    • Akses Tanpa Batas

    • Akses bulanan tanpa batas

    • Batalkan kapan saja

    • Judul dalam bahasa Inggris dan Indonesia

    Coba sekarang

    Local

    Bagi yang hanya ingin mendengarkan dan membaca dalam bahasa lokal.

    Rp19900 /bulan
    7 hari gratis
    • 1 akun

    • Akses Tanpa Batas

    • Akses tidak terbatas

    • Batalkan kapan saja

    • Judul dalam bahasa Indonesia

    Coba sekarang

    Local 6 bulan

    Bagi yang hanya ingin mendengarkan dan membaca dalam bahasa lokal.

    Rp89000 /6 bulan
    7 hari gratis
    Hemat 25%
    • 1 akun

    • Akses Tanpa Batas

    • Akses tidak terbatas

    • Batalkan kapan saja

    • Judul dalam bahasa Indonesia

    Coba sekarang