1 option
The Business-Minded CISCO : Run Your Security Program Efficiently.
- Format:
- Book
- Author/Creator:
- Kissinger, Bryan C.
- Language:
- English
- Subjects (All):
- Chief information officers.
- Computer security.
- Management information systems--Security measures.
- Management information systems.
- Physical Description:
- 1 online resource (172 pages)
- Edition:
- 1st ed.
- Place of Publication:
- New York : Business Expert Press, 2024.
- Summary:
- The rise of Artificial Intelligence (AI) and Machine Learning (ML) are creating new and unique challenges to corporate security leaders. Internal sanctioned and unsanctioned use of these tools, as well as how threat actors are employing them, requires cyber leaders to think differently. Information technology (IT) risk and information security management remain top of mind for corporate boards and senior business leaders. Continued intensity of cyber terrorism attacks, regulatory and compliance requirements, and customer privacy concerns are driving the need for a business-minded chief information security officer (CISO) to lead organizational efforts to protect critical infrastructure and sensitive data. This book describes the thought process and specific activities a leader should consider as they interview for the IT risk/information security leader role, what they should do within their first 90 days, and how to organize, evangelize, and operate the program once they are into the job. It provides practical, tested strategies for designing your program and guidance to help you be successful long term.
- Contents:
- Frontcover
- Halftitle
- Title
- Copyright
- Description
- Contents
- Preface
- Acknowledgments
- Chapter 1: Before You Take the Job
- Understand the Industry/Company With Whom You Are Interviewing
- Establish That There Is Support for the Program: Governance Structure
- Look at the Organizational Chart: Who You Report to and Who Reports to You
- Agree on Existing/Future Budget Commitments
- Summary Points
- Chapter 2: First 90 Days on the Job
- Establish Trust and Credibility With Peers and Key Stakeholders
- Prior Assessment/Audit Report Review
- Conduct/Refresh Program Gap Analysis
- Training and Awareness
- Chapte 3: Organize Your Program
- Functions of an IT Risk Management Program
- Skill Evaluations
- IT Risk Management Versus Security Operations Capabilities
- Build a Business Case: Develop Your Three-Year Plan
- Chapter 4: Evangelize Your Program
- Peer and Leadership Roadshows
- External References
- Communication and Stakeholder Engagement
- Intranet Presence
- Chapter 5: Operate Your Program
- IT Risk Management Capabilities
- Security Operations Capabilities
- Chapter 6: The Rise of Artificial Intelligence and Machine Learning in Security
- Notes
- References
- About the Author
- Index
- Adpage
- Backcover.
- Notes:
- Description based on publisher supplied metadata and other sources.
- ISBN:
- 9781637426173
- 1637426178
- OCLC:
- 1438948997
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.