Cybersecurity leadership demystified: a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
Gain useful insights into cybersecurity leadership in a modern-day organization with the help of use cases Key Features Discover tips and expert advice from the leading CISO and author of many cybersecurity books Become well-versed with a CISO's day-to-day responsibilities and learn how to perf...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Birmingham
Packt
2022
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781801819282/?ar |
Zusammenfassung: | Gain useful insights into cybersecurity leadership in a modern-day organization with the help of use cases Key Features Discover tips and expert advice from the leading CISO and author of many cybersecurity books Become well-versed with a CISO's day-to-day responsibilities and learn how to perform them with ease Understand real-world challenges faced by a CISO and find out the best way to solve them Book Description The chief information security officer (CISO) is responsible for an organization's information and data security. The CISO's role is challenging as it demands a solid technical foundation as well as effective communication skills. This book is for busy cybersecurity leaders and executives looking to gain deep insights into the domains important for becoming a competent cybersecurity leader. The book begins by introducing you to the CISO's role, where you'll learn key definitions, explore the responsibilities involved, and understand how you can become an efficient CISO. You'll then be taken through end-to-end security operations and compliance standards to help you get to grips with the security landscape. In order to be a good leader, you'll need a good team. This book guides you in building your dream team by familiarizing you with HR management, documentation, and stakeholder onboarding. Despite taking all that care, you might still fall prey to cyber attacks; this book will show you how to quickly respond to an incident to help your organization minimize losses, decrease vulnerabilities, and rebuild services and processes. Finally, you'll explore other key CISO skills that'll help you communicate at both senior and operational levels. By the end of this book, you'll have gained a complete understanding of the CISO's role and be ready to advance your career. What you will learn Understand the key requirements to become a successful CISO Explore the cybersecurity landscape and get to grips with end-to-end security operations Assimilate compliance standards, governance, and security frameworks Find out how to hire the right talent and manage hiring procedures and budget Document the approaches and processes for HR, compliance, and related domains Familiarize yourself with incident response, disaster recovery, and business continuity Get the hang of tasks and skills other than hardcore security operations Who this book is for This book is for aspiring as well as existing CISOs. This book will also help cybersecurity leaders and security professionals understand leadership in this domain and motivate them to become leaders. A clear understanding of cybersecurity posture and a few years of experience as a cybersecurity professional will help you to get the most out of this book. |
Beschreibung: | Online resource; title from pdf title page (EbscoHost, viewed June 8, 2022) |
Umfang: | 1 Online-Ressource (xx, 252 Seiten) |
ISBN: | 9781801819596 1801819599 9781801819282 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-072484357 | ||
003 | DE-627-1 | ||
005 | 20240228121542.0 | ||
007 | cr uuu---uuuuu | ||
008 | 220112s2022 xx |||||o 00| ||eng c | ||
020 | |a 9781801819596 |c electronic book |9 978-1-80181-959-6 | ||
020 | |a 1801819599 |c electronic book |9 1-80181-959-9 | ||
020 | |a 9781801819282 |9 978-1-80181-928-2 | ||
035 | |a (DE-627-1)072484357 | ||
035 | |a (DE-599)KEP072484357 | ||
035 | |a (ORHE)9781801819282 | ||
035 | |a (DE-627-1)072484357 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Ozkaya, Erdal |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Cybersecurity leadership demystified |b a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO |c Erdal Ozkaya |
264 | 1 | |a Birmingham |b Packt |c 2022 | |
264 | 4 | |c ©2022 | |
300 | |a 1 Online-Ressource (xx, 252 Seiten) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; title from pdf title page (EbscoHost, viewed June 8, 2022) | ||
520 | |a Gain useful insights into cybersecurity leadership in a modern-day organization with the help of use cases Key Features Discover tips and expert advice from the leading CISO and author of many cybersecurity books Become well-versed with a CISO's day-to-day responsibilities and learn how to perform them with ease Understand real-world challenges faced by a CISO and find out the best way to solve them Book Description The chief information security officer (CISO) is responsible for an organization's information and data security. The CISO's role is challenging as it demands a solid technical foundation as well as effective communication skills. This book is for busy cybersecurity leaders and executives looking to gain deep insights into the domains important for becoming a competent cybersecurity leader. The book begins by introducing you to the CISO's role, where you'll learn key definitions, explore the responsibilities involved, and understand how you can become an efficient CISO. You'll then be taken through end-to-end security operations and compliance standards to help you get to grips with the security landscape. In order to be a good leader, you'll need a good team. This book guides you in building your dream team by familiarizing you with HR management, documentation, and stakeholder onboarding. Despite taking all that care, you might still fall prey to cyber attacks; this book will show you how to quickly respond to an incident to help your organization minimize losses, decrease vulnerabilities, and rebuild services and processes. Finally, you'll explore other key CISO skills that'll help you communicate at both senior and operational levels. By the end of this book, you'll have gained a complete understanding of the CISO's role and be ready to advance your career. What you will learn Understand the key requirements to become a successful CISO Explore the cybersecurity landscape and get to grips with end-to-end security operations Assimilate compliance standards, governance, and security frameworks Find out how to hire the right talent and manage hiring procedures and budget Document the approaches and processes for HR, compliance, and related domains Familiarize yourself with incident response, disaster recovery, and business continuity Get the hang of tasks and skills other than hardcore security operations Who this book is for This book is for aspiring as well as existing CISOs. This book will also help cybersecurity leaders and security professionals understand leadership in this domain and motivate them to become leaders. A clear understanding of cybersecurity posture and a few years of experience as a cybersecurity professional will help you to get the most out of this book. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Management information systems | |
