The Cybersecurity Manager's Guide: The Art of Building Your Security Program. 1st Ed. 244798

Паперова книга
244798
The Cybersecurity Managers Guide: The Art of Building Your Security Program. 1st Ed. - фото 1
1'800
1 людина

Все про “The Cybersecurity Manager's Guide: The Art of Building Your Security Program. 1st Ed.”

Від видавця

If you're a cybersecurity professional, then you know how it often seems that no one cares about (or understands) information security. InfoSec professionals frequently struggle to integrate security into their companies' processes. Many are at odds with their organizations. Most are under-resourced. There must be a better way. This essential manager's guide offers a new approach to building and maintaining an information security program that's both effective and easy to follow.
Author and longtime chief information security officer (CISO) Todd Barnum upends the assumptions security professionals take for granted. CISOs, chief security officers, chief information officers, and IT security professionals will learn a simple seven-step process for building a new program or improving a current one.
  • Build better relationships across the organization
  • Align your role with your company's values, culture, and tolerance for information loss
  • Lay the groundwork for your security program
  • Create a communications program to share your team's contributions and educate your coworkers
  • Transition security functions and responsibilities to other teams
  • Organize and build an effective InfoSec team
  • Measure your company's ability to recognize and report security policy violations and phishing emails

Рецензії

0

Всі характеристики

Товар входить до категорії

  • Самовивіз з відділень поштових операторів від 45 ₴ - 80 ₴
  • Безкоштовна доставка від 3000 грн
Схожі товари
Security Chaos Engineering: Sustaining Resilience in Software and Systems 1st Edition
274007
Kelly ShortridgeAaron Rinehart
1'700 ₴
Zero Trust Networks: Building Secure Systems in Untrusted Network 2nd Edition
275838
Razi RaisChristina MorilloDoug BarthEvan Gilman
1'700 ₴
The Definitive Guide to Security in Jakarta EE. Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More. 1st Ed.
244733
Arjan Tijms, Teo Bais, Werner Keil
1'800 ₴
The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet (Tech Today) 1st Edition
280687
David Senecal
1'800 ₴
Cryptography and Cryptanalysis in MATLAB. 1st Ed.
244674
Marius Iulian Mihailescu, Stefania Loredana Nita
1'900 ₴
Windows Security Internals: A Deep Dive into Windows Authentication, Authorization, and Auditing
280690
James Forshaw
1'900 ₴
Kubernetes Security and Observability. A Holistic Approach to Securing Containers and Cloud Native Applications. 1st Ed.
244761
Brendan Creane, Amit Gupta
2'000 ₴
Hacking Kubernetes: Threat-Driven Analysis and Defense. 1st Ed.
244753
Andrew Martin, Michael Hausenblas
2'100 ₴
Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity
261468
Michael KoflerKlaus GebeshuberPeter KloepFrank NeugebauerAndre ZingsheimThomas HacknerMarkus WidlRoland AignerStefan KaniaTobias ScheibleMatthias Wubbeling
2'700 ₴