The Security Culture Playbook

eBook Download

BOOK EXCERPT:

Mitigate human risk and bake security into your organization’s culture from top to bottom with insights from leading experts in security awareness, behavior, and culture. The topic of security culture is mysterious and confusing to most leaders. But it doesn’t have to be. In The Security Culture Playbook, Perry Carpenter and Kai Roer, two veteran cybersecurity strategists deliver experience-driven, actionable insights into how to transform your organization’s security culture and reduce human risk at every level. This book exposes the gaps between how organizations have traditionally approached human risk and it provides security and business executives with the necessary information and tools needed to understand, measure, and improve facets of security culture across the organization. The book offers: An expose of what security culture really is and how it can be measured A careful exploration of the 7 dimensions that comprise security culture Practical tools for managing your security culture program, such as the Security Culture Framework and the Security Culture Maturity Model Insights into building support within the executive team and Board of Directors for your culture management program Also including several revealing interviews from security culture thought leaders in a variety of industries, The Security Culture Playbook is an essential resource for cybersecurity professionals, risk and compliance managers, executives, board members, and other business leaders seeking to proactively manage and reduce risk.

Product Details :

Genre : Computers
Author : Perry Carpenter
Publisher : John Wiley & Sons
Release : 2022-03-08
File : 175 Pages
ISBN-13 : 9781119875246


The Security Leader S Communication Playbook

eBook Download

BOOK EXCERPT:

This book is for cybersecurity leaders across all industries and organizations. It is intended to bridge the gap between the data center and the board room. This book examines the multitude of communication challenges that CISOs are faced with every day and provides practical tools to identify your audience, tailor your message and master the art of communicating. Poor communication is one of the top reasons that CISOs fail in their roles. By taking the step to work on your communication and soft skills (the two go hand-in-hand), you will hopefully never join their ranks. This is not a “communication theory” book. It provides just enough practical skills and techniques for security leaders to get the job done. Learn fundamental communication skills and how to apply them to day-to-day challenges like communicating with your peers, your team, business leaders and the board of directors. Learn how to produce meaningful metrics and communicate before, during and after an incident. Regardless of your role in Tech, you will find something of value somewhere along the way in this book.

Product Details :

Genre : Business & Economics
Author : Jeffrey W. Brown
Publisher : CRC Press
Release : 2021-09-12
File : 395 Pages
ISBN-13 : 9781000440270


Fighting Phishing

eBook Download

BOOK EXCERPT:

Keep valuable data safe from even the most sophisticated social engineering and phishing attacks Fighting Phishing: Everything You Can Do To Fight Social Engineering and Phishing serves as the ideal defense against phishing for any reader, from large organizations to individuals. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense. This book gives clear instructions for deploying a great defense-in-depth strategy to defeat hackers and malware. Written by the lead data-driven defense evangelist at the world's number one anti-phishing company, KnowBe4, Inc., this guide shows you how to create an enduring, integrated cybersecurity culture. Learn what social engineering and phishing are, why they are so dangerous to your cybersecurity, and how to defend against them Educate yourself and other users on how to identify and avoid phishing scams, to stop attacks before they begin Discover the latest tools and strategies for locking down data when phishing has taken place, and stop breaches from spreading Develop technology and security policies that protect your organization against the most common types of social engineering and phishing Anyone looking to defend themselves or their organization from phishing will appreciate the uncommonly comprehensive approach in Fighting Phishing.

Product Details :

Genre : Computers
Author : Roger A. Grimes
Publisher : John Wiley & Sons
Release : 2024-01-19
File : 327 Pages
ISBN-13 : 9781394249213


The Ciso Playbook

eBook Download

BOOK EXCERPT:

