
The CISO Perspective
Understand the importance of the CISO in the cyber threat landscape
IT Governance Publishing
1. Auflage
Erschienen am 17. Oktober 2023
78 Seiten
978-1-78778-446-8 (ISBN)
Systemvoraussetzungen
für ePUB mit Adobe-DRM
E-Book Einzellizenz
Bei dem Kauf dieses E-Books erwerben Sie eine Einzel-Lizenz für eine natürliche Person, die nicht übertragbar ist. [L]
Als Download verfügbar
Beschreibung
In this updated edition, the security threat landscape has widened and the challenge for CISOs to be more than just security coordinators has become a mandate for organizational survival. This book challenges and guides information security professionals to think about information security and risk management from the enterprise level, and not just from the IT perspective.
Read this book and understand how:
The CISO's role can improve an organization's cyber strategy.
An enterprise's view of information security, business continuity, compliance, safety, and physical security is crucial for the success of your organisation's cyber security defense.
Soft skills are crucial in order for the CISO to communicate effectively with the Board and other departments in the organisation.
Standards such as ISO 27001:2022 can help your organisation implement a suitable ISMS (information security management system).
Risk management is imperative to identify, analyze, evaluate and protect the organization's assets.
Read this book and understand how:
The CISO's role can improve an organization's cyber strategy.
An enterprise's view of information security, business continuity, compliance, safety, and physical security is crucial for the success of your organisation's cyber security defense.
Soft skills are crucial in order for the CISO to communicate effectively with the Board and other departments in the organisation.
Standards such as ISO 27001:2022 can help your organisation implement a suitable ISMS (information security management system).
Risk management is imperative to identify, analyze, evaluate and protect the organization's assets.
Weitere Details
Sprache
Englisch
Verlagsort
Ely
Großbritannien
Zielgruppe
Für Beruf und Forschung
Editions-Typ
Digitale Ausgabe
Dateigröße
1,37 MB
ISBN-13
978-1-78778-446-8 (9781787784468)
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
Weitere Ausgaben
Personen
Barry Kouns is a security and risk management expert with over 25 years of experience in information security consulting, risk assessment and quality management. He formed and operates SQM Advisors, LLC an information security, risk assessment and IT service management firm that has led numerous organizations to ISO/IEC 27001:2013 certification. Mr. Kouns co-founded Risk Based Security, Inc., a vulnerability intelligence and data breach analytics company, that was acquired by Flash Point in 2022.
Jake Kouns holds a Master of Business Administration with a concentration in information security from James Madison University. He holds a number of certifications including CISSP, CISM (R), CISA (R), and CGEIT (R). Jake co-founded Risk Based Security, Inc., and is currently the Chief Innovation Officer at Flashpoint. He is well known from his presentations at security conferences including RSA, CISO Executive Summit, EntNet IEEE GLOBECOM, CanSecWest, and SyScan. Jake is also the co-founder of RVAsec, a Richmond, Virginia information security conference that has grown to host more than 500 attendees. He is the co-author of Information Technology Risk Management in Enterprise Environments and has also been interviewed numerous times as an expert in the security industry.
Jake Kouns holds a Master of Business Administration with a concentration in information security from James Madison University. He holds a number of certifications including CISSP, CISM (R), CISA (R), and CGEIT (R). Jake co-founded Risk Based Security, Inc., and is currently the Chief Innovation Officer at Flashpoint. He is well known from his presentations at security conferences including RSA, CISO Executive Summit, EntNet IEEE GLOBECOM, CanSecWest, and SyScan. Jake is also the co-founder of RVAsec, a Richmond, Virginia information security conference that has grown to host more than 500 attendees. He is the co-author of Information Technology Risk Management in Enterprise Environments and has also been interviewed numerous times as an expert in the security industry.
Inhalt
Introduction
Chapter 1: The nature of the CISO role
Chapter 2: The traditional CISO job description
Chapter 3: The changing CISO role
Chapter 4: The new CISO's toolbox
Chapter 5: Risk management
Chapter 6: The information security management system
Chapter 7: CISO Survival
Chapter 8: Summary - You become what you think about
Further reading
Chapter 1: The nature of the CISO role
Chapter 2: The traditional CISO job description
Chapter 3: The changing CISO role
Chapter 4: The new CISO's toolbox
Chapter 5: Risk management
Chapter 6: The information security management system
Chapter 7: CISO Survival
Chapter 8: Summary - You become what you think about
Further reading
Systemvoraussetzungen
Dateiformat: ePUB
Kopierschutz: Adobe-DRM (Digital Rights Management)
Systemvoraussetzungen:
- Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).
- Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions oder die App PocketBook (siehe E-Book Hilfe).
- E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)
Das Dateiformat ePUB ist sehr gut für Romane und Sachbücher geeignet – also für „fließenden” Text ohne komplexes Layout. Bei E-Readern oder Smartphones passt sich der Zeilen- und Seitenumbruch automatisch den kleinen Displays an.
Mit Adobe-DRM wird hier ein „harter” Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.
Bitte beachten Sie: Wir empfehlen Ihnen unbedingt nach Installation der Lese-Software diese mit Ihrer persönlichen Adobe-ID zu autorisieren!
Weitere Informationen finden Sie in unserer E-Book Hilfe.