|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
OR_on1285706213 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
210926s2022 nju ob 001 0 eng d |
040 |
|
|
|a UKMGB
|b eng
|e rda
|e pn
|c UKMGB
|d UKAHL
|d OCLCF
|d OCLCO
|d ORMDA
|d OCLCO
|d YDXIT
|d OCLCQ
|
015 |
|
|
|a GBC1G3020
|2 bnb
|
016 |
7 |
|
|a 020341991
|2 Uk
|
019 |
|
|
|a 1277057175
|
020 |
|
|
|a 9781119854272
|q electronic publication
|
020 |
|
|
|a 111985427X
|q electronic publication
|
020 |
|
|
|a 9781119854333
|q electronic book
|
020 |
|
|
|a 1119854334
|
020 |
|
|
|z 9781119854265
|
029 |
0 |
|
|a UKMGB
|b 020341991
|
035 |
|
|
|a (OCoLC)1285706213
|z (OCoLC)1277057175
|
037 |
|
|
|a 9781119854272
|b Wiley
|
037 |
|
|
|a 9781119854265
|b O'Reilly Media
|
050 |
|
4 |
|a QA76.9.A25
|b T37 2022
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Tarun, Renee,
|e author.
|
245 |
1 |
0 |
|a Fight fire with fire :
|b proactive cybersecurity strategies for today's leaders /
|c Renee Tarun.
|
264 |
|
1 |
|a Hoboken, NJ :
|b John Wiley & Sons, Inc.,
|c [2022]
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
0 |
|t Introduction 1 --
|g Part One: People 3 --
|t Chapter 1 From Technologist to Strategist 9 /
|r Sanju Misra --
|t Chapter 2 Communicating with the Board 21 /
|r Marianne Bailey --
|t Chapter 3 Building a Culture of Security 29 /
|r Susan Koski --
|t Chapter 4 Who Is Behind the Evolving Threat Landscape? 43 /
|r Jenny Menna --
|t Chapter 5 Addressing the Skills and Diversity Gap 59 /
|r Lisa Donnan --
|g Part Two: Process 69 --
|t Chapter 6 Effective Cyber Risk Management Requires Broad Collaboration 75 /
|r Suzanne Hartin and Maria S Thompson --
|t Chapter 7 Blending NOC and SOC 91 /
|r Mel T Migriño --
|t Chapter 8 Security by Design: Strategies for a Shift-Left Culture 103 /
|r Anne Marie Zettlemoyer --
|t Chapter 9 From Enforcer to Strategic Partner: The Changing Role of Governance, Risk, and Compliance 117 /
|r Beth-Anne Bygum --
|t Chapter 10 Don't Let Cyber Supply Chain Security Be Your Weakest Link 135 /
|r Terry Roberts --
|g Part Three: Technology 155 --
|t Chapter 11 Cybersecurity in the Cloud 161 /
|r Fatima Boolani --
|t Chapter 12 The Convergence of Cyber and Physical: IoT and Edge Security 169 /
|r Sonia E Arista --
|t Chapter 13 Security-Driven Networking 181 /
|r Laura Deaner --
|t Chapter 14 Achieving End-to-End Security 193 /
|r Renee Tarun
|
520 |
|
|
|a Organizations around the world are in a struggle for survival, racing to transform themselves in a herculean effort to adapt to the digital age, all while protecting themselves from headline-grabbing cybersecurity threats. As organizations succeed or fail, the centrality and importance of cybersecurity and the role of the CISO--Chief Information Security Officer--becomes ever more apparent. It's becoming clear that the CISO, which began as a largely technical role, has become nuanced, strategic, and a cross-functional leadership position. Fight Fire with Fire: Proactive Cybersecurity Strategies for Today's Leaders explores the evolution of the CISO's responsibilities and delivers a blueprint to effectively improve cybersecurity across an organization. Fight Fire with Fire draws on the deep experience of its many all-star contributors. For example: Learn how to talk effectively with the Board from engineer-turned-executive Marianne Bailey, a top spokesperson well-known for global leadership in cyber Discover how to manage complex cyber supply chain risk with Terry Roberts, who addresses this complex area using cutting-edge technology and emerging standards Tame the exploding IoT threat landscape with Sonia Arista, a CISO with decades of experience across sectors, including healthcare where edge devices monitor vital signs and robots perform surgery These are just a few of the global trailblazers in cybersecurity who have banded together to equip today's leaders to protect their enterprises and inspire tomorrow's leaders to join them. With fires blazing on the horizon, there is no time for a seminar or boot camp. Cyber leaders need information at their fingertips. Readers will find insight on how to close the diversity and skills gap and become well-versed in modern cyber threats, including attacks coming from organized crime and nation-states. This book highlights a three-pronged approach that encompasses people, process, and technology to empower everyone to protect their organization. From effective risk management to supply chain security and communicating with the board, Fight Fire with Fire presents discussions from industry leaders that cover every critical competency in information security. Perfect for IT and information security professionals seeking perspectives and insights they can't find in certification exams or standard textbooks, Fight Fire with Fire is an indispensable resource for everyone hoping to improve their understanding of the realities of modern cybersecurity through the eyes of today's top security leaders.
|
588 |
|
|
|a Description based on online resource; title from digital title page (viewed on April 15, 2022).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Information technology
|x Security measures.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Technologie de l'information
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Information technology
|x Security measures.
|2 fast
|0 (OCoLC)fst00973129
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781119854265/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH39538302
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH39244157
|
994 |
|
|
|a 92
|b IZTAP
|