A CISO is the ultimate guardian of an organization's digital assets. As a cybersecurity leader ,a CISO must possess a unique balance of executive leadership, technical knowledge, strategic vision, and effective communication skills. The ever-evolving cyberthreat landscape demands a resilient, proactive approach coupled with a keen ability to anticipate attack angles and implement protective security mechanisms. Simultaneously, a cybersecurity leader must navigate the complexities of balancing security requirements with business objectives, fostering a culture of cybersecurity awareness, and ensuring compliance with regulatory frameworks. The CISO Playbook aims to provide nothing but real-world advice and perspectives to both up-and-coming cybersecurity leaders as well as existing ones looking to grow. The book does not approach cybersecurity leadership from the perspective of the academic, or what it should be, but more from that which it really is. Moreover, it focuses on the many things a cybersecurity leader needs to “be” given that the role is dynamic and ever-evolving, requiring a high level of adaptability. A CISO's career is touched from many differing angles, by many different people and roles. A healthy selection of these entities, from executive recruiters to salespeople to venture capitalists, is included to provide real-world value to the reader. To augment these, the book covers many areas that a cybersecurity leader needs to understand, from the pre-interview stage to the first quarter and from security operations to the softer skills such as storytelling and communications. The book wraps up with a focus on techniques and knowledge areas, such as financial literacy, that are essential for a CISO to be effective. Other important areas, such as understanding the adversaries' mindset and self-preservation, are covered as well. A credo is provided as an example of the documented commitment a cybersecurity leader must make and remain true to.

Product Details :

Genre : Computers
Author : Andres Andreu
Publisher : CRC Press
Release : 2024-11-01
File : 337 Pages
ISBN-13 : 9781040164600


Forensic Perspectives On Cybercrime

eBook Download

BOOK EXCERPT:

Forensic Perspectives on Cybercrime is the first book to combine the disciplines of cyberpsychology and forensic psychology, helping to define this emergent area. It explores the psychological factors that influence the behaviour of all those involved in cybersecurity, drawing upon the research literatures in relevant areas including forensic, social, and cyberpsychology. Written by leading figures in the field, the book provides an introduction to the cybercrime ecosystem, before discussing the psychological manipulation of targets through social engineering techniques and highlighting the unique threats that this type of attack presents. The reasons why people become involved in hacking are explored, and the authors review research literature on risk factors of being a victim of cybercrime, along with the concept of resilience. Behaviour change and prevention strategies are also evaluated, as well as the role of emergent technologies such as artificial intelligence and what this may mean for the role of humans in cybersecurity. Case studies and real-world examples are woven throughout to illustrate key issues, opportunities, and challenges. This unique text is a must-read for students undertaking any degree that relates to behaviour and cybersecurity, including psychology, computing, law, and business management. It is also highly relevant to researchers, practitioners, and policymakers who work in cybersecurity and/or have an interest in empowering people to be safe online.

Product Details :

Genre : Law
Author : John McAlaney
Publisher : Taylor & Francis
Release : 2024-03-11
File : 148 Pages
ISBN-13 : 9781003850625


Zero Trust Overview And Playbook Introduction

eBook Download

BOOK EXCERPT:

Enhance your cybersecurity and agility with this thorough playbook, featuring actionable guidance, insights, and success criteria from industry experts Key Features Get simple, clear, and practical advice for everyone from CEOs to security operations Organize your Zero Trust journey into role-by-role execution stages Integrate real-world implementation experience with global Zero Trust standards Purchase of the print or Kindle book includes a free eBook in the PDF format Book DescriptionZero Trust is cybersecurity for the digital era and cloud computing, protecting business assets anywhere on any network. By going beyond traditional network perimeter approaches to security, Zero Trust helps you keep up with ever-evolving threats. The playbook series provides simple, clear, and actionable guidance that fully answers your questions on Zero Trust using current threats, real-world implementation experiences, and open global standards. The Zero Trust playbook series guides you with specific role-by-role actionable information for planning, executing, and operating Zero Trust from the boardroom to technical reality. This first book in the series helps you understand what Zero Trust is, why it’s important for you, and what success looks like. You’ll learn about the driving forces behind Zero Trust – security threats, digital and cloud transformations, business disruptions, business resilience, agility, and adaptability. The six-stage playbook process and real-world examples will guide you through cultural, technical, and other critical elements for success. By the end of this book, you’ll have understood how to start and run your Zero Trust journey with clarity and confidence using this one-of-a-kind series that answers the why, what, and how of Zero Trust!What you will learn Find out what Zero Trust is and what it means to you Uncover how Zero Trust helps with ransomware, breaches, and other attacks Understand which business assets to secure first Use a standards-based approach for Zero Trust See how Zero Trust links business, security, risk, and technology Use the six-stage process to guide your Zero Trust journey Transform roles and secure operations with Zero Trust Discover how the playbook guides each role to success Who this book is forWhether you’re a business leader, security practitioner, or technology executive, this comprehensive guide to Zero Trust has something for you. This book provides practical guidance for implementing and managing a Zero Trust strategy and its impact on every role (including yours!). This is the go-to guide for everyone including board members, CEOs, CIOs, CISOs, architects, engineers, IT admins, security analysts, program managers, product owners, developers, and managers. Don't miss out on this essential resource for securing your organization against cyber threats.

