Fight fire with fire proactive cybersecurity strategies for today's leaders

Organizations around the world are in a struggle for survival, racing to transform themselves in a herculean effort to adapt to the digital age, all while protecting themselves from headline-grabbing cybersecurity threats. As organizations succeed or fail, the centrality and importance of cybersecur...

Descripción completa

Detalles Bibliográficos
Otros Autores: Tarun, Renee, author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Indianapolis, Indiana : John Wiley and Sons [2021]
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009645697406719
Tabla de Contenidos:
  • Intro
  • Title Page
  • Copyright Page
  • About the Author
  • Acknowledgments
  • Contents
  • Introduction
  • How Can We Be Effective CISOs?
  • Who This Book Is For
  • Part 1 People
  • Chapter 1 From Technologist to Strategist
  • A Path to CISO
  • Responsibilities of a CISO
  • CISO Archetypes
  • Evolution of the CISO Role
  • Technical Strengths Versus Security Officer Strengths
  • Chapter 2 Communicating with the Board
  • The Board
  • Speak Their Language
  • Preparing for the Board Meeting
  • Keep It Direct, Crisp, and Simple
  • Working Directly for the Board: The Ultimate Case Study
  • The Power of One-on-One Meetings
  • Get to Know Your Board
  • Chapter 3 Building a Culture of Security
  • The Building Blocks of the Journey
  • Program and Cultural Foundation
  • Program Build and Cultural Engagement
  • Target Maturity and Cultural Enlightenment
  • Reaching Trusted Advisor
  • Conclusion
  • Chapter 4 Who Is Behind the Evolving Threat Landscape?
  • Cyberattacks: Who Is Behind External Threats?
  • Key Tactics
  • The Insider Threat
  • Conclusion
  • Chapter 5 Addressing the Skills and Diversity Gap
  • Assessing the Skills Gap
  • Assessing the Diversity Gap
  • The Power of Diverse Teams
  • Bridging the Skills and Diversity Gaps
  • Advice for Those Starting a Career in Cybersecurity
  • To Move Up, Think Outside the Box
  • Conclusion
  • Part 2 Process
  • Chapter 6 Effective Cyber Risk Management Requires Broad Collaboration
  • Understanding Your Organization's Risk Appetite
  • Measuring Actual Risk Against Risk Appetite
  • How to Engage in Governance and Oversight of Cyber Risk
  • Thinking Strategically About Potential Risks
  • Reducing Risk by Sharing Information
  • Reducing Risk Through Cyber Insurance
  • In Closing
  • Chapter 7 Blending NOC and SOC
  • The Vision
  • The Danger of Blending Superficially or Too Quickly.
  • NOC and SOC Focus on Different Issues
  • Approaches to Blending NOC and SOC
  • Breaking Down Silos to Build Teams
  • Working with Executive Leadership
  • Processes for Integrating the NOC and SOC
  • Technology for Improved Incident Response
  • A Smooth but Slow Transition
  • Chapter 8 Security by Design
  • What Is Secure Development? What Does It Encompass?
  • Skipping Ahead to Process and Technology-Wait, What?
  • People
  • Conclusion
  • Chapter 9 From Enforcer to Strategic Partner
  • Information Governance Council: Oversight That Works
  • Automating Compliance
  • Delivering Value in a Changing Environment
  • Evolve Your Use of Maturity Frameworks
  • Conclude with a Culture of Compliance
  • Chapter 10 Don't Let Cyber Supply Chain Security Be Your Weakest Link
  • What Does C-SCRM Encompass?
  • The Ultimate Moving Target
  • The Expansion of Software-Based Functionality
  • People: It Takes a Village
  • Process: It Takes a Framework
  • Technology: It Takes Automation
  • Features to Look for in a Modern C-SCRM Solution
  • Change Management: It Comes Back to the Village
  • Conclusion
  • Part 3 Technology
  • Chapter 11 Cybersecurity in the Cloud
  • Complexity, Meet Vulnerability
  • More (Vendors &amp
  • Connectivity) But Not Merrier
  • More Risk, Same Budget
  • Who Is Ultimately Responsible?
  • Chapter 12 The Convergence of Cyber and Physical
  • Expanding IoT Leads to Expanding Risks
  • Moving Toward Solutions: Taking Stock
  • Conclusion
  • Chapter 13 Security-Driven Networking
  • The Cloud Has Changed Everything About Security
  • Last-Generation Security Solutions Are Inadequate
  • How Security Products Should Adapt
  • Future-Proofing: How CISOs Should Adapt
  • Protecting Data: What, Where, Who, and How
  • Steps to Security-Driven Networking
  • What Does the Best Security-Driven Network Look Like?
  • Chapter 14 Achieving End-to-End Security.
  • Yesterday's Solutions Don't Solve Today's Problems
  • Unified Threat Intelligence
  • Integrated Security Platforms Enable and Protect Digital Innovation
  • AI-Driven Security Operations
  • Adaptive Cloud Security
  • Conclusion
  • Glossary
  • Resources We Rely On
  • Index
  • EULA.