Details

The Cybersecurity Playbook


The Cybersecurity Playbook

How Every Leader and Employee Can Contribute to a Culture of Security
1. Aufl.

von: Allison Cerra

16,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 06.08.2019
ISBN/EAN: 9781119442134
Sprache: englisch
Anzahl Seiten: 224

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p><b>The real-world guide to defeating hackers and keeping your business secure </b></p> <p>Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity—but they fail to address the everyday steps that boards, managers, and employees can take to prevent attacks. <i>The Cybersecurity Playbook </i>is the step-by-step guide to protecting your organization from unknown threats and integrating good security habits into everyday business situations. This book provides clear guidance on how to identify weaknesses, assess possible threats, and implement effective policies. Recognizing that an organization’s security is only as strong as its weakest link, this book offers specific strategies for employees at every level.</p> <p>Drawing from her experience as CMO of one of the world’s largest cybersecurity companies, author Allison Cerra incorporates straightforward assessments, adaptable action plans, and many current examples to provide practical recommendations for cybersecurity policies. By demystifying cybersecurity and applying the central concepts to real-world business scenarios, this book will help you:</p> <ul> <li>Deploy cybersecurity measures using easy-to-follow methods and proven techniques</li> <li>Develop a practical security plan tailor-made for your specific needs</li> <li>Incorporate vital security practices into your everyday workflow quickly and efficiently</li> </ul> <p>The ever-increasing connectivity of modern organizations, and their heavy use of cloud-based solutions present unique challenges: data breaches, malicious software infections, and cyberattacks have become commonplace and costly to organizations worldwide. <i>The Cybersecurity Playbook </i>is the invaluable guide to identifying security gaps, getting buy-in from the top, promoting effective daily security routines, and safeguarding vital resources. Strong cybersecurity is no longer the sole responsibility of IT departments, but that of every executive, manager, and employee.</p>
<p><b>Chapter 1 </b><b>The Time I Ruined Easter 1</b></p> <p>Lessons Learned the Hard Way 8</p> <p>Additional Lessons for You 12</p> <p>Who Was at Fault? 14</p> <p>Remember This Crucial Element 15</p> <p>Why Me? 16</p> <p>Why You? 17</p> <p>W.I.S.D.O.M. 19</p> <p><b>Chapter 2 </b><b>Mr./Ms. Cellophane 23</b></p> <p>The New Kid on the Block 26</p> <p>W.I.S.D.O.M. for the Board and CEO 38</p> <p>Making Mr./Ms. Cellophane Visible 41</p> <p><b>Chapter 3 </b><b>“Good Morning, This is Your Wakeup Call.” 47</b></p> <p>The Best Defense 54</p> <p>W.I.S.D.O.M. for the Employee 59</p> <p><b>Chapter 4 </b><b>Stop the Line 69</b></p> <p>The Internet of Terrorism 74</p> <p>W.I.S.D.O.M. for the Product Developer 80</p> <p><b>Chapter 5 </b><b>Bridging the Gap 87</b></p> <p>When Too Much of a Good Thing is Bad 90</p> <p>It Wasn’t Always This Way 92</p> <p>W.I.S.D.O.M. for HR Professionals 96</p> <p><b>Chapter 6 </b><b>Luck Favors the Prepared 109</b></p> <p>BREACH! 112</p> <p>Preparing for Battle 115</p> <p>W.I.S.D.O.M. for the Marketer/Communicator 119</p> <p><b>Chapter 7 </b><b>Interesting Bedfellows 127</b></p> <p>The More Things Change . . . 132</p> <p>. . . the More They Stay the Same 137</p> <p>W.I.S.D.O.M. for the Finance Professional 142</p> <p><b>Chapter 8 </b><b>Mr./Ms. Cellophane (Reprise) 147</b></p> <p>A Picture is Worth a Thousand Words 149</p> <p>Letting Go to Hold On 153</p> <p>Assuming the Mantle 156</p> <p>W.I.S.D.O.M. for the Cybersecurity Professional 158</p> <p><b>Chapter 9 </b><b>Experiencing a Culture of Security 169</b></p> <p><b>Chapter 10 </b><b>A Culture of Security for All 187</b></p> <p>W.I.S.D.O.M. for the CEO/Board Member 191</p> <p>W.I.S.D.O.M. for the Employee 191</p> <p>W.I.S.D.O.M. for the Product Developer 192</p> <p>W.I.S.D.O.M. for the HR Professional 192</p> <p>W.I.S.D.O.M. for the Marketer/Communicator 193</p> <p>W.I.S.D.O.M. for the Finance Professional 194</p> <p>W.I.S.D.O.M. for the Cybersecurity Professional 198</p> <p>Acknowledgments 201</p> <p>About the Author 203</p> <p>Index 205</p>
<p><b>ALLISON CERRA</b> brings a practical approach to demystifying the confluence of significant technology trends—including mobility, cloud, big data, security, and collaboration—and signaling where these forces could lead cultures in the future. In 2015, Cerra joined the cybersecurity industry, where she marries her calling for marketing with a cause of educating unwitting participants in a virtual battle that is underestimated, if not ignored, by far too many.
<p><b>A NON-TECHNICAL GUIDE FOR DEFENDING YOUR ORGANIZATION AGAINST HACKERS</b> <p>". . . If you're a generally nontechnical person, rest assured that I strive to give you sufficient education to understand the nuances of this thorny subject, without overwhelming you with technical details. If you're more technical than I am, while I won't dumb down this topic, I will provide prescriptions that every employee—technical or otherwise—can practice to protect her organization. Finally, if you are one of my cybersecurity brethren, I hope you read and enjoy this book as a glimpse into our world. Then, I want you to pass it along to your non-cybersecurity colleagues to recruit them in our fight."</br> <b> —From Chapter One</b> <p>It seems not a day goes by without news of yet another cyberattack on a high-profile company. The ever-increasing connectivity of modern organizations and heavy use of cloud-based solutions continue to present unique challenges. Data breaches, malicious software infections, and cyberattacks cost organizations time, money, and reputation. <i>The Cybersecurity Playbook</i> is the non-technical guide for enhancing an organization's security. The cybersecurity procedures presented are written for all members of a company, no matter their level or position. <p>An organization is only as secure as its weakest link. Fortify your company's cybersecurity defenses by following the step-by-step procedures outlined in this invaluable guide.

Diese Produkte könnten Sie auch interessieren:

Implementing Beyond Budgeting
Implementing Beyond Budgeting
von: Bjarte Bogsnes
PDF ebook
33,99 €
Pricing Done Right
Pricing Done Right
von: Tim J. Smith
EPUB ebook
52,99 €
Pricing Done Right
Pricing Done Right
von: Tim J. Smith
PDF ebook
52,99 €