Muutke küpsiste eelistusi

E-raamat: CISO Perspective: Understand the importance of the CISO in the cyber threat landscape

  • Formaat: 78 pages
  • Ilmumisaeg: 17-Oct-2023
  • Kirjastus: IT Governance Publishing
  • Keel: eng
  • ISBN-13: 9781787784451
  • Formaat - PDF+DRM
  • Hind: 17,62 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 78 pages
  • Ilmumisaeg: 17-Oct-2023
  • Kirjastus: IT Governance Publishing
  • Keel: eng
  • ISBN-13: 9781787784451

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Buy this book today and understand how to maximise the benefits of the CISO’s role in your organization!

In this updated edition, the security threat landscape has widened and the challenge for CISOs to be more than just security coordinators has become a mandate for organizational survival. This book challenges and guides information security professionals to think about information security and risk management from the enterprise level, and not just from the IT perspective.Read this book and understand how:The CISO’s role can improve an organization’s cyber strategy.An enterprise’s view of information security, business continuity, compliance, safety, and physical security is crucial for the success of your organisation’s cyber security defense.Soft skills are crucial in order for the CISO to communicate effectively with the Board and other departments in the organisation.Standards such as ISO 27001:2022 can help your organisation implement a suitable ISMS (information security management system).Risk management is imperative to identify, analyze, evaluate and protect the organization’s assets.
Introduction

Chapter 1: The nature of the CISO role

Chapter 2: The traditional CISO job description

Chapter 3: The changing CISO role

Chapter 4: The new CISOs toolbox

Chapter 5: Risk management

Chapter 6: The information security management system

Chapter 7: CISO Survival

Chapter 8: Summary You become what you think about

Further reading
Barry Kouns is a security and risk management expert with over 25 years of experience in information security consulting, risk assessment and quality management. He formed and operates SQM Advisors, LLC an information security, risk assessment and IT service management firm that has led numerous organizations to ISO/IEC 27001:2013 certification. Mr. Kouns co-founded Risk Based Security, Inc., a vulnerability intelligence and data breach analytics company, that was acquired by Flash Point in 2022.





Jake Kouns holds a Master of Business Administration with a concentration in information security from James Madison University. He holds a number of certifications including CISSP, CISM®, CISA®, and CGEIT®. Jake co-founded Risk Based Security, Inc., and is currently the Chief Innovation Officer at Flashpoint. He is well known from his presentations at security conferences including RSA, CISO Executive Summit, EntNet IEEE GLOBECOM, CanSecWest, and SyScan. Jake is also the co-founder of RVAsec, a Richmond, Virginia information security conference that has grown to host more than 500 attendees. He is the co-author of Information Technology Risk Management in Enterprise Environments and has also been interviewed numerous times as an expert in the security industry.