My Account Log in

1 option

The Business-Minded CISCO : Run Your Security Program Efficiently.

Ebook Central College Complete Available online

View online
Format:
Book
Author/Creator:
Kissinger, Bryan C.
Language:
English
Subjects (All):
Chief information officers.
Computer security.
Management information systems--Security measures.
Management information systems.
Physical Description:
1 online resource (172 pages)
Edition:
1st ed.
Place of Publication:
New York : Business Expert Press, 2024.
Summary:
The rise of Artificial Intelligence (AI) and Machine Learning (ML) are creating new and unique challenges to corporate security leaders. Internal sanctioned and unsanctioned use of these tools, as well as how threat actors are employing them, requires cyber leaders to think differently. Information technology (IT) risk and information security management remain top of mind for corporate boards and senior business leaders. Continued intensity of cyber terrorism attacks, regulatory and compliance requirements, and customer privacy concerns are driving the need for a business-minded chief information security officer (CISO) to lead organizational efforts to protect critical infrastructure and sensitive data. This book describes the thought process and specific activities a leader should consider as they interview for the IT risk/information security leader role, what they should do within their first 90 days, and how to organize, evangelize, and operate the program once they are into the job. It provides practical, tested strategies for designing your program and guidance to help you be successful long term.
Contents:
Frontcover
Halftitle
Title
Copyright
Description
Contents
Preface
Acknowledgments
Chapter 1: Before You Take the Job
Understand the Industry/Company With Whom You Are Interviewing
Establish That There Is Support for the Program: Governance Structure
Look at the Organizational Chart: Who You Report to and Who Reports to You
Agree on Existing/Future Budget Commitments
Summary Points
Chapter 2: First 90 Days on the Job
Establish Trust and Credibility With Peers and Key Stakeholders
Prior Assessment/Audit Report Review
Conduct/Refresh Program Gap Analysis
Training and Awareness
Chapte 3: Organize Your Program
Functions of an IT Risk Management Program
Skill Evaluations
IT Risk Management Versus Security Operations Capabilities
Build a Business Case: Develop Your Three-Year Plan
Chapter 4: Evangelize Your Program
Peer and Leadership Roadshows
External References
Communication and Stakeholder Engagement
Intranet Presence
Chapter 5: Operate Your Program
IT Risk Management Capabilities
Security Operations Capabilities
Chapter 6: The Rise of Artificial Intelligence and Machine Learning in Security
Notes
References
About the Author
Index
Adpage
Backcover.
Notes:
Description based on publisher supplied metadata and other sources.
ISBN:
9781637426173
1637426178
OCLC:
1438948997

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

Find

Home Release notes

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Find catalog Using Articles+ Using your account