Cargando…

The cybersecurity playbook : how every leader and employee can contribute to a culture of security /

"Today's headlines are littered with cybersecurity breaches -- each more damning than the last. For too long, cybersecurity has been relegated to the corridors of IT. Every organization's weakest link in cybersecurity is its own employees, as hackers dupe them to get access to an orga...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Cerra, Allison (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken : Wiley, 2019.
Edición:First edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000008i 4500
001 OR_on1112384760
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |||||||||||
008 190607s2019 mau ob 001 0 eng
010 |a  2019980946 
040 |a DLC  |b eng  |e rda  |c DLC  |d EBLCP  |d OCLCF  |d N$T  |d YDXIT  |d RECBK  |d CNO  |d WAU  |d UKMGB  |d OCLCO  |d UMI  |d VT2  |d K6U  |d UKAHL  |d OCLCO  |d OCLCQ  |d IEEEE 
015 |a GBB905735  |2 bnb 
016 7 |a 019203131  |2 Uk 
019 |a 1113766403  |a 1151768086  |a 1235836178  |a 1240525435 
020 |a 9781119442165  |q (pdf) 
020 |a 1119442168 
020 |a 9781119442134  |q (epub) 
020 |a 1119442133 
020 |a 1119442192 
020 |a 9781119442196 
020 |a 9781394197521  |q (electronic bk.) 
020 |a 1394197527  |q (electronic bk.) 
024 7 |a 10.1002/9781394197521  |2 doi 
028 0 2 |a EB00764113  |b Recorded Books 
029 1 |a AU@  |b 000066005961 
029 0 |a UKMGB  |b 019203131 
029 1 |a AU@  |b 000074095074 
035 |a (OCoLC)1112384760  |z (OCoLC)1113766403  |z (OCoLC)1151768086  |z (OCoLC)1235836178  |z (OCoLC)1240525435 
037 |a 9781119442134  |b Wiley 
037 |a 10013706  |b IEEE 
042 |a pcc 
050 0 0 |a QA76.9.A25 
082 0 0 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Cerra, Allison,  |e author. 
245 1 4 |a The cybersecurity playbook :  |b how every leader and employee can contribute to a culture of security /  |c Allison Cerra. 
250 |a First edition. 
263 |a 1908 
264 1 |a Hoboken :  |b Wiley,  |c 2019. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b n  |2 rdamedia 
338 |a online resource  |b nc  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
520 |a "Today's headlines are littered with cybersecurity breaches -- each more damning than the last. For too long, cybersecurity has been relegated to the corridors of IT. Every organization's weakest link in cybersecurity is its own employees, as hackers dupe them to get access to an organization's systems. Yet most employees have no idea how to help prevent attacks, why they should bother, or what to look for. But, with any manager or employee the next unsuspecting dupe, cybersecurity can no longer be someone else's problem, but the mandate of all. While many books serve as educational resources on the topic of cybersecurity, they stop short of explaining how employees take up arms in the fight against a pernicious threat. Doing so requires demystifying cybersecurity for the business audience, giving practical prescription to these users on how they can adopt smart cybersecurity habits in their function. To make the topic both accessible and practical, this book will move beyond simply identifying the problem and provide practical prescriptions, offering simple checklists and action plans than any manager in the organization can take to protect his organization from an unknown threat. Further, the book will be based on primary marketing research, including in-depth interviews among CIOs, CISOs and other functional business leaders (e.g., CMOs and CHROs) to measure the extent of the gap among these senior leaders in making cybersecurity a business priority"--  |c Provided by publisher. 
588 |a Description based on print version record and CIP data provided by publisher; resource not viewed. 
505 0 |a Chapter 1 The Time I Ruined Easter 1 -- Lessons Learned the Hard Way 8 -- Additional Lessons for You 12 -- Who Was at Fault? 14 -- Remember This Crucial Element 15 -- Why Me? 16 -- Why You? 17 -- W.I.S.D.O.M. 19 -- Chapter 2 Mr./Ms. Cellophane 23 -- The New Kid on the Block 26 -- W.I.S.D.O.M. for the Board and CEO 38 -- Making Mr./Ms. Cellophane Visible 41 -- Chapter 3 “Good Morning, This is Your Wakeup Call.” 47 -- The Best Defense 54 -- W.I.S.D.O.M. for the Employee 59 -- Chapter 4 Stop the Line 69 -- The Internet of Terrorism 74 -- W.I.S.D.O.M. for the Product Developer 80 -- Chapter 5 Bridging the Gap 87 -- When Too Much of a Good Thing is Bad 90 -- It Wasn’t Always This Way 92 -- W.I.S.D.O.M. for HR Professionals 96 -- Chapter 6 Luck Favors the Prepared 109 -- BREACH! 112 -- Preparing for Battle 115 -- W.I.S.D.O.M. for the Marketer/Communicator 119 -- Chapter 7 Interesting Bedfellows 127 -- The More Things Change . . . 132 -- . . . the More They Stay the Same 137 -- W.I.S.D.O.M. for the Finance Professional 142 -- Chapter 8 Mr./Ms. Cellophane (Reprise) 147 -- A Picture is Worth a Thousand Words 149 -- Letting Go to Hold On 153 -- Assuming the Mantle 156 -- W.I.S.D.O.M. for the Cybersecurity Professional 158 -- Chapter 9 Experiencing a Culture of Security 169 -- Chapter 10 A Culture of Security for All 187 -- W.I.S.D.O.M. for the CEO/Board Member 191 -- W.I.S.D.O.M. for the Employee 191 -- W.I.S.D.O.M. for the Product Developer 192 -- W.I.S.D.O.M. for the HR Professional 192 -- W.I.S.D.O.M. for the Marketer/Communicator 193 -- W.I.S.D.O.M. for the Finance Professional 194 -- W.I.S.D.O.M. for the Cybersecurity Professional 198 -- Acknowledgments 201 -- About the Author 203 -- Index 205. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Corporate culture. 
650 0 |a Confidential business information  |x Security measures. 
650 2 |a Computer Security 
650 2 |a Organizational Culture 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Culture d'entreprise. 
650 6 |a Renseignements commerciaux confidentiels  |x Sécurité  |x Mesures. 
650 7 |a BUSINESS & ECONOMICS  |x Industries  |x Computers & Information Technology.  |2 bisacsh 
650 7 |a Corporate culture.  |2 fast  |0 (OCoLC)fst00879624 
650 7 |a Confidential business information.  |2 fast  |0 (OCoLC)fst00874699 
650 7 |a Business enterprises  |x Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00842535 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
776 0 8 |i Print version:  |a Cerra, Allison.  |t The cybersecurity playbook  |b First edition.  |d Hoboken : Wiley, 2019.  |z 9781119442196  |w (DLC) 2019018181 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781119442196/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH35216458 
938 |a Recorded Books, LLC  |b RECE  |n rbeEB00764113 
938 |a EBSCOhost  |b EBSC  |n 2226926 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5848207 
994 |a 92  |b IZTAP