CISO Leadership

Book description

Written by experienced computer security professionals and including interviews with successful CISOs, this book describes the management skills needed by aspiring senior security executives. It provides tools for identifying one's strengths and weaknesses and honing one's leadership style, delineates what companies look for when hiring a security professional, and covers practical steps for evaluating an organization's culture in order to successfully implement a security program that will fit the culture. A unique reference for IT professionals, CISOs, CIOs, and CSOs, the book includes real-world examples of how to treat the security program as a business.

Table of contents

  1. Front cover
  2. Dedication
  3. Contents (1/2)
  4. Contents (2/2)
  5. Preface
  6. About the Editors
  7. Contributors (1/3)
  8. Contributors (2/3)
  9. Contributors (3/3)
  10. Acknowledgments
  11. PART I: A LEADERSHIP DISCONNECT
  12. Chapter 1. What You Told Us: A CISO Survey* (1/6)
  13. Chapter 1. What You Told Us: A CISO Survey* (2/6)
  14. Chapter 1. What You Told Us: A CISO Survey* (3/6)
  15. Chapter 1. What You Told Us: A CISO Survey* (4/6)
  16. Chapter 1. What You Told Us: A CISO Survey* (5/6)
  17. Chapter 1. What You Told Us: A CISO Survey* (6/6)
  18. PART II: A LEADERSHIP MANDATE
  19. Chapter 2. Who Companies Really Want to Hire: How to Advance Your Career and Have Great Success (1/3)
  20. Chapter 2. Who Companies Really Want to Hire: How to Advance Your Career and Have Great Success (2/3)
  21. Chapter 2. Who Companies Really Want to Hire: How to Advance Your Career and Have Great Success (3/3)
  22. Chapter 3. The Evolving Information Security Landscape (1/2)
  23. Chapter 3. The Evolving Information Security Landscape (2/2)
  24. Chapter 4. Business Drivers for Information Security (1/3)
  25. Chapter 4. Business Drivers for Information Security (2/3)
  26. Chapter 4. Business Drivers for Information Security (3/3)
  27. Chapter 5. Security as a Business Function (1/3)
  28. Chapter 5. Security as a Business Function (2/3)
  29. Chapter 5. Security as a Business Function (3/3)
  30. Chapter 6. Security Leadership (1/3)
  31. Chapter 6. Security Leadership (2/3)
  32. Chapter 6. Security Leadership (3/3)
  33. Chapter 7. The Public Sector CISO: Life in the Fishbowl (1/3)
  34. Chapter 7. The Public Sector CISO: Life in the Fishbowl (2/3)
  35. Chapter 7. The Public Sector CISO: Life in the Fishbowl (3/3)
  36. PART III: A LEADERSHIP EVOLUTION
  37. Chapter 8. A CISO Introspection (1/2)
  38. Chapter 8. A CISO Introspection (2/2)
  39. Chapter 9. How Savvy Are You? Can You Get What You Want? (1/3)
  40. Chapter 9. How Savvy Are You? Can You Get What You Want? (2/3)
  41. Chapter 9. How Savvy Are You? Can You Get What You Want? (3/3)
  42. Chapter 10. Why and How Assessment of Organization Culture Should Shape Security Strategies (1/6)
  43. Chapter 10. Why and How Assessment of Organization Culture Should Shape Security Strategies (2/6)
  44. Chapter 10. Why and How Assessment of Organization Culture Should Shape Security Strategies (3/6)
  45. Chapter 10. Why and How Assessment of Organization Culture Should Shape Security Strategies (4/6)
  46. Chapter 10. Why and How Assessment of Organization Culture Should Shape Security Strategies (5/6)
  47. Chapter 10. Why and How Assessment of Organization Culture Should Shape Security Strategies (6/6)
  48. Chapter 11. Selling Information Security (1/3)
  49. Chapter 11. Selling Information Security (2/3)
  50. Chapter 11. Selling Information Security (3/3)
  51. Chapter 12. The Importance of an IT Security Strategy (1/2)
  52. Chapter 12. The Importance of an IT Security Strategy (2/2)
  53. Chapter 13. Extending the Enterprise's Governance Program to Information Risks (1/2)
  54. Chapter 13. Extending the Enterprise's Governance Program to Information Risks (2/2)
  55. Chapter 14. Building Management Commitment through Security Councils (1/3)
  56. Chapter 14. Building Management Commitment through Security Councils (2/3)
  57. Chapter 14. Building Management Commitment through Security Councils (3/3)
  58. Chapter 15. Measuring Security (1/4)
  59. Chapter 15. Measuring Security (2/4)
  60. Chapter 15. Measuring Security (3/4)
  61. Chapter 15. Measuring Security (4/4)
  62. Chapter 16. Privacy, Ethics, and Business (1/4)
  63. Chapter 16. Privacy, Ethics, and Business (2/4)
  64. Chapter 16. Privacy, Ethics, and Business (3/4)
  65. Chapter 16. Privacy, Ethics, and Business (4/4)
  66. Chapter 17. Leading through a Crisis: How Not to Conduct a Security Investigation (1/2)
  67. Chapter 17. Leading through a Crisis: How Not to Conduct a Security Investigation (2/2)
  68. Chapter 18. Security Pitfalls (1/3)
  69. Chapter 18. Security Pitfalls (2/3)
  70. Chapter 18. Security Pitfalls (3/3)
  71. Chapter 19. Security Leader Horizon Issues: What the Future Holds (1/3)
  72. Chapter 19. Security Leader Horizon Issues: What the Future Holds (2/3)
  73. Chapter 19. Security Leader Horizon Issues: What the Future Holds (3/3)
  74. Index (1/3)
  75. Index (2/3)
  76. Index (3/3)
  77. Back cover

Product information

  • Title: CISO Leadership
  • Author(s): Todd Fitzgerald, Micki Krause
  • Release date: December 2007
  • Publisher(s): Auerbach Publications
  • ISBN: 9780849379444