Muutke küpsiste eelistusi

E-raamat: CISO Evolution: Business Knowledge for Cyberse curity Executives: Business Knowledge for Cybersecurity Executives [Wiley Online]

  • Formaat: 416 pages
  • Ilmumisaeg: 04-Apr-2022
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 1119782511
  • ISBN-13: 9781119782513
Teised raamatud teemal:
  • Wiley Online
  • Hind: 52,81 €*
  • * hind, mis tagab piiramatu üheaegsete kasutajate arvuga ligipääsu piiramatuks ajaks
  • Formaat: 416 pages
  • Ilmumisaeg: 04-Apr-2022
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 1119782511
  • ISBN-13: 9781119782513
Teised raamatud teemal:
"Cybersecurity is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. A CISO (chief information securityofficer) is the senior-level executive within an organization responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected. The CISO directs staff in identifying, developing, implementing, and maintaining processes across the enterprise to reduce information and IT risks."--

Learn to effectively deliver business aligned cybersecurity outcomes  

In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos “Rock” Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes. 

The authors use illustrative stories to show professionals how to establish an executive presence and avoid the most common pitfalls experienced by technology experts when speaking and presenting to executives. The book will show you how to: 

  • Inspire trust in senior business leaders by properly aligning and setting expectations around risk appetite and capital allocation 
  • Properly characterize the indispensable role of cybersecurity in your company’s overall strategic plan 
  • Acquire the necessary funding and resources for your company’s cybersecurity program and avoid the stress and anxiety that comes with underfunding 

Perfect for security and risk professionals, IT auditors, and risk managers looking for effective strategies to communicate cybersecurity concepts and ideas to business professionals without a background in technology.  The CISO Evolution is also a must-read resource for business executives, managers, and leaders hoping to improve the quality of dialogue with their cybersecurity leaders. 

Foreword ix
Preface xi
Acknowledgments xv
Introduction 1(6)
PART I Foundational Business Knowledge
7(160)
Chapter 1 Financial Principles
9(20)
Chapter 2 Business Strategy Tools
29(26)
Chapter 3 Business Decisions
55(36)
Chapter 4 Value Creation
91(38)
Chapter 5 Articulating the Business Case
129(38)
PART II Communication and Education
167(106)
Chapter 6 Cybersecurity: A Concern of the Business, Not Just IT
169(28)
Chapter 7 Translating Cyber Risk into Business Risk
197(42)
Chapter 8 Communication - You Do It Every Day (or Do You?)
239(34)
PART III Cybersecurity Leadership
273(110)
Chapter 9 Relationship Management
275(32)
Chapter 10 Recruiting and Leading High Performing Teams
307(32)
Chapter 11 Managing Human Capital
339(28)
Chapter 12 Negotiation
367(16)
Conclusion 383(2)
Index 385
MATTHEW K. SHARP is Chief Information Security Officer of Logicworks. He is responsible for security governance, risk management, strategy, and architecture in a business that provides comprehensive cloud services to help customers successfully onboard and operate complex and compliant workloads on the AWS and Azure public clouds.

KYRIAKOS ROCK LAMBROS is CEO and Founder of RockCyber, a cybersecurity strategy consulting firm focused on helping firms align cybersecurity to their enterprise business goals. He has extensive experience building security programs and overseeing security architecture, operations, threat intelligence, governance, and risk management.