CISO Leadership

Book description

Caught in the crosshairs ofLeadership andInformation Technology Information Security professionals are increasingly tapped to operate as business executives. This often puts them on a career path they did not expect, in a field not yet clearly defined. IT training does not usually includemanagerial skills such as leadership, team-building, c

Table of contents

  1. Front cover
  2. Dedication
  3. Contents (1/2)
  4. Contents (2/2)
  5. Preface
  6. About the Editors
  7. Contributors (1/3)
  8. Contributors (2/3)
  9. Contributors (3/3)
  10. Acknowledgments
  11. PART I: A LEADERSHIP DISCONNECT
  12. Chapter 1. What You Told Us: A CISO Survey* (1/6)
  13. Chapter 1. What You Told Us: A CISO Survey* (2/6)
  14. Chapter 1. What You Told Us: A CISO Survey* (3/6)
  15. Chapter 1. What You Told Us: A CISO Survey* (4/6)
  16. Chapter 1. What You Told Us: A CISO Survey* (5/6)
  17. Chapter 1. What You Told Us: A CISO Survey* (6/6)
  18. PART II: A LEADERSHIP MANDATE
  19. Chapter 2. Who Companies Really Want to Hire: How to Advance Your Career and Have Great Success (1/3)
  20. Chapter 2. Who Companies Really Want to Hire: How to Advance Your Career and Have Great Success (2/3)
  21. Chapter 2. Who Companies Really Want to Hire: How to Advance Your Career and Have Great Success (3/3)
  22. Chapter 3. The Evolving Information Security Landscape (1/2)
  23. Chapter 3. The Evolving Information Security Landscape (2/2)
  24. Chapter 4. Business Drivers for Information Security (1/3)
  25. Chapter 4. Business Drivers for Information Security (2/3)
  26. Chapter 4. Business Drivers for Information Security (3/3)
  27. Chapter 5. Security as a Business Function (1/3)
  28. Chapter 5. Security as a Business Function (2/3)
  29. Chapter 5. Security as a Business Function (3/3)
  30. Chapter 6. Security Leadership (1/3)
  31. Chapter 6. Security Leadership (2/3)
  32. Chapter 6. Security Leadership (3/3)
  33. Chapter 7. The Public Sector CISO: Life in the Fishbowl (1/3)
  34. Chapter 7. The Public Sector CISO: Life in the Fishbowl (2/3)
  35. Chapter 7. The Public Sector CISO: Life in the Fishbowl (3/3)
  36. PART III: A LEADERSHIP EVOLUTION
  37. Chapter 8. A CISO Introspection (1/2)
  38. Chapter 8. A CISO Introspection (2/2)
  39. Chapter 9. How Savvy Are You? Can You Get What You Want? (1/3)
  40. Chapter 9. How Savvy Are You? Can You Get What You Want? (2/3)
  41. Chapter 9. How Savvy Are You? Can You Get What You Want? (3/3)
  42. Chapter 10. Why and How Assessment of Organization Culture Should Shape Security Strategies (1/6)
  43. Chapter 10. Why and How Assessment of Organization Culture Should Shape Security Strategies (2/6)
  44. Chapter 10. Why and How Assessment of Organization Culture Should Shape Security Strategies (3/6)
  45. Chapter 10. Why and How Assessment of Organization Culture Should Shape Security Strategies (4/6)
  46. Chapter 10. Why and How Assessment of Organization Culture Should Shape Security Strategies (5/6)
  47. Chapter 10. Why and How Assessment of Organization Culture Should Shape Security Strategies (6/6)
  48. Chapter 11. Selling Information Security (1/3)
  49. Chapter 11. Selling Information Security (2/3)
  50. Chapter 11. Selling Information Security (3/3)
  51. Chapter 12. The Importance of an IT Security Strategy (1/2)
  52. Chapter 12. The Importance of an IT Security Strategy (2/2)
  53. Chapter 13. Extending the Enterprise's Governance Program to Information Risks (1/2)
  54. Chapter 13. Extending the Enterprise's Governance Program to Information Risks (2/2)
  55. Chapter 14. Building Management Commitment through Security Councils (1/3)
  56. Chapter 14. Building Management Commitment through Security Councils (2/3)
  57. Chapter 14. Building Management Commitment through Security Councils (3/3)
  58. Chapter 15. Measuring Security (1/4)
  59. Chapter 15. Measuring Security (2/4)
  60. Chapter 15. Measuring Security (3/4)
  61. Chapter 15. Measuring Security (4/4)
  62. Chapter 16. Privacy, Ethics, and Business (1/4)
  63. Chapter 16. Privacy, Ethics, and Business (2/4)
  64. Chapter 16. Privacy, Ethics, and Business (3/4)
  65. Chapter 16. Privacy, Ethics, and Business (4/4)
  66. Chapter 17. Leading through a Crisis: How Not to Conduct a Security Investigation (1/2)
  67. Chapter 17. Leading through a Crisis: How Not to Conduct a Security Investigation (2/2)
  68. Chapter 18. Security Pitfalls (1/3)
  69. Chapter 18. Security Pitfalls (2/3)
  70. Chapter 18. Security Pitfalls (3/3)
  71. Chapter 19. Security Leader Horizon Issues: What the Future Holds (1/3)
  72. Chapter 19. Security Leader Horizon Issues: What the Future Holds (2/3)
  73. Chapter 19. Security Leader Horizon Issues: What the Future Holds (3/3)
  74. Index (1/3)
  75. Index (2/3)
  76. Index (3/3)
  77. Back cover

Product information

  • Title: CISO Leadership
  • Author(s): Todd Fitzgerald, Micki Krause
  • Release date: December 2007
  • Publisher(s): Auerbach Publications
  • ISBN: 9780849379444