Fight Fire with Fire: Proactive Cybersecurity Strategies for Today's Leaders

دانلود کتاب Fight Fire with Fire: Proactive Cybersecurity Strategies for Today's Leaders

54000 تومان موجود

کتاب مبارزه با آتش با آتش: استراتژی های فعال سایبری برای رهبران امروز نسخه زبان اصلی

دانلود کتاب مبارزه با آتش با آتش: استراتژی های فعال سایبری برای رهبران امروز بعد از پرداخت مقدور خواهد بود
توضیحات کتاب در بخش جزئیات آمده است و می توانید موارد را مشاهده فرمایید


این کتاب نسخه اصلی می باشد و به زبان فارسی نیست.


امتیاز شما به این کتاب (حداقل 1 و حداکثر 5):

امتیاز کاربران به این کتاب:        تعداد رای دهنده ها: 9


توضیحاتی در مورد کتاب Fight Fire with Fire: Proactive Cybersecurity Strategies for Today's Leaders

نام کتاب : Fight Fire with Fire: Proactive Cybersecurity Strategies for Today's Leaders
ویرایش : 1
عنوان ترجمه شده به فارسی : مبارزه با آتش با آتش: استراتژی های فعال سایبری برای رهبران امروز
سری :
نویسندگان :
ناشر : Wiley
سال نشر : 2021
تعداد صفحات : 241
ISBN (شابک) : 1119854261 , 9781119854265
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 7 مگابایت



بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.


فهرست مطالب :


Title Page
Copyright Page
About the Author
Acknowledgments
Contents
Introduction
How Can We Be Effective CISOs?
Who This Book Is For
Part 1 People
Chapter 1 From Technologist to Strategist
A Path to CISO
Responsibilities of a CISO
CISO Archetypes
Evolution of the CISO Role
Technical Strengths Versus Security Officer Strengths
Chapter 2 Communicating with the Board
The Board
Speak Their Language
Preparing for the Board Meeting
Keep It Direct, Crisp, and Simple
Working Directly for the Board: The Ultimate Case Study
The Power of One-on-One Meetings
Get to Know Your Board
Chapter 3 Building a Culture of Security
The Building Blocks of the Journey
Program and Cultural Foundation
Program Build and Cultural Engagement
Target Maturity and Cultural Enlightenment
Reaching Trusted Advisor
Conclusion
Chapter 4 Who Is Behind the Evolving Threat Landscape?
Cyberattacks: Who Is Behind External Threats?
Key Tactics
The Insider Threat
Conclusion
Chapter 5 Addressing the Skills and Diversity Gap
Assessing the Skills Gap
Assessing the Diversity Gap
The Power of Diverse Teams
Bridging the Skills and Diversity Gaps
Advice for Those Starting a Career in Cybersecurity
To Move Up, Think Outside the Box
Conclusion
Part 2 Process
Chapter 6 Effective Cyber Risk Management Requires Broad Collaboration
Understanding Your Organization’s Risk Appetite
Measuring Actual Risk Against Risk Appetite
How to Engage in Governance and Oversight of Cyber Risk
Thinking Strategically About Potential Risks
Reducing Risk by Sharing Information
Reducing Risk Through Cyber Insurance
In Closing
Chapter 7 Blending NOC and SOC
The Vision
The Danger of Blending Superficially or Too Quickly
NOC and SOC Focus on Different Issues
Approaches to Blending NOC and SOC
Breaking Down Silos to Build Teams
Working with Executive Leadership
Processes for Integrating the NOC and SOC
Technology for Improved Incident Response
A Smooth but Slow Transition
Chapter 8 Security by Design
What Is Secure Development? What Does It Encompass?
Skipping Ahead to Process and Technology—Wait, What?
People
Conclusion
Chapter 9 From Enforcer to Strategic Partner
Information Governance Council: Oversight That Works
Automating Compliance
Delivering Value in a Changing Environment
Evolve Your Use of Maturity Frameworks
Conclude with a Culture of Compliance
Chapter 10 Don’t Let Cyber Supply Chain Security Be Your Weakest Link
What Does C-SCRM Encompass?
The Ultimate Moving Target
The Expansion of Software-Based Functionality
People: It Takes a Village
Process: It Takes a Framework
Technology: It Takes Automation
Features to Look for in a Modern C-SCRM Solution
Change Management: It Comes Back to the Village
Conclusion
Part 3 Technology
Chapter 11 Cybersecurity in the Cloud
Complexity, Meet Vulnerability
More (Vendors & Connectivity) But Not Merrier
More Risk, Same Budget
Who Is Ultimately Responsible?
Chapter 12 The Convergence of Cyber and Physical
Expanding IoT Leads to Expanding Risks
Moving Toward Solutions: Taking Stock
Conclusion
Chapter 13 Security-Driven Networking
The Cloud Has Changed Everything About Security
Last-Generation Security Solutions Are Inadequate
How Security Products Should Adapt
Future-Proofing: How CISOs Should Adapt
Protecting Data: What, Where, Who, and How
Steps to Security-Driven Networking
What Does the Best Security-Driven Network Look Like?
Chapter 14 Achieving End-to-End Security
Yesterday’s Solutions Don’t Solve Today’s Problems
Unified Threat Intelligence
Integrated Security Platforms Enable and Protect Digital Innovation
AI-Driven Security Operations
Adaptive Cloud Security
Conclusion
Glossary
Resources We Rely On
Index
EULA




پست ها تصادفی