Amazon cover image
Image from Amazon.com

Cybersecurity leadership demystified a comprehensive guide to becoming : a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO / by Dr. Erdal Ozkaya

By: Material type: Computer fileComputer fileLanguage: English Publication details: Birmingham : Packt Publishing, Limited, 2022Description: 1 online resource (xx, 274, pages) : color illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781801819282 (e-book)
Subject(s): LOC classification:
  • QA76.9 A25Oz5 2022
Online resources:
Contents:
1. A CISO's role in security leadership -- 2. End-to-end security operations -- 3. Compliance and regulations -- 4. Role of HR in security -- 5. How documentation contributes to security -- 6. Disaster recovery and business continuity -- 7. Bringing stakeholders on board -- 8. Other CISO tasks -- 9 Congratulations! you are hired -- 10. Security leadership --11. Conclusion -- 12. Ask the experts --
Summary: Gain useful insights into cybersecurity leadership in a modern-day organization with the help of use cases Key Features Discover tips and expert advice from the leading CISO and author of many cybersecurity books Become well-versed with a CISO's day-to-day responsibilities and learn how to perform them with ease Understand real-world challenges faced by a CISO and find out the best way to solve them Book Description The chief information security officer (CISO) is responsible for an organization's information and data security. The CISO's role is challenging as it demands a solid technical foundation as well as effective communication skills. This book is for busy cybersecurity leaders and executives looking to gain deep insights into the domains important for becoming a competent cybersecurity leader. The book begins by introducing you to the CISO's role, where you'll learn key definitions, explore the responsibilities involved, and understand how you can become an efficient CISO. You'll then be taken through end-to-end security operations and compliance standards to help you get to grips with the security landscape. In order to be a good leader, you'll need a good team. This book guides you in building your dream team by familiarizing you with HR management, documentation, and stakeholder onboarding. Despite taking all the care, you might still fall prey to cyber attacks this book will show you how to quickly respond to an incident to help your organization minimize losses, decrease vulnerabilities, and rebuild services and processes. Finally, you'll explore other key CISO skills that'll help you communicate at both senior and operational levels. By the end of this book, you'll have gained a complete understanding of the CISO's role and be ready to advance your career. What you will learn Understand the key requirements to become a successful CISO Explore the cybersecurity landscape and get to grips with end-to-end security operations Assimilate compliance standards, governance, and security frameworks Find out how to hire the right talent and manage hiring procedures and budget Document the approaches and processes for HR, compliance, and related domains Familiarize yourself with incident response, disaster recovery, and business continuity Get the hang of tasks and skills other than hardcore security operations Who This Book Is For This book is for aspiring as well as existing CISOs. This book will also help cybersecurity leaders and security professionals understand leadership in this domain and motivate them to become leaders. A clear understanding of cybersecurity posture and a few years of experience as a cybersecurity professional will help you to get the most out of this book.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Materials specified Status Notes Date due Barcode
Online E-Books Online E-Books Ladislao N. Diwa Memorial Library Multimedia Section Non-fiction OEBP QA76.9 A25Oz5 2022 (Browse shelf(Opens below)) Available PAV OEBP000276
Compact Discs Compact Discs Ladislao N. Diwa Memorial Library Multimedia Section Non-fiction EB QA76.9 A25Oz5 2022 (Browse shelf(Opens below)) Room use only PAV EB000276

https://portal.igpublish.com/iglibrary/ is required to read this e-book.

1. A CISO's role in security leadership -- 2. End-to-end security operations -- 3. Compliance and regulations -- 4. Role of HR in security -- 5. How documentation contributes to security -- 6. Disaster recovery and business continuity -- 7. Bringing stakeholders on board -- 8. Other CISO tasks -- 9 Congratulations! you are hired -- 10. Security leadership --11. Conclusion -- 12. Ask the experts --

Gain useful insights into cybersecurity leadership in a modern-day organization with the help of use cases
Key Features

Discover tips and expert advice from the leading CISO and author of many cybersecurity books
Become well-versed with a CISO's day-to-day responsibilities and learn how to perform them with ease
Understand real-world challenges faced by a CISO and find out the best way to solve them

Book Description

The chief information security officer (CISO) is responsible for an organization's information and data security. The CISO's role is challenging as it demands a solid technical foundation as well as effective communication skills. This book is for busy cybersecurity leaders and executives looking to gain deep insights into the domains important for becoming a competent cybersecurity leader.

The book begins by introducing you to the CISO's role, where you'll learn key definitions, explore the responsibilities involved, and understand how you can become an efficient CISO. You'll then be taken through end-to-end security operations and compliance standards to help you get to grips with the security landscape. In order to be a good leader, you'll need a good team. This book guides you in building your dream team by familiarizing you with HR management, documentation, and stakeholder onboarding. Despite taking all the care, you might still fall prey to cyber attacks
this book will show you how to quickly respond to an incident to help your organization minimize losses, decrease vulnerabilities, and rebuild services and processes. Finally, you'll explore other key CISO skills that'll help you communicate at both senior and operational levels.

By the end of this book, you'll have gained a complete understanding of the CISO's role and be ready to advance your career.
What you will learn

Understand the key requirements to become a successful CISO
Explore the cybersecurity landscape and get to grips with end-to-end security operations
Assimilate compliance standards, governance, and security frameworks
Find out how to hire the right talent and manage hiring procedures and budget
Document the approaches and processes for HR, compliance, and related domains
Familiarize yourself with incident response, disaster recovery, and business continuity
Get the hang of tasks and skills other than hardcore security operations

Who This Book Is For

This book is for aspiring as well as existing CISOs. This book will also help cybersecurity leaders and security professionals understand leadership in this domain and motivate them to become leaders. A clear understanding of cybersecurity posture and a few years of experience as a cybersecurity professional will help you to get the most out of this book.

Fund 164 CE-Logic Purchased April 14, 2022 OEBP000276 P. Roderno PHP 2022-04-230 0000

Copyright © 2023. Cavite State University | Koha 23.05