Fight fire with fire proactive cybersecurity strategies for today's leaders
Organizations around the world are in a struggle for survival, racing to transform themselves in a herculean effort to adapt to the digital age, all while protecting themselves from headline-grabbing cybersecurity threats. As organizations succeed or fail, the centrality and importance of cybersecur...
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Indianapolis, Indiana :
John Wiley and Sons
[2021]
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009645697406719 |
Tabla de Contenidos:
- Intro
- Title Page
- Copyright Page
- About the Author
- Acknowledgments
- Contents
- Introduction
- How Can We Be Effective CISOs?
- Who This Book Is For
- Part 1 People
- Chapter 1 From Technologist to Strategist
- A Path to CISO
- Responsibilities of a CISO
- CISO Archetypes
- Evolution of the CISO Role
- Technical Strengths Versus Security Officer Strengths
- Chapter 2 Communicating with the Board
- The Board
- Speak Their Language
- Preparing for the Board Meeting
- Keep It Direct, Crisp, and Simple
- Working Directly for the Board: The Ultimate Case Study
- The Power of One-on-One Meetings
- Get to Know Your Board
- Chapter 3 Building a Culture of Security
- The Building Blocks of the Journey
- Program and Cultural Foundation
- Program Build and Cultural Engagement
- Target Maturity and Cultural Enlightenment
- Reaching Trusted Advisor
- Conclusion
- Chapter 4 Who Is Behind the Evolving Threat Landscape?
- Cyberattacks: Who Is Behind External Threats?
- Key Tactics
- The Insider Threat
- Conclusion
- Chapter 5 Addressing the Skills and Diversity Gap
- Assessing the Skills Gap
- Assessing the Diversity Gap
- The Power of Diverse Teams
- Bridging the Skills and Diversity Gaps
- Advice for Those Starting a Career in Cybersecurity
- To Move Up, Think Outside the Box
- Conclusion
- Part 2 Process
- Chapter 6 Effective Cyber Risk Management Requires Broad Collaboration
- Understanding Your Organization's Risk Appetite
- Measuring Actual Risk Against Risk Appetite
- How to Engage in Governance and Oversight of Cyber Risk
- Thinking Strategically About Potential Risks
- Reducing Risk by Sharing Information
- Reducing Risk Through Cyber Insurance
- In Closing
- Chapter 7 Blending NOC and SOC
- The Vision
- The Danger of Blending Superficially or Too Quickly.
- NOC and SOC Focus on Different Issues
- Approaches to Blending NOC and SOC
- Breaking Down Silos to Build Teams
- Working with Executive Leadership
- Processes for Integrating the NOC and SOC
- Technology for Improved Incident Response
- A Smooth but Slow Transition
- Chapter 8 Security by Design
- What Is Secure Development? What Does It Encompass?
- Skipping Ahead to Process and Technology-Wait, What?
- People
- Conclusion
- Chapter 9 From Enforcer to Strategic Partner
- Information Governance Council: Oversight That Works
- Automating Compliance
- Delivering Value in a Changing Environment
- Evolve Your Use of Maturity Frameworks
- Conclude with a Culture of Compliance
- Chapter 10 Don't Let Cyber Supply Chain Security Be Your Weakest Link
- What Does C-SCRM Encompass?
- The Ultimate Moving Target
- The Expansion of Software-Based Functionality
- People: It Takes a Village
- Process: It Takes a Framework
- Technology: It Takes Automation
- Features to Look for in a Modern C-SCRM Solution
- Change Management: It Comes Back to the Village
- Conclusion
- Part 3 Technology
- Chapter 11 Cybersecurity in the Cloud
- Complexity, Meet Vulnerability
- More (Vendors &
- Connectivity) But Not Merrier
- More Risk, Same Budget
- Who Is Ultimately Responsible?
- Chapter 12 The Convergence of Cyber and Physical
- Expanding IoT Leads to Expanding Risks
- Moving Toward Solutions: Taking Stock
- Conclusion
- Chapter 13 Security-Driven Networking
- The Cloud Has Changed Everything About Security
- Last-Generation Security Solutions Are Inadequate
- How Security Products Should Adapt
- Future-Proofing: How CISOs Should Adapt
- Protecting Data: What, Where, Who, and How
- Steps to Security-Driven Networking
- What Does the Best Security-Driven Network Look Like?
- Chapter 14 Achieving End-to-End Security.
- Yesterday's Solutions Don't Solve Today's Problems
- Unified Threat Intelligence
- Integrated Security Platforms Enable and Protect Digital Innovation
- AI-Driven Security Operations
- Adaptive Cloud Security
- Conclusion
- Glossary
- Resources We Rely On
- Index
- EULA.