Book description
Written by experienced computer security professionals and including interviews with successful CISOs, this book describes the management skills needed by aspiring senior security executives. It provides tools for identifying one's strengths and weaknesses and honing one's leadership style, delineates what companies look for when hiring a security professional, and covers practical steps for evaluating an organization's culture in order to successfully implement a security program that will fit the culture. A unique reference for IT professionals, CISOs, CIOs, and CSOs, the book includes real-world examples of how to treat the security program as a business.
Table of contents
- Front cover
- Dedication
- Contents (1/2)
- Contents (2/2)
- Preface
- About the Editors
- Contributors (1/3)
- Contributors (2/3)
- Contributors (3/3)
- Acknowledgments
- PART I: A LEADERSHIP DISCONNECT
- Chapter 1. What You Told Us: A CISO Survey* (1/6)
- Chapter 1. What You Told Us: A CISO Survey* (2/6)
- Chapter 1. What You Told Us: A CISO Survey* (3/6)
- Chapter 1. What You Told Us: A CISO Survey* (4/6)
- Chapter 1. What You Told Us: A CISO Survey* (5/6)
- Chapter 1. What You Told Us: A CISO Survey* (6/6)
- PART II: A LEADERSHIP MANDATE
- Chapter 2. Who Companies Really Want to Hire: How to Advance Your Career and Have Great Success (1/3)
- Chapter 2. Who Companies Really Want to Hire: How to Advance Your Career and Have Great Success (2/3)
- Chapter 2. Who Companies Really Want to Hire: How to Advance Your Career and Have Great Success (3/3)
- Chapter 3. The Evolving Information Security Landscape (1/2)
- Chapter 3. The Evolving Information Security Landscape (2/2)
- Chapter 4. Business Drivers for Information Security (1/3)
- Chapter 4. Business Drivers for Information Security (2/3)
- Chapter 4. Business Drivers for Information Security (3/3)
- Chapter 5. Security as a Business Function (1/3)
- Chapter 5. Security as a Business Function (2/3)
- Chapter 5. Security as a Business Function (3/3)
- Chapter 6. Security Leadership (1/3)
- Chapter 6. Security Leadership (2/3)
- Chapter 6. Security Leadership (3/3)
- Chapter 7. The Public Sector CISO: Life in the Fishbowl (1/3)
- Chapter 7. The Public Sector CISO: Life in the Fishbowl (2/3)
- Chapter 7. The Public Sector CISO: Life in the Fishbowl (3/3)
- PART III: A LEADERSHIP EVOLUTION
- Chapter 8. A CISO Introspection (1/2)
- Chapter 8. A CISO Introspection (2/2)
- Chapter 9. How Savvy Are You? Can You Get What You Want? (1/3)
- Chapter 9. How Savvy Are You? Can You Get What You Want? (2/3)
- Chapter 9. How Savvy Are You? Can You Get What You Want? (3/3)
- Chapter 10. Why and How Assessment of Organization Culture Should Shape Security Strategies (1/6)
- Chapter 10. Why and How Assessment of Organization Culture Should Shape Security Strategies (2/6)
- Chapter 10. Why and How Assessment of Organization Culture Should Shape Security Strategies (3/6)
- Chapter 10. Why and How Assessment of Organization Culture Should Shape Security Strategies (4/6)
- Chapter 10. Why and How Assessment of Organization Culture Should Shape Security Strategies (5/6)
- Chapter 10. Why and How Assessment of Organization Culture Should Shape Security Strategies (6/6)
- Chapter 11. Selling Information Security (1/3)
- Chapter 11. Selling Information Security (2/3)
- Chapter 11. Selling Information Security (3/3)
- Chapter 12. The Importance of an IT Security Strategy (1/2)
- Chapter 12. The Importance of an IT Security Strategy (2/2)
- Chapter 13. Extending the Enterprise's Governance Program to Information Risks (1/2)
- Chapter 13. Extending the Enterprise's Governance Program to Information Risks (2/2)
- Chapter 14. Building Management Commitment through Security Councils (1/3)
- Chapter 14. Building Management Commitment through Security Councils (2/3)
- Chapter 14. Building Management Commitment through Security Councils (3/3)
- Chapter 15. Measuring Security (1/4)
- Chapter 15. Measuring Security (2/4)
- Chapter 15. Measuring Security (3/4)
- Chapter 15. Measuring Security (4/4)
- Chapter 16. Privacy, Ethics, and Business (1/4)
- Chapter 16. Privacy, Ethics, and Business (2/4)
- Chapter 16. Privacy, Ethics, and Business (3/4)
- Chapter 16. Privacy, Ethics, and Business (4/4)
- Chapter 17. Leading through a Crisis: How Not to Conduct a Security Investigation (1/2)
- Chapter 17. Leading through a Crisis: How Not to Conduct a Security Investigation (2/2)
- Chapter 18. Security Pitfalls (1/3)
- Chapter 18. Security Pitfalls (2/3)
- Chapter 18. Security Pitfalls (3/3)
- Chapter 19. Security Leader Horizon Issues: What the Future Holds (1/3)
- Chapter 19. Security Leader Horizon Issues: What the Future Holds (2/3)
- Chapter 19. Security Leader Horizon Issues: What the Future Holds (3/3)
- Index (1/3)
- Index (2/3)
- Index (3/3)
- Back cover
Product information
- Title: CISO Leadership
- Author(s):
- Release date: December 2007
- Publisher(s): Auerbach Publications
- ISBN: 9780849379444
You might also like
book
Grateful Leadership: Using the Power of Acknowledgment to Engage All Your People and Achieve Superior Results
From a global leader in management training—the definitive guide to improving employee engagement Retaining the best …
book
Innovation the NASA Way: Harnessing the Power of Your Organization for Breakthrough Success
Launch your business to new heights with out-of-this world innovation For over half a century, NASA …
book
Organizations Cannot Afford to Stay Silent on Racial Injustice
Leaders must engage with the issue of racism and discrimination, both because of its effect on …
book
What Tech Pioneers Can Learn From Emerging Markets
Technology leaders are not shy about pushing the boundaries of their industries, and sometimes they go …