Cargando…

Fight fire with fire : proactive cybersecurity strategies for today's leaders /

Organizations around the world are in a struggle for survival, racing to transform themselves in a herculean effort to adapt to the digital age, all while protecting themselves from headline-grabbing cybersecurity threats. As organizations succeed or fail, the centrality and importance of cybersecur...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Tarun, Renee (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, NJ : John Wiley & Sons, Inc., [2022]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_on1285706213
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 210926s2022 nju ob 001 0 eng d
040 |a UKMGB  |b eng  |e rda  |e pn  |c UKMGB  |d UKAHL  |d OCLCF  |d OCLCO  |d ORMDA  |d OCLCO  |d YDXIT  |d OCLCQ 
015 |a GBC1G3020  |2 bnb 
016 7 |a 020341991  |2 Uk 
019 |a 1277057175 
020 |a 9781119854272  |q electronic publication 
020 |a 111985427X  |q electronic publication 
020 |a 9781119854333  |q electronic book 
020 |a 1119854334 
020 |z 9781119854265 
029 0 |a UKMGB  |b 020341991 
035 |a (OCoLC)1285706213  |z (OCoLC)1277057175 
037 |a 9781119854272  |b Wiley 
037 |a 9781119854265  |b O'Reilly Media 
050 4 |a QA76.9.A25  |b T37 2022 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Tarun, Renee,  |e author. 
245 1 0 |a Fight fire with fire :  |b proactive cybersecurity strategies for today's leaders /  |c Renee Tarun. 
264 1 |a Hoboken, NJ :  |b John Wiley & Sons, Inc.,  |c [2022] 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
505 0 0 |t Introduction 1 --  |g Part One: People 3 --  |t Chapter 1 From Technologist to Strategist 9 /  |r Sanju Misra --  |t Chapter 2 Communicating with the Board 21 /  |r Marianne Bailey --  |t Chapter 3 Building a Culture of Security 29 /  |r Susan Koski --  |t Chapter 4 Who Is Behind the Evolving Threat Landscape? 43 /  |r Jenny Menna --  |t Chapter 5 Addressing the Skills and Diversity Gap 59 /  |r Lisa Donnan --  |g Part Two: Process 69 --  |t Chapter 6 Effective Cyber Risk Management Requires Broad Collaboration 75 /  |r Suzanne Hartin and Maria S Thompson --  |t Chapter 7 Blending NOC and SOC 91 /  |r Mel T Migriño --  |t Chapter 8 Security by Design: Strategies for a Shift-Left Culture 103 /  |r Anne Marie Zettlemoyer --  |t Chapter 9 From Enforcer to Strategic Partner: The Changing Role of Governance, Risk, and Compliance 117 /  |r Beth-Anne Bygum --  |t Chapter 10 Don't Let Cyber Supply Chain Security Be Your Weakest Link 135 /  |r Terry Roberts --  |g Part Three: Technology 155 --  |t Chapter 11 Cybersecurity in the Cloud 161 /  |r Fatima Boolani --  |t Chapter 12 The Convergence of Cyber and Physical: IoT and Edge Security 169 /  |r Sonia E Arista --  |t Chapter 13 Security-Driven Networking 181 /  |r Laura Deaner --  |t Chapter 14 Achieving End-to-End Security 193 /  |r Renee Tarun 
520 |a Organizations around the world are in a struggle for survival, racing to transform themselves in a herculean effort to adapt to the digital age, all while protecting themselves from headline-grabbing cybersecurity threats. As organizations succeed or fail, the centrality and importance of cybersecurity and the role of the CISO--Chief Information Security Officer--becomes ever more apparent. It's becoming clear that the CISO, which began as a largely technical role, has become nuanced, strategic, and a cross-functional leadership position. Fight Fire with Fire: Proactive Cybersecurity Strategies for Today's Leaders explores the evolution of the CISO's responsibilities and delivers a blueprint to effectively improve cybersecurity across an organization. Fight Fire with Fire draws on the deep experience of its many all-star contributors. For example: Learn how to talk effectively with the Board from engineer-turned-executive Marianne Bailey, a top spokesperson well-known for global leadership in cyber Discover how to manage complex cyber supply chain risk with Terry Roberts, who addresses this complex area using cutting-edge technology and emerging standards Tame the exploding IoT threat landscape with Sonia Arista, a CISO with decades of experience across sectors, including healthcare where edge devices monitor vital signs and robots perform surgery These are just a few of the global trailblazers in cybersecurity who have banded together to equip today's leaders to protect their enterprises and inspire tomorrow's leaders to join them. With fires blazing on the horizon, there is no time for a seminar or boot camp. Cyber leaders need information at their fingertips. Readers will find insight on how to close the diversity and skills gap and become well-versed in modern cyber threats, including attacks coming from organized crime and nation-states. This book highlights a three-pronged approach that encompasses people, process, and technology to empower everyone to protect their organization. From effective risk management to supply chain security and communicating with the board, Fight Fire with Fire presents discussions from industry leaders that cover every critical competency in information security. Perfect for IT and information security professionals seeking perspectives and insights they can't find in certification exams or standard textbooks, Fight Fire with Fire is an indispensable resource for everyone hoping to improve their understanding of the realities of modern cybersecurity through the eyes of today's top security leaders. 
588 |a Description based on online resource; title from digital title page (viewed on April 15, 2022). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Information technology  |x Security measures. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures. 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Information technology  |x Security measures.  |2 fast  |0 (OCoLC)fst00973129 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781119854265/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH39538302 
938 |a Askews and Holts Library Services  |b ASKH  |n AH39244157 
994 |a 92  |b IZTAP