|
|
|
|
LEADER |
00000cam a22000007i 4500 |
001 |
OR_on1350454251 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
221108s2022 enka o 001 0 eng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d OCLCF
|
020 |
|
|
|z 9781803246482
|
029 |
1 |
|
|a AU@
|b 000072918868
|
035 |
|
|
|a (OCoLC)1350454251
|
037 |
|
|
|a 9781803246482
|b O'Reilly Media
|
050 |
|
4 |
|a HD30.37
|
082 |
0 |
4 |
|a 658.4/78
|2 23/eng/20221108
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Chelly, Magda Lilia,
|e author.
|
245 |
1 |
0 |
|a Building a cyber resilient business :
|b a cyber handbook for executives and boards /
|c Dr. Magda Lilia Chelly, Shamane Tan, Hai Tran.
|
250 |
|
|
|a [First edition].
|
264 |
|
1 |
|a Birmingham, UK :
|b Packt Publishing Ltd.,
|c 2022.
|
300 |
|
|
|a 1 online resource (232 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Includes index.
|
520 |
|
|
|a With cyberattacks on the rise, it has become essential for C-suite executives and board members to step up and collectively recognize cyber risk as a top priority business risk. However, non-cyber executives find it challenging to understand their role in increasing the business's cyber resilience due to its complex nature and the lack of a clear return on investment. This book demystifies the perception that cybersecurity is a technical problem, drawing parallels between the key responsibilities of the C-suite roles to line up with the mission of the Chief Information Security Officer (CISO). The book equips you with all you need to know about cyber risks to run the business effectively. Each chapter provides a holistic overview of the dynamic priorities of the C-suite (from the CFO to the CIO, COO, CRO, and so on), and unpacks how cybersecurity must be embedded in every business function. The book also contains self-assessment questions, which are a helpful tool in evaluating any major cybersecurity initiatives and/or investment required. With this book, you'll have a deeper appreciation of the various ways all executives can contribute to the organization's cyber program, in close collaboration with the CISO and the security team, and achieve a cyber-resilient, profitable, and sustainable business.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Business enterprises
|x Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer crimes
|x Prevention.
|
650 |
|
7 |
|a Business enterprises
|x Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00842535
|
650 |
|
7 |
|a Computer crimes
|x Prevention.
|2 fast
|0 (OCoLC)fst00872068
|
700 |
1 |
|
|a Tan, Shamane,
|e author.
|
700 |
1 |
|
|a Tran, Hai,
|e author.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781803246482/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|