Cybersecurity Playbook

Cybersecurity Playbook

How Every Leader and Employee Can Contribute to a Culture of Security

Cerra, Allison

John Wiley & Sons Inc

10/2019

224

Dura

Inglês

9781119442196

15 a 20 dias

418

Descrição não disponível.
Chapter 1 The Time I Ruined Easter 1

Lessons Learned the Hard Way 8

Additional Lessons for You 12

Who Was at Fault? 14

Remember This Crucial Element 15

Why Me? 16

Why You? 17

W.I.S.D.O.M. 19

Chapter 2 Mr./Ms. Cellophane 23

The New Kid on the Block 26

W.I.S.D.O.M. for the Board and CEO 38

Making Mr./Ms. Cellophane Visible 41

Chapter 3 "Good Morning, This is Your Wakeup Call." 47

The Best Defense 54

W.I.S.D.O.M. for the Employee 59

Chapter 4 Stop the Line 69

The Internet of Terrorism 74

W.I.S.D.O.M. for the Product Developer 80

Chapter 5 Bridging the Gap 87

When Too Much of a Good Thing is Bad 90

It Wasn't Always This Way 92

W.I.S.D.O.M. for HR Professionals 96

Chapter 6 Luck Favors the Prepared 109

BREACH! 112

Preparing for Battle 115

W.I.S.D.O.M. for the Marketer/Communicator 119

Chapter 7 Interesting Bedfellows 127

The More Things Change . . . 132

. . . the More They Stay the Same 137

W.I.S.D.O.M. for the Finance Professional 142

Chapter 8 Mr./Ms. Cellophane (Reprise) 147

A Picture is Worth a Thousand Words 149

Letting Go to Hold On 153

Assuming the Mantle 156

W.I.S.D.O.M. for the Cybersecurity Professional 158

Chapter 9 Experiencing a Culture of Security 169

Chapter 10 A Culture of Security for All 187

W.I.S.D.O.M. for the CEO/Board Member 191

W.I.S.D.O.M. for the Employee 191

W.I.S.D.O.M. for the Product Developer 192

W.I.S.D.O.M. for the HR Professional 192

W.I.S.D.O.M. for the Marketer/Communicator 193

W.I.S.D.O.M. for the Finance Professional 194

W.I.S.D.O.M. for the Cybersecurity Professional 198

Acknowledgments 201

About the Author 203

Index 205
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
cybersecurity methods; cybersecurity techniques; cybersecurity policies; cybersecurity protocols; cybersecurity introduction; business cybersecurity; employee cybersecurity; business cybersecurity policies; IT security methods; IT security techniques; IT security policies; data security; data protection; business data security; business data protection; cyber-attack security; hacker protection; hacker prevention; hacker security; data hack security; practical cybersecurity; phishing prevention; phishing security; computer fraud security; