Book description
Caught in the crosshairs ofLeadership andInformation Technology Information Security professionals are increasingly tapped to operate as business executives. This often puts them on a career path they did not expect, in a field not yet clearly defined. IT training does not usually includemanagerial skills such as leadership, team-building, c
Table of contents
- Front cover
- Dedication
- Contents (1/2)
- Contents (2/2)
- Preface
- About the Editors
- Contributors (1/3)
- Contributors (2/3)
- Contributors (3/3)
- Acknowledgments
- PART I: A LEADERSHIP DISCONNECT
- Chapter 1. What You Told Us: A CISO Survey* (1/6)
- Chapter 1. What You Told Us: A CISO Survey* (2/6)
- Chapter 1. What You Told Us: A CISO Survey* (3/6)
- Chapter 1. What You Told Us: A CISO Survey* (4/6)
- Chapter 1. What You Told Us: A CISO Survey* (5/6)
- Chapter 1. What You Told Us: A CISO Survey* (6/6)
- PART II: A LEADERSHIP MANDATE
- Chapter 2. Who Companies Really Want to Hire: How to Advance Your Career and Have Great Success (1/3)
- Chapter 2. Who Companies Really Want to Hire: How to Advance Your Career and Have Great Success (2/3)
- Chapter 2. Who Companies Really Want to Hire: How to Advance Your Career and Have Great Success (3/3)
- Chapter 3. The Evolving Information Security Landscape (1/2)
- Chapter 3. The Evolving Information Security Landscape (2/2)
- Chapter 4. Business Drivers for Information Security (1/3)
- Chapter 4. Business Drivers for Information Security (2/3)
- Chapter 4. Business Drivers for Information Security (3/3)
- Chapter 5. Security as a Business Function (1/3)
- Chapter 5. Security as a Business Function (2/3)
- Chapter 5. Security as a Business Function (3/3)
- Chapter 6. Security Leadership (1/3)
- Chapter 6. Security Leadership (2/3)
- Chapter 6. Security Leadership (3/3)
- Chapter 7. The Public Sector CISO: Life in the Fishbowl (1/3)
- Chapter 7. The Public Sector CISO: Life in the Fishbowl (2/3)
- Chapter 7. The Public Sector CISO: Life in the Fishbowl (3/3)
- PART III: A LEADERSHIP EVOLUTION
- Chapter 8. A CISO Introspection (1/2)
- Chapter 8. A CISO Introspection (2/2)
- Chapter 9. How Savvy Are You? Can You Get What You Want? (1/3)
- Chapter 9. How Savvy Are You? Can You Get What You Want? (2/3)
- Chapter 9. How Savvy Are You? Can You Get What You Want? (3/3)
- Chapter 10. Why and How Assessment of Organization Culture Should Shape Security Strategies (1/6)
- Chapter 10. Why and How Assessment of Organization Culture Should Shape Security Strategies (2/6)
- Chapter 10. Why and How Assessment of Organization Culture Should Shape Security Strategies (3/6)
- Chapter 10. Why and How Assessment of Organization Culture Should Shape Security Strategies (4/6)
- Chapter 10. Why and How Assessment of Organization Culture Should Shape Security Strategies (5/6)
- Chapter 10. Why and How Assessment of Organization Culture Should Shape Security Strategies (6/6)
- Chapter 11. Selling Information Security (1/3)
- Chapter 11. Selling Information Security (2/3)
- Chapter 11. Selling Information Security (3/3)
- Chapter 12. The Importance of an IT Security Strategy (1/2)
- Chapter 12. The Importance of an IT Security Strategy (2/2)
- Chapter 13. Extending the Enterprise's Governance Program to Information Risks (1/2)
- Chapter 13. Extending the Enterprise's Governance Program to Information Risks (2/2)
- Chapter 14. Building Management Commitment through Security Councils (1/3)
- Chapter 14. Building Management Commitment through Security Councils (2/3)
- Chapter 14. Building Management Commitment through Security Councils (3/3)
- Chapter 15. Measuring Security (1/4)
- Chapter 15. Measuring Security (2/4)
- Chapter 15. Measuring Security (3/4)
- Chapter 15. Measuring Security (4/4)
- Chapter 16. Privacy, Ethics, and Business (1/4)
- Chapter 16. Privacy, Ethics, and Business (2/4)
- Chapter 16. Privacy, Ethics, and Business (3/4)
- Chapter 16. Privacy, Ethics, and Business (4/4)
- Chapter 17. Leading through a Crisis: How Not to Conduct a Security Investigation (1/2)
- Chapter 17. Leading through a Crisis: How Not to Conduct a Security Investigation (2/2)
- Chapter 18. Security Pitfalls (1/3)
- Chapter 18. Security Pitfalls (2/3)
- Chapter 18. Security Pitfalls (3/3)
- Chapter 19. Security Leader Horizon Issues: What the Future Holds (1/3)
- Chapter 19. Security Leader Horizon Issues: What the Future Holds (2/3)
- Chapter 19. Security Leader Horizon Issues: What the Future Holds (3/3)
- Index (1/3)
- Index (2/3)
- Index (3/3)
- Back cover
Product information
- Title: CISO Leadership
- Author(s):
- Release date: December 2007
- Publisher(s): Auerbach Publications
- ISBN: 9780849379444
You might also like
book
The Art of Communication
Bring nuance, depth, and meaning to every conversation you have The Art of Communication is for …
audiobook
Joy of Agility
Agility enables you, your team, and your organization to streamline slow and awkward actions, overcome obstacles …
video
Full Stack Web Development Mastery Course - Novice to Expert
Full stack development refers to the development of both frontend (client-side) and backend (server-side) portions of …
video
Java SE 17 Developer (1Z0-829)
21+ Hours of Video Instruction An intensive and guided video course to learn and practice while …