ISBN13: | 9781032761633 |
ISBN10: | 1032761636 |
Kötéstípus: | Puhakötés |
Terjedelem: | 208 oldal |
Méret: | 234x156 mm |
Nyelv: | angol |
Illusztrációk: | 7 Illustrations, black & white; 7 Line drawings, black & white; 1 Tables, black & white |
700 |
Adatkezelés a számítógépes rendszerekben
Számítógép architektúrák, logikai tervezés
Számítógépes hálózatok általában
Adatvédelem, adatbiztonság
Számítógépes bűnözés
A számítástechnika biztonsági és egészségügyi vonatkozásai
A számítógép és az információs technológia hatása a társadalomra
Büntető jog
Közgazdaságtan
Szolgáltatóipar
Kriminológia
Adatkezelés a számítógépes rendszerekben (karitatív célú kampány)
Számítógép architektúrák, logikai tervezés (karitatív célú kampány)
Számítógépes hálózatok általában (karitatív célú kampány)
Adatvédelem, adatbiztonság (karitatív célú kampány)
Számítógépes bűnözés (karitatív célú kampány)
A számítástechnika biztonsági és egészségügyi vonatkozásai (karitatív célú kampány)
A számítógép és az információs technológia hatása a társadalomra (karitatív célú kampány)
Büntető jog (karitatív célú kampány)
Közgazdaságtan (karitatív célú kampány)
Szolgáltatóipar (karitatív célú kampány)
Kriminológia (karitatív célú kampány)
The Shortest Hour
GBP 44.99
Kattintson ide a feliratkozáshoz
Lee Parrish provides an example-laden vision to improve cybersecurity governance in the boardroom. Additionally, Lee deciphers the technical jargon to increase the reader?s cyber fluency ? makes you able to ask direct questions, understand the answers provided, challenge strategies, and advise on important cyber decisions.
Independent Directors of corporate boards understand the importance of cybersecurity as a business issue. Increased regulatory requirements, the onslaught of breaches, as well as the replacement of the corporate network perimeter with more third-party partnerships, have all contributed to cybersecurity rising to the top of enterprise risks. Yet, many Directors only receive a few brief cybersecurity updates during the year. Moreover, many Directors have devoted their careers to other important business disciplines and may not fully grasp the technical concepts of cybersecurity.
The challenge is that many publications on board cybersecurity governance address the topic at such a high level that it removes the important context of the cybersecurity details - or covers the topic too deeply with hard-to-understand technical language. These resources may often provide lists of security questions for Directors to ask of their management team, but they do not provide the answers to the questions so that actionable oversight can be performed. What I wanted, and why you are probably reading this book summary, is a resource that delivers the questions to ask, but also the answers - and in a narrative, easy-to-understand style.
An award-winning Chief Information Security Officer with over two decades of working with multiple Fortune 500 boards, Lee Parrish provides an example-laden vision to improve cybersecurity governance in the boardroom. Additionally, Lee deciphers the technical jargon to increase the reader?s cyber fluency ? not to make you a cyber expert, but to be able to ask direct questions, understand the answers provided, challenge strategies, and advise on important cyber decisions.
Pick up your copy of The Shortest Hour: An Applied Approach to Boardroom Cybersecurity Governance today and start your journey on achieving more effective cybersecurity oversight.
Want to learn more? Please visit www.novelsecurity.com
Preface. Introduction. Chapter 1 The Threat Landscape. Chapter 2 The Chief Information Security Officer Role. Chapter 3 Security vs Compliance. Chapter 4 Examining the Information Security Board Governance Structure. Chapter 5 Information Security Assessment. Chapter 6 The Strategic Plan. Chapter 7 The Importance of Execution. Chapter 8 Financing Cyber Security. Chapter 9 The Role of Security Vendors & Consultants. Chapter 10 Security Service Management. Chapter 11 A Vision for Cyber Security Board Governance. Section Two: Cyber Security Overview. Chapter 12 Security Operations. Chapter 13 Incident Response. Chapter 14 Security Awareness. Chapter 15 Policy Management. Chapter 16 Risk Management. Chapter 17 The Path Ahead. Appendix: Cyber Security Inquiry Checklist.