650 | 0 | |a Information resources management | |
650 | 0 | |a Information technology |x Management | |
650 | 2 | |a Computer Security | |
650 | 2 | |a Management Information Systems | |
650 | 2 | |a Information Management | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Systèmes d'information de gestion | |
650 | 4 | |a Gestion de l'information | |
650 | 4 | |a Technologie de l'information ; Gestion | |
650 | 4 | |a Computer security | |
650 | 4 | |a Information resources management | |
650 | 4 | |a Information technology ; Management | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Electroqanic books | |
776 | 1 | |z 1801819289 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1801819289 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781801819282/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-072484357 |
---|---|
_version_ | 1821494826144628736 |
adam_text | |
any_adam_object | |
author | Ozkaya, Erdal |
author_facet | Ozkaya, Erdal |
author_role | aut |
author_sort | Ozkaya, Erdal |
author_variant | e o eo |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)072484357 (DE-599)KEP072484357 (ORHE)9781801819282 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04869cam a22005892 4500</leader><controlfield tag="001">ZDB-30-ORH-072484357</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121542.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">220112s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781801819596</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-80181-959-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1801819599</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-80181-959-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781801819282</subfield><subfield code="9">978-1-80181-928-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)072484357</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP072484357</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781801819282</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)072484357</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ozkaya, Erdal</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity leadership demystified</subfield><subfield code="b">a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO</subfield><subfield code="c">Erdal Ozkaya</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt</subfield><subfield code="c">2022</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xx, 252 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from pdf title page (EbscoHost, viewed June 8, 2022)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Gain useful insights into cybersecurity leadership in a modern-day organization with the help of use cases Key Features Discover tips and expert advice from the leading CISO and author of many cybersecurity books Become well-versed with a CISO's day-to-day responsibilities and learn how to perform them with ease Understand real-world challenges faced by a CISO and find out the best way to solve them Book Description The chief information security officer (CISO) is responsible for an organization's information and data security. The CISO's role is challenging as it demands a solid technical foundation as well as effective communication skills. This book is for busy cybersecurity leaders and executives looking to gain deep insights into the domains important for becoming a competent cybersecurity leader. The book begins by introducing you to the CISO's role, where you'll learn key definitions, explore the responsibilities involved, and understand how you can become an efficient CISO. You'll then be taken through end-to-end security operations and compliance standards to help you get to grips with the security landscape. In order to be a good leader, you'll need a good team. This book guides you in building your dream team by familiarizing you with HR management, documentation, and stakeholder onboarding. Despite taking all that care, you might still fall prey to cyber attacks; this book will show you how to quickly respond to an incident to help your organization minimize losses, decrease vulnerabilities, and rebuild services and processes. Finally, you'll explore other key CISO skills that'll help you communicate at both senior and operational levels. By the end of this book, you'll have gained a complete understanding of the CISO's role and be ready to advance your career. What you will learn Understand the key requirements to become a successful CISO Explore the cybersecurity landscape and get to grips with end-to-end security operations Assimilate compliance standards, governance, and security frameworks Find out how to hire the right talent and manage hiring procedures and budget Document the approaches and processes for HR, compliance, and related domains Familiarize yourself with incident response, disaster recovery, and business continuity Get the hang of tasks and skills other than hardcore security operations Who this book is for This book is for aspiring as well as existing CISOs. This book will also help cybersecurity leaders and security professionals understand leadership in this domain and motivate them to become leaders. A clear understanding of cybersecurity posture and a few years of experience as a cybersecurity professional will help you to get the most out of this book.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information resources management</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Management Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Information Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systèmes d'information de gestion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Gestion de l'information</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Technologie de l'information ; Gestion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information resources management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology ; Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electroqanic books</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1801819289</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1801819289</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781801819282/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-072484357 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:20:33Z |
