|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
EBOOKCENTRAL_on1291317314 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
220108s2021 nyu o ||| 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|c EBLCP
|d N$T
|d OCLCO
|d OCLCQ
|d SFB
|d OCLCL
|
020 |
|
|
|a 1637421680
|
020 |
|
|
|a 9781637421680
|q (electronic bk.)
|
029 |
1 |
|
|a AU@
|b 000074543202
|
035 |
|
|
|a (OCoLC)1291317314
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.80683
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Garber, Leeza.
|
245 |
1 |
0 |
|a Can. Trust. Will
|h [electronic resource] :
|b Hiring for the Human Element in the New Age of Cybersecurity.
|
260 |
|
|
|a New York :
|b Business Expert Press,
|c 2021.
|
300 |
|
|
|a 1 online resource (224 p.)
|
500 |
|
|
|a Description based upon print version of record.
|
505 |
0 |
|
|a Chapter 1. Identifying your cybersecurity hiring need -- Chapter 2. Can -- Trust -- Will -- Chapter 3. Finding the right candidates -- Chapter 4. The big mistake (and how to avoid it) -- Chapter 5. Hiring the right cybersecurity role behaviors -- Chapter 6. The interview -- Chapter 7. Onboarding cybersecurity hires (and building cybersecurity Into onboarding) -- Chapter 8. Concluding thoughts and tips for candidates -- Appendix A. Model behavioral question sets -- Appendix B. Additional behavioral question sets.
|
520 |
3 |
|
|a Cyberthreats evolve at a staggering pace, and effective cybersecurity operations depend on successful teams. Unfortunately, statistics continue to illustrate that employers are not finding the people they need. The Can. Trust. Will. system guides the C-Suite, HR professionals and talent acquisition to build unbeatable cybersecurity teams through advanced hiring processes and focused on-boarding programs. Additionally, this book details how successful cybersecurity ecosystems are best built and sustained, with expert analysis from high-level government officials, Fortune 500 CSOs and CISOs, risk managers, and even a few techies. Those already in the field (and newbies) will glean invaluable knowledge about how to find their most effective position within a cybersecurity ecosystem. In a tech-driven environment, cybersecurity is fundamentally a human problem: and the first step is to hire for the human element.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer security
|x Personnel management.
|
650 |
|
0 |
|a Computer technicians
|x Selection and appointment.
|
650 |
|
6 |
|a Sécurité informatique
|x Personnel
|x Direction.
|
650 |
|
6 |
|a Techniciens en informatique
|x Sélection et nomination.
|
700 |
1 |
|
|a Olson, Scott.
|
758 |
|
|
|i has work:
|a Can. Trust. Will (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCY4g63jrF4kdgC93ckRvVC
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Garber, Leeza
|t Can. Trust. Will
|d New York : Business Expert Press,c2021
|z 9781637421673
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=6840736
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6840736
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 3095922
|
994 |
|
|
|a 92
|b IZTAP
|