Product Details :

Genre : Computers
Author : Mark Simos
Publisher : Packt Publishing Ltd
Release : 2023-10-30
File : 241 Pages
ISBN-13 : 9781800561465


8 Steps To Better Security

eBook Download

BOOK EXCERPT:

Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps. Written to be accessible to non-technical businesspeople as well as security professionals, and with insights from other security industry leaders, this important book will walk you through how to: Foster a strong security culture that extends from the custodial team to the C-suite Build an effective security team, regardless of the size or nature of your business Comply with regulatory requirements, including general data privacy rules and industry-specific legislation Test your cybersecurity, including third-party penetration testing and internal red team specialists Perfect for CISOs, security leaders, non-technical businesspeople, and managers at any level, 8 Steps to Better Security is also a must-have resource for companies of all sizes, and in all industries.

Product Details :

Genre : Computers
Author : Kim Crawley
Publisher : John Wiley & Sons
Release : 2021-08-17
File : 155 Pages
ISBN-13 : 9781119811244


Advanced Health Technology

eBook Download

BOOK EXCERPT:

"Everything worth winning in life boils down to teamwork and leadership. In my positions as a businessman, athlete, community leader, and University trustee, there are tremendous parallels between all of these endeavors that mirror an extreme team sport such as medical technology. Understanding the game, defining the game, playing your position at your highest performance, and helping others play their best game. Advanced Health Technology represents an incredible opportunity to level up the game of healthcare and highlights the multiple disciplines – or positions to be mastered – while laying out winning plays to make that next level happen." Ronnie Lott, Managing Member, Lott Investments; Member, Pro Football Hall of Fame, and Trustee, Santa Clara University Healthcare stakeholders are paralyzed from making progress as risks explode in volume and complexity. This book will help readers understand how to manage and transcend risks to drive the quadruple aim of improved patient experiences, better patient and business outcomes, improved clinician experience, and lower healthcare costs, and also help readers learn from working successful examples across projects, programs, and careers to get ahead of these multidisciplinary healthcare risks.

Product Details :

Genre : Business & Economics
Author : Sherri Douville
Publisher : CRC Press
Release : 2023-03-10
File : 331 Pages
ISBN-13 : 9781000828542


The Devsecops Playbook

eBook Download

BOOK EXCERPT:

The DevSecOps Playbook An essential and up-to-date guide to DevSecOps In The DevSecOps Playbook: Deliver Continuous Security at Speed, the Chief Information and Information Security Officer at Wiley, Sean D. Mack, delivers an insightful and practical discussion of how to keep your business secure. You’ll learn how to leverage the classic triad of people, process, and technology to build strong cybersecurity infrastructure and practices. You’ll also discover the shared responsibility model at the core of DevSecOps as you explore the principles and best practices that make up contemporary frameworks. The book explains why it’s important to shift security considerations to the front-end of the development cycle and how to do that, as well as describing the evolution of the standard security model over the last few years and how that has impacted modern cybersecurity. A must-read roadmap to DevSecOps for practicing security engineers, security leaders, and privacy practitioners, The DevSecOps Playbook will also benefit students of information technology and business, as well as governance, risk, and compliance specialists who want to improve their understanding of cybersecurity’s impact on their organizations.

Product Details :

Genre : Computers
Author : Sean D. Mack
Publisher : John Wiley & Sons
Release : 2023-09-27
File : 191 Pages
ISBN-13 : 9781394169801


Project Zero Trust

eBook Download

BOOK EXCERPT:

Implement Zero Trust initiatives efficiently and effectively In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, Chief Security Officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT Security Director. Readers will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach. They'll also find: Concrete strategies for aligning your security practices with the business Common myths and pitfalls when implementing Zero Trust and how to implement it in a cloud environment Strategies for preventing breaches that encourage efficiency and cost reduction in your company's security practices Project Zero Trust is an ideal resource for aspiring technology professionals, as well as experienced IT leaders, network engineers, system admins, and project managers who are interested in or expected to implement zero trust initiatives.

Product Details :

Genre : Computers
Author : George Finney
Publisher : John Wiley & Sons
Release : 2022-08-09
File : 221 Pages
ISBN-13 : 9781119884866