Luister en lees nu 14 dagen gratis

Ontdek Storytel nu 14 dagen gratis. Meer dan 1 miljoen luisterboeken en ebooks in één app.

  • Switch makkelijk tussen luisteren en lezen
  • Elke week honderden nieuwe verhalen
  • Voor ieder een passend abonnement
  • Opzeggen wanneer je maar wilt
Probeer 14 dagen gratis
NL - Details page - Device banner - 894x1036
Cover for 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business

8 Steps to Better Security: A Simple Cyber Resilience Guide for Business

2 Beoordeling

3

Looptijd
7 Uur 49 min
Taal
Engels
Formaat
Categorie

Non-fictie

Harden your business against internal and external cybersecurity threats with a single accessible resource.

In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps.

Written to be accessible to non-technical businesspeople as well as security professionals, and with insights from other security industry leaders, this important book will walk you through how to: foster a strong security culture that extends from the custodial team to the C-suite; build an effective security team, regardless of the size or nature of your business; comply with regulatory requirements, including general data privacy rules and industry-specific legislation; and test your cybersecurity, including third-party penetration testing and internal red team specialists. Perfect for CISOs, security leaders, non-technical businesspeople, and managers at any level, 8 Steps to Better Security is also a must-have resource for companies of all sizes, and in all industries.

© 2021 Ascent Audio (Audioboek): 9781663717085

Verschijnt op

Audioboek: 26 oktober 2021

Anderen genoten ook van...

  1. Cybersecutity First Principles
    Cybersecutity First Principles Rick Howard
  2. Spatial Computing
    Spatial Computing Pamela Vold
  3. Certified Information Security Manager CISM Study Guide
    Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
  4. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)
    CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
  5. Web3: Charting the Internet's Next Economic and Cultural Frontier
    Web3: Charting the Internet's Next Economic and Cultural Frontier Alex Tapscott
  6. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies
    CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
  7. Cloud Security For Dummies
    Cloud Security For Dummies Ted Coombs
  8. CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1
    CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1 John Knowles
  9. Distrust: Big Data, Data-Torturing, and the Assault on Science
    Distrust: Big Data, Data-Torturing, and the Assault on Science Gary Smith
  10. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1
    CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
  11. Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration
    Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration Hans Weber
  12. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions
    Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
  13. The Energy Wars – The Future of Renewable Energy & Sustainability: How Solar, Wind, and Nuclear Are Shaping the Battle for a Greener Future
    The Energy Wars – The Future of Renewable Energy & Sustainability: How Solar, Wind, and Nuclear Are Shaping the Battle for a Greener Future James Nemeth
  14. A Brief History of a Perfect Future: Inventing the world that we can proudly leave our kids by 2050
    A Brief History of a Perfect Future: Inventing the world that we can proudly leave our kids by 2050 Paul B. Carroll
  15. The Anti-Oligarchy Constitution: Reconstructing the Economic Foundations of American Democracy
    The Anti-Oligarchy Constitution: Reconstructing the Economic Foundations of American Democracy William E. Forbath
  16. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
    Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
  17. How Big-Tech Barons Smash Innovation—and How to Strike Back
    How Big-Tech Barons Smash Innovation—and How to Strike Back Maurice E. Stucke
  18. TouchPoints: Creating Powerful Leadership Connections in the Smallest of Moments
    TouchPoints: Creating Powerful Leadership Connections in the Smallest of Moments Mette Norgaard
  19. Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1
    Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1 HUGO HOFFMAN
  20. Business Ethics for Better Behavior
    Business Ethics for Better Behavior Jason Brennan
  21. The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework
    The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Mathieu Gorge
  22. The DevSecOps Playbook: Deliver Continuous Security at Speed
    The DevSecOps Playbook: Deliver Continuous Security at Speed Sean D. Mack
  23. Inevitable: Inside the Messy, Unstoppable Transition to Electric Vehicles
    Inevitable: Inside the Messy, Unstoppable Transition to Electric Vehicles Mike Colias
  24. The Great Persuasion: Reinventing Free Markets Since the Depression
    The Great Persuasion: Reinventing Free Markets Since the Depression Angus Burgin
  25. Completing Capitalism: Heal Business to Heal the World
    Completing Capitalism: Heal Business to Heal the World Bruno Roche
  26. The Road to Reinvention: How to Drive Disruption and Accelerate Transformation
    The Road to Reinvention: How to Drive Disruption and Accelerate Transformation Josh Linkner
  27. How to Measure Anything in Cybersecurity Risk, 2nd Edition
    How to Measure Anything in Cybersecurity Risk, 2nd Edition Douglas W. Hubbard
  28. Born Digital: The Story of a Distracted Generation
    Born Digital: The Story of a Distracted Generation Robert Wigley
  29. Autonomy: The Quest to Build the Driverless Car - And How It Will Reshape Our World
    Autonomy: The Quest to Build the Driverless Car - And How It Will Reshape Our World Lawrence Burns
  30. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
    (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
  31. Modern Technology: Chemical, Electrical, Industrial, and Mechanical Engineering (4 in 1)
    Modern Technology: Chemical, Electrical, Industrial, and Mechanical Engineering (4 in 1) Phil Gilberts
  32. The Knowledge Gene
    The Knowledge Gene Lynne Kelly
  33. Long Hard Road: The Lithium-Ion Battery and the Electric Car
    Long Hard Road: The Lithium-Ion Battery and the Electric Car Charles J. Murray
  34. Maxims for Thinking Analytically: The Wisdom of Legendary Harvard Professor Richard Zeckhauser
    Maxims for Thinking Analytically: The Wisdom of Legendary Harvard Professor Richard Zeckhauser Dan Levy
  35. Hackable: How to Do Application Security Right
    Hackable: How to Do Application Security Right Ted Harrington
  36. Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI
    Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI Reid Blackman
  37. Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1
    Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1 HUGO HOFFMAN
  38. Reprogramming The American Dream: From Rural America to Silicon Valley—Making AI Serve Us All
    Reprogramming The American Dream: From Rural America to Silicon Valley—Making AI Serve Us All Greg Shaw
  39. Industrial Designs: Ideas and Inventive Problem Solving for Industrial Design
    Industrial Designs: Ideas and Inventive Problem Solving for Industrial Design Phil Gilberts
  40. Win the Game of Googleopoly: Unlocking the Secret Strategy of Search Engines
    Win the Game of Googleopoly: Unlocking the Secret Strategy of Search Engines Sean V. Bradley
  41. The Midrange Theory: Basketball’s Evolution in the Age of Analytics
    The Midrange Theory: Basketball’s Evolution in the Age of Analytics Seth Partnow
  42. Building a Cyber Risk Management Program: Evolving Security for the Digital Age
    Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen
  43. Competition Overdose: How Free Market Mythology Transformed Us from Citizen Kings to Market Servants
    Competition Overdose: How Free Market Mythology Transformed Us from Citizen Kings to Market Servants Maurice E. Stucke
  44. GINI: Capitalism, Cryptocurrencies & the Battle for Human Rights
    GINI: Capitalism, Cryptocurrencies & the Battle for Human Rights Ferris Eanfar
  45. Chemical Engineering: Design and Analysis of Chemical Process Engineering
    Chemical Engineering: Design and Analysis of Chemical Process Engineering Phil Gilberts
  46. Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers
    Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers Robb Wilson
  47. The Cloud Revolution: How the Convergence of New Technologies Will Unleash the Next Economic Boom and A Roaring 2020s
    The Cloud Revolution: How the Convergence of New Technologies Will Unleash the Next Economic Boom and A Roaring 2020s Mark P. Mills
  48. How to Speak Science: Gravity, Relativity, and Other Ideas That Were Crazy until Proven Brilliant
    How to Speak Science: Gravity, Relativity, and Other Ideas That Were Crazy until Proven Brilliant Bruce Benamran
  49. Probability Theory
    Probability Theory Introbooks Team
  50. Yellen: The Trailblazing Economist Who Navigated an Era of Upheaval
    Yellen: The Trailblazing Economist Who Navigated an Era of Upheaval Jon Hilsenrath
  51. The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power
    The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power Joseph Turow
  52. RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals
    RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals Brown Brown
  53. The Cost of Free Money: How Unfettered Capital Threatens Our Economic Future
    The Cost of Free Money: How Unfettered Capital Threatens Our Economic Future Paola Subacchi
  54. The Tyranny of Dead Ideas: Revolutionary Thinking for a New Age of Prosperity
    The Tyranny of Dead Ideas: Revolutionary Thinking for a New Age of Prosperity Matt Miller
  55. Winner Sells All: Amazon, Walmart, and the Battle for Our Wallets
    Winner Sells All: Amazon, Walmart, and the Battle for Our Wallets Jason Del Rey
  56. Edge of Armageddon: The Imminent Nuclear Consequence
    Edge of Armageddon: The Imminent Nuclear Consequence Robert Enochs
  57. Beyond the Valley: How Innovators around the World Are Overcoming Inequality and Creating the Technologies of Tomorrow
    Beyond the Valley: How Innovators around the World Are Overcoming Inequality and Creating the Technologies of Tomorrow Ramesh Srinivasan
  58. Game Theory: Applications to Economics and Economic Theory
    Game Theory: Applications to Economics and Economic Theory Daniel Shore
  59. Economic Warfare: Secrets of Wealth Creation in the Age of Welfare Politics
    Economic Warfare: Secrets of Wealth Creation in the Age of Welfare Politics Herman Cain
  60. The Digital Helix: Transforming Your Organization's DNA to Thrive in the Digital Age
    The Digital Helix: Transforming Your Organization's DNA to Thrive in the Digital Age Chris Aarons
  61. Not Very Intelligent Design: On the Origin, Creation and Evolution of the Theory of Intelligent Design
    Not Very Intelligent Design: On the Origin, Creation and Evolution of the Theory of Intelligent Design Neel Ingman
  62. Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
    Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors Perry Carpenter
  63. The Health Hazard: Take control, Restore Wellbeing and Optimise Impact
    The Health Hazard: Take control, Restore Wellbeing and Optimise Impact Alison Coughlan
  64. Social Capital: Life online in the shadow of Ireland’s tech boom
    Social Capital: Life online in the shadow of Ireland’s tech boom Aoife Barry
  65. The Rise of the Cobot: Grow Your Business Exponentially with Collaborative Artificial Intelligence
    The Rise of the Cobot: Grow Your Business Exponentially with Collaborative Artificial Intelligence John Rauscher
  66. Designing Transformative Experiences: A Toolkit for Leaders, Trainers, Teachers, and other Experience Designers
    Designing Transformative Experiences: A Toolkit for Leaders, Trainers, Teachers, and other Experience Designers Brad McLain
  67. The Deal Maker: How William C. Durant Made General Motors
    The Deal Maker: How William C. Durant Made General Motors Axel Madsen
  68. Cracking the China Conundrum: Why Conventional Economic Wisdom Is Wrong
    Cracking the China Conundrum: Why Conventional Economic Wisdom Is Wrong Yukon Huang
  69. The Boomerang Principle: Inspire Lifetime Loyalty from Your Employees
    The Boomerang Principle: Inspire Lifetime Loyalty from Your Employees Lee Caraher
  70. Haptics
    Haptics Lynette Jones
  71. Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1
    Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS
  72. Diplomacy Conversations: How to Win at Diplomacy, Or Strategy for Face-to-Face, Online, and Tournaments
    Diplomacy Conversations: How to Win at Diplomacy, Or Strategy for Face-to-Face, Online, and Tournaments Erik van Mechelen
  73. The Art of Attack: Attacker Mindset for Security Professionals
    The Art of Attack: Attacker Mindset for Security Professionals Maxie Reynolds
  74. The Miracle: The Epic Story of Asia's Quest for Wealth
    The Miracle: The Epic Story of Asia's Quest for Wealth Michael Schuman
  75. Exchange-Traded Funds For Dummies
    Exchange-Traded Funds For Dummies Russell Wild
  76. Winning at the Acquisition Game : Tools, Templates and Best Practices Across the M&A Process: Tools, Templates, and Best Practices Across the M&A Process
    Winning at the Acquisition Game : Tools, Templates and Best Practices Across the M&A Process: Tools, Templates, and Best Practices Across the M&A Process Timothy Galpin