institution | BVB |
isbn | 9781801819596 1801819599 9781801819282 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xx, 252 Seiten) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Packt |
record_format | marc |
spelling | Ozkaya, Erdal VerfasserIn aut Cybersecurity leadership demystified a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO Erdal Ozkaya Birmingham Packt 2022 ©2022 1 Online-Ressource (xx, 252 Seiten) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; title from pdf title page (EbscoHost, viewed June 8, 2022) Gain useful insights into cybersecurity leadership in a modern-day organization with the help of use cases Key Features Discover tips and expert advice from the leading CISO and author of many cybersecurity books Become well-versed with a CISO's day-to-day responsibilities and learn how to perform them with ease Understand real-world challenges faced by a CISO and find out the best way to solve them Book Description The chief information security officer (CISO) is responsible for an organization's information and data security. The CISO's role is challenging as it demands a solid technical foundation as well as effective communication skills. This book is for busy cybersecurity leaders and executives looking to gain deep insights into the domains important for becoming a competent cybersecurity leader. The book begins by introducing you to the CISO's role, where you'll learn key definitions, explore the responsibilities involved, and understand how you can become an efficient CISO. You'll then be taken through end-to-end security operations and compliance standards to help you get to grips with the security landscape. In order to be a good leader, you'll need a good team. This book guides you in building your dream team by familiarizing you with HR management, documentation, and stakeholder onboarding. Despite taking all that care, you might still fall prey to cyber attacks; this book will show you how to quickly respond to an incident to help your organization minimize losses, decrease vulnerabilities, and rebuild services and processes. Finally, you'll explore other key CISO skills that'll help you communicate at both senior and operational levels. By the end of this book, you'll have gained a complete understanding of the CISO's role and be ready to advance your career. What you will learn Understand the key requirements to become a successful CISO Explore the cybersecurity landscape and get to grips with end-to-end security operations Assimilate compliance standards, governance, and security frameworks Find out how to hire the right talent and manage hiring procedures and budget Document the approaches and processes for HR, compliance, and related domains Familiarize yourself with incident response, disaster recovery, and business continuity Get the hang of tasks and skills other than hardcore security operations Who this book is for This book is for aspiring as well as existing CISOs. This book will also help cybersecurity leaders and security professionals understand leadership in this domain and motivate them to become leaders. A clear understanding of cybersecurity posture and a few years of experience as a cybersecurity professional will help you to get the most out of this book. Computer security Management information systems Information resources management Information technology Management Computer Security Management Information Systems Information Management Sécurité informatique Systèmes d'information de gestion Gestion de l'information Technologie de l'information ; Gestion Information technology ; Management Electroqanic books 1801819289 Erscheint auch als Druck-Ausgabe 1801819289 |
spellingShingle | Ozkaya, Erdal Cybersecurity leadership demystified a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO Computer security Management information systems Information resources management Information technology Management Computer Security Management Information Systems Information Management Sécurité informatique Systèmes d'information de gestion Gestion de l'information Technologie de l'information ; Gestion Information technology ; Management Electroqanic books |
title | Cybersecurity leadership demystified a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO |
title_auth | Cybersecurity leadership demystified a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO |
title_exact_search | Cybersecurity leadership demystified a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO |
title_full | Cybersecurity leadership demystified a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO Erdal Ozkaya |
title_fullStr | Cybersecurity leadership demystified a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO Erdal Ozkaya |
title_full_unstemmed | Cybersecurity leadership demystified a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO Erdal Ozkaya |
title_short | Cybersecurity leadership demystified |
title_sort | cybersecurity leadership demystified a comprehensive guide to becoming a world class modern cybersecurity leader and global ciso |
title_sub | a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO |
topic | Computer security Management information systems Information resources management Information technology Management Computer Security Management Information Systems Information Management Sécurité informatique Systèmes d'information de gestion Gestion de l'information Technologie de l'information ; Gestion Information technology ; Management Electroqanic books |
topic_facet | Computer security Management information systems Information resources management Information technology Management Computer Security Management Information Systems Information Management Sécurité informatique Systèmes d'information de gestion Gestion de l'information Technologie de l'information ; Gestion Information technology ; Management Electroqanic books |
work_keys_str_mv | AT ozkayaerdal cybersecurityleadershipdemystifiedacomprehensiveguidetobecomingaworldclassmoderncybersecurityleaderandglobalciso |