Muutke küpsiste eelistusi

Security Relationship Management: Leveraging Marketing Concepts to Advance a Cybersecurity Program [Kõva köide]

(Lee Parrish Ventures, USA)
  • Formaat: Hardback, 122 pages, kõrgus x laius: 234x156 mm, kaal: 390 g, 2 Tables, black and white; 1 Line drawings, black and white; 4 Halftones, black and white; 5 Illustrations, black and white
  • Sari: Security, Audit and Leadership Series
  • Ilmumisaeg: 21-Apr-2025
  • Kirjastus: CRC Press
  • ISBN-10: 1032979984
  • ISBN-13: 9781032979984
Teised raamatud teemal:
  • Kõva köide
  • Hind: 133,88 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 178,50 €
  • Säästad 25%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 3-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Raamatukogudele
  • Formaat: Hardback, 122 pages, kõrgus x laius: 234x156 mm, kaal: 390 g, 2 Tables, black and white; 1 Line drawings, black and white; 4 Halftones, black and white; 5 Illustrations, black and white
  • Sari: Security, Audit and Leadership Series
  • Ilmumisaeg: 21-Apr-2025
  • Kirjastus: CRC Press
  • ISBN-10: 1032979984
  • ISBN-13: 9781032979984
Teised raamatud teemal:

Aligning security with business goals is vital for managing risks without harm. This book shows CISOs how to use marketing concepts—like segmentation and SRM—to customise messaging, build relationships, and enhance business alignment. Discover strategies to optimise cybersecurity.



Aligning information security to the goals and strategies of the business is paramount for ensuring risks are addressed, without an abundance of negative impacts to the company. But how does a Chief Information Security Officer (CISO) accomplish effective alignment? A security executive must understand the detailed needs of business leaders and stakeholders from across all corners of the company. We cannot rely on a standard cadence of general security discussions across all of the lines of business, as well as functional areas, and expect our alignment to be maximally effective. Instead, we should promote our security programs in such a way that makes it personal to whomever we are speaking with at any given time.

 

By leveraging already established and tested marketing concepts, slightly altered for information security, the CISO can tailor their message to fit the needs of each stakeholder. This allows for in-depth business alignment, as well as a holistic view of the company’s underpinnings for the CISO. Within these pages, the reader will learn how segmentation, the Four P’s, and customer relationship management techniques, can help to transform their security program. Additionally, the book introduces a concept called Security Relationship Management (SRM) that optimizes the creation and nurturing of the hundreds of professional relationships (within and outside the company) that a CISO must balance each week. Through structured tracking of interactions and analyzing SRM data, the CISO ensures that relationships are managed effectively, which increases alignment between the business and cybersecurity initiatives. Pick up your copy of Security Relationship Management: Leveraging Marketing Concepts to Advance a Cybersecurity Program, today to begin your SRM journey.

 

Please visit www.novelsecurity.com for more information.

Arvustused

Security Relationship Management is notable for applying marketing theory to cyber leadership. He replaces talk of firewalls with the four Ps. He argues that CISOs must intentionally design their services, decide when to outsource, manage how those services are delivered, and build a recognizable brand in a healthcare system that translates into risk-based service catalogues, differentiated support for clinicians and executives, and concise briefings that keep security visible without spamming busy staff. The heart of the book is stakeholder segmentation. Parrish recommends mapping the organization into discrete groupsboards, executive teams, business units, and vendorsand tailoring messages and metrics to each. An accompanying ABC model and simple scoring system track relationship strength by rewarding face-to-face engagement and flagging long gaps. Where the book shines is in its emphasis on soft skills. Parrish warns against carpetbombing stakeholders with alerts, urges leaders to align security initiatives with their wants, and suggests small gestureshandwritten notes, coffee chatsto build trust. This focus on branding and relationships encourages CISOs to evolve from reactive technologists into advisors who speak the language of the business. The drawback is that healthcare-specific issues like HIPAA and medical device security get only passing mention, and smaller teams may struggle to maintain contact cards and scoring. Still, for those willing to adopt a marketing mindset, the book offers a human framework for making security programs resonate with stakeholders.

Keith Duemling, Chief Information Security Officer

Just finished reading Security Relationship Management: Leveraging Marketing Concepts to Advance a Cybersecurity Program by Lee Parrish LinkedIn, and Im genuinely inspired. As someone deeply interested in auditing policy and governance around GenAI and information security, this book resonated with me on multiple levels. Parrishs approach to integrating marketing principles into cybersecurity leadership is not just innovative: its practical, human-centred, and refreshingly actionable. What stood out most was the concept of Security Relationship Management (SRM)a structured, data-driven way to build and nurture relationships across the enterprise. Its a reminder that cybersecurity isnt just about controls and compliance; its about people, trust, and strategic alignment. If you aspire to be in a role and wish to be in a position of contributing more, act like you are already in that role. Lee Parrish This quote hit home. Its a call to lead with intention, to build bridges across departments, and to elevate the CISO role from technical guardian to strategic partner. Whether you're a security leader, auditor, or someone navigating the intersection of business and technology, this book offers a compelling roadmap for making cybersecurity personal, relevant, and impactful. Highly recommended for anyone looking to deepen their influence and build meaningful connections in the cybersecurity space.

Posted to LinkedIn by Yves Genest, Senior Executive and Experienced Internal and Performance Audit.

Security Relationship Management is notable for applying marketing theory to cyber leadership. He replaces talk of firewalls with the four Ps. He argues that CISOs must intentionally design their services, decide when to outsource, manage how those services are delivered, and build a recognizable brand in a healthcare system that translates into risk-based service catalogues, differentiated support for clinicians and executives, and concise briefings that keep security visible without spamming busy staff. The heart of the book is stakeholder segmentation. Parrish recommends mapping the organization into discrete groupsboards, executive teams, business units, and vendorsand tailoring messages and metrics to each. An accompanying ABC model and simple scoring system track relationship strength by rewarding face-to-face engagement and flagging long gaps. Where the book shines is in its emphasis on soft skills. Parrish warns against carpetbombing stakeholders with alerts, urges leaders to align security initiatives with their wants, and suggests small gestureshandwritten notes, coffee chatsto build trust. This focus on branding and relationships encourages CISOs to evolve from reactive technologists into advisors who speak the language of the business. The drawback is that healthcare-specific issues like HIPAA and medicaldevice security get only passing mention, and smaller teams may struggle to maintain contact cards and scoring. Still, for those willing to adopt a marketing mindset, the book offers a human framework for making security programs resonate with stakeholders.

Keith Duemling Chief Information Security Officer

Security Relationship Management bridges the often-siloed worlds of cybersecurity and business strategy with remarkable insight. Lee Parrish draws from his extensive experience as a CISO to introduce SRMa framework that treats internal stakeholders like customers and promotes tailored, relationship-driven engagement. By borrowing from marketing disciplines, Parrish reframes cybersecurity as a service that must be understood, promoted, and aligned with organizational goals.

This book is more than a guide for security professionalsits a call to action for any executive who wants to see cybersecurity become a strategic enabler rather than a technical afterthought. Parrishs emphasis on empathy, communication, and business acumen is refreshing and timely. His SRM toolkit, segmentation strategies, and analytics model offer a blueprint for building trust and influence across departments, geographies, and industries. Its a must-read for anyone who believes that relationships are the foundation of resilience.

Gary Craven, P.Ag., FCMC, ITCP Partner Paradigm Consulting Group

Dedication. Introduction.
Chapter 1: Aligning on the CISO Role.
Chapter
2: Security Relationship Management Defined.
Chapter 3: Marketing Concepts
Re-Imagined.
Chapter 4: Segmentation (Not the Network Kind).
Chapter 5:
Segmentation Suggestions.
Chapter 6: The Core Attributes of Segments.
Chapter
7: The ABCs of SRM.
Chapter 8: SRM Analytics.
Chapter 9: Moving Outside of
Your Corporation.
Chapter 10: Addressing Challenges.
Chapter 11: The Future
of SRM. Appendix: SRM Toolkit.
Lee Parrish is an award-winning technology executive with over two decades of unique experience in blending cybersecurity expertise with essential business competencies. As a Chief Information Security Officer, he has built customized cybersecurity strategies for global Fortune 500 corporations and has led real-world incident responses to cyber events. Lee has served as a trusted advisor on cybersecurity to multiple boards consisting of Chief Executive Officers, a former White House Chief of Staff, retired high-ranking military officers and a former U.S. Presidential candidate.

Lee possesses two graduate degrees and is certified as both a Boardroom Qualified Technology Expert as well as a Certified Information Systems Security Professional. He has published numerous articles in industry journals, contributed to a best-selling information security book, and authored The Shortest Hour: An Applied Approach to Boardroom Governance of Cyber Security, as well as a childrens book on cybersecurity. He is a frequent speaker at international security conferences and a guest on various podcasts.

Lee is a combat veteran of the United States Marine Corps.