Maak je keuze:

  • Voor ieder een passend abonnement

  • Kies het aantal uur en accounts dat bij jou past

  • Download verhalen voor offline toegang

  • Kids Mode - een veilige omgeving voor kinderen

Meest gekozen

Unlimited

Voor wie onbeperkt wil luisteren en lezen.

€13.99 /30 dagen
14 dagen gratis
  • 1 account

  • Onbeperkte toegang

  • Meer dan 1 miljoen luisterboeken en ebooks

  • Altijd opzegbaar

Probeer 14 dagen gratis

Premium

Voor wie zo nu en dan wil luisteren en lezen.

€9.99 /30 dagen
  • 1 account

  • 30 uur/30 dagen

  • Meer dan 1 miljoen luisterboeken en ebooks

  • Altijd opzegbaar

Probeer 7 dagen gratis

Flex

Voor wie Storytel wil proberen.

€7.99 /30 dagen
  • 1 account

  • 10 uur/30 dagen

  • Spaar ongebruikte uren op tot 50 uur

  • Meer dan 1 miljoen luisterboeken en ebooks

  • Altijd opzegbaar

Probeer 7 dagen gratis

Family

Voor wie verhalen met familie en vrienden wil delen.

Vanaf €18.99 /30 dagen
14 dagen gratis
  • 2-3 accounts

  • Onbeperkte toegang

  • Meer dan 1 miljoen luisterboeken en ebooks

  • Altijd opzegbaar

2 accounts

€18.99 /30 dagen
Probeer 14 dagen gratis