product
1401967The Cybersecurity Managers Guidehttps://www.gandhi.com.mx/the-cybersecurity-manager-s-guide-1/phttps://gandhi.vtexassets.com/arquivos/ids/167651/040cb13e-376c-4c95-99a3-eb550c40f895.jpg?v=638333665552800000327454MXNOReilly MediaInStock/Ebooks/<p>If youre a cybersecurity professional, then you know how it often seems that no one cares about (or understands) information security. InfoSec professionals frequently struggle to integrate security into their companies processes. Many are at odds with their organizations. Most are under-resourced. There must be a better way. This essential managers guide offers a new approach to building and maintaining an information security program thats both effective and easy to follow.</p><p>Author and longtime chief information security officer (CISO) Todd Barnum upends the assumptions security professionals take for granted. CISOs, chief security officers, chief information officers, and IT security professionals will learn a simple seven-step process for building a new program or improving a current one.</p><ul><li>Build better relationships across the organization</li><li>Align your role with your companys values, culture, and tolerance for information loss</li><li>Lay the groundwork for your security program</li><li>Create a communications program to share your teams contributions and educate your coworkers</li><li>Transition security functions and responsibilities to other teams</li><li>Organize and build an effective InfoSec team</li><li>Measure your companys ability to recognize and report security policy violations and phishing emails</li></ul>...1388484The Cybersecurity Managers Guide327454https://www.gandhi.com.mx/the-cybersecurity-manager-s-guide-1/phttps://gandhi.vtexassets.com/arquivos/ids/167651/040cb13e-376c-4c95-99a3-eb550c40f895.jpg?v=638333665552800000InStockMXN99999DIEbook20219781492076162_W3siaWQiOiJiNzM2ZDhmMC04ZTc3LTQ4YzUtOTYxMC03ZGJjZTliNTY1NWQiLCJsaXN0UHJpY2UiOjQ1NCwiZGlzY291bnQiOjEyNywic2VsbGluZ1ByaWNlIjozMjcsImluY2x1ZGVzVGF4Ijp0cnVlLCJwcmljZVR5cGUiOiJXaG9sZXNhbGUiLCJjdXJyZW5jeSI6Ik1YTiIsImZyb20iOiIyMDI0LTA1LTE5VDA1OjAwOjAwWiIsInJlZ2lvbiI6Ik1YIiwiaXNQcmVvcmRlciI6ZmFsc2V9XQ==9781492076162_<p>If youre a cybersecurity professional, then you know how it often seems that no one cares about (or understands) information security. InfoSec professionals frequently struggle to integrate security into their companies processes. Many are at odds with their organizations. Most are under-resourced. There must be a better way. This essential managers guide offers a new approach to building and maintaining an information security program thats both effective and easy to follow.</p><p>Author and longtime chief information security officer (CISO) Todd Barnum upends the assumptions security professionals take for granted. CISOs, chief security officers, chief information officers, and IT security professionals will learn a simple seven-step process for building a new program or improving a current one.</p><ul><li>Build better relationships across the organization</li><li>Align your role with your companys values, culture, and tolerance for information loss</li><li>Lay the groundwork for your security program</li><li>Create a communications program to share your teams contributions and educate your coworkers</li><li>Transition security functions and responsibilities to other teams</li><li>Organize and build an effective infosec team</li><li>Measure your companys ability to recognize and report security policy violations and phishing emails</li></ul>(*_*)9781492076162_<p>If youre a cybersecurity professional, then you know how it often seems that no one cares about (or understands) information security. InfoSec professionals frequently struggle to integrate security into their companies processes. Many are at odds with their organizations. Most are under-resourced. There must be a better way. This essential managers guide offers a new approach to building and maintaining an information security program thats both effective and easy to follow.</p><p>Author and longtime chief information security officer (CISO) Todd Barnum upends the assumptions security professionals take for granted. CISOs, chief security officers, chief information officers, and IT security professionals will learn a simple seven-step process for building a new program or improving a current one.</p><ul><li>Build better relationships across the organization</li><li>Align your role with your companys values, culture, and tolerance for information loss</li><li>Lay the groundwork for your security program</li><li>Create a communications program to share your teams contributions and educate your coworkers</li><li>Transition security functions and responsibilities to other teams</li><li>Organize and build an effective InfoSec team</li><li>Measure your companys ability to recognize and report security policy violations and phishing emails</li></ul>...9781492076162_OReilly Medialibro_electonico_74538017-d9bf-3cf8-898a-2781e87d6a43_9781492076162;9781492076162_9781492076162Todd BarnumInglésMéxicohttps://getbook.kobo.com/koboid-prod-public/oreilly-epub-791c2a9b-bc8c-4f7d-9af1-6946d95bd445.epub2021-03-18T00:00:00+00:00OReilly Media