• Contact

  • Newsletter

  • About us

  • Delivery options

  • Prospero Book Market Podcast

  • 'Language is english. Váltás magyarra.'
    Wishlist
    Security Relationship Management and The Shortest Hour Two-Book Bundle

    Security Relationship Management and The Shortest Hour Two-Book Bundle by Parrish, Lee;

    Series: Security, Audit and Leadership Series;

      • GET 20% OFF

      • The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
      • Publisher's listprice GBP 102.98
      • The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.

        46 495 Ft (44 281 Ft + 5% VAT)
      • Discount 20% (cc. 9 299 Ft off)
      • Discounted price 37 196 Ft (35 425 Ft + 5% VAT)
      • Discount is valid until: 30 June 2026

    41 846 Ft

    db

    Availability

    Not yet published.

    Why don't you give exact delivery time?

    Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.

    Short description:

    Aligning security with business goals is vital for managing risks without harm. This book shows CISOs how to use marketing concepts—like segmentation and SRM—to customise messaging, build relationships, and enhance business alignment. Discover strategies to optimise cybersecurity.

    More

    Long description:

    1st Edition

    Security Relationship Management
    Leveraging Marketing Concepts to Advance a Cybersecurity Program

    Aligning information security to the goals and strategies of the business is paramount for ensuring risks are addressed, without an abundance of negative impacts to the company. But how does a Chief Information Security Officer (CISO) accomplish effective alignment? A security executive must understand the detailed needs of business leaders and stakeholders from across all corners of the company. We cannot rely on a standard cadence of general security discussions across all of the lines of business, as well as functional areas, and expect our alignment to be maximally effective. Instead, we should promote our security programs in such a way that makes it personal to whomever we are speaking with at any given time.

    By leveraging already established and tested marketing concepts, slightly altered for information security, the CISO can tailor their message to fit the needs of each stakeholder. This allows for in-depth business alignment, as well as a holistic view of the company’s underpinnings for the CISO. Within these pages, the reader will learn how segmentation, the Four Ps, and customer relationship management techniques, can help to transform their security program. Additionally, the book introduces a concept called Security Relationship Management (SRM) that optimizes the creation and nurturing of the hundreds of professional relationships (within and outside the company) that a CISO must balance each week. Through structured tracking of interactions and analyzing SRM data, the CISO ensures that relationships are managed effectively, which increases alignment between the business and cybersecurity initiatives. Pick up your copy of Security Relationship Management: Leveraging Marketing Concepts to Advance a Cybersecurity Program, today to begin your SRM journey.

    Please visit www.novelsecurity.com for more information.


    1st Edition

    The Shortest Hour
    An Applied Approach to Boardroom Governance of Cyber Security

    Independent directors of corporate boards understand the importance of cyber security as a business issue. Increased regulatory requirements, the onslaught of breaches, as well as the replacement of the corporate network perimeter with more third-party partnerships have all contributed to cyber security rising to the top of enterprise risks. Yet, many directors only receive a few brief cyber security updates during the year. Moreover, many directors have devoted their careers to other important business disciplines and may not fully grasp the technical concepts of cyber security.

    The challenge is that many publications on board cyber security governance address the topic at such a high level that it removes the important context of the cyber security details—or covers the topic too deeply with hard-to-understand technical language. These resources may often provide lists of security questions for directors to ask of their management team, but they do not provide the answers to the questions so that actionable oversight can be performed. What I would have wanted, and why you are probably reading this book summary, is a resource that delivers the questions to ask but also provides the answers and in a narrative, easy-to-understand style.

    An award-winning Chief Information Security Officer with over two decades of working with multiple Fortune 500 boards, Lee Parrish provides an example-laden vision to improve cyber security governance in the boardroom. Additionally, Lee deciphers the technical jargon to increase the reader’s cyber fluency—not to make you a cyber expert but to help you be able to ask direct questions, understand the answers provided, challenge strategies, and advise on important cyber decisions.

    Pick up your copy of The Shortest Hour: An Applied Approach to Boardroom Governance of Cyber Security today and start your journey on achieving more effective cyber security oversight.

    Want to learn more? Please visit www.novelsecurity.com

    More

    Table of Contents:

    1st Edition

    Security Relationship Management
    Leveraging Marketing Concepts to Advance a Cybersecurity Program

    Dedication



    Introduction



    Chapter 1: Aligning on the CISO Role

    The Importance of Information Security

    Enterprise Reach

    Executive Level Access

    Putting It All Together



    Chapter 2: Security Relationship Management Defined



    Chapter 3: Marketing Concepts Re-Imagined

    Getting Started

    Product

    Price

    Place

    Promotion



    Chapter 4: Segmentation (Not the Network Kind)



    Chapter 5: Segmentation Suggestions

    Corporation

    Board of Directors

    Executive Team

    Cybersecurity Governance Committee

    Top Cybersecurity Proponents

    Other Committees

    Business Unit

    Manufacturing

    Distribution

    International

    Human Resources/Talent Management

    Finance

    Sales

    Information Technology (IT)

    Digital & eCommerce

    Communications/Investor Relations

    Legal (Including Outside Counsel)

    Internal Audit

    Top Cybersecurity Vendors

    The Cybersecurity Team



    Chapter 6: The Core Attributes of Segments

    Critical Stakeholders

    Metrics & Measurements

    Segment Contributions

    Segment Details

    Feedback Loops

    Compliance Requirements

    Cultural Considerations

    Documentation Retention



    Chapter 7: The ABC’s of SRM

    Connection Status

    Advocate

    Connection

    Initial Interaction

    Shadow

    Tracking Connections

    Connection Information

    Top Initiatives

    A Level Deeper



    Chapter 8: SRM Analytics

    Scenario One

    Scenario Two

    Scenario Three

    Broader Themes



    Chapter 9: Moving Outside of Your Corporation

    Frequency

    Scale

    Data Elements

    Vendor Relationships



    Chapter 10: Addressing Challenges

    Managing Engagement Challenges

    Oversaturation & Balancing the Message

    Unconventional Measures

    Geographical Challenges

    Company Size



    Chapter 11: The Future of SRM



    Appendix: SRM Toolkit

    SRM Discussion Topics

    Industry-specific Relationship Building


    1st Edition

    The Shortest Hour
    An Applied Approach to Boardroom Governance of Cyber Security

    About the Author
    Preface
    Introduction
    SECTION ONE. Enhancing Board Oversight
    1. The threat landscape
    2. The chief information security officer role
    3. Security vs. compliance
    4. Examining the information security board governance structure
    5. Information security assessment
    6. The strategic plan
    7. The importance of execution
    8. Financing cyber security
    9. The role of security vendors and consultants
    10. Security service management
    11. A vision for cyber security board governance
    SECTION TWO. Cyber security overview
    12. Security operations
    13. Incident response
    14. Security awareness
    15. Policy management
    16. Risk management
    17. The path ahead
    Appendix: Cyber security inquiry checklist
    Index

    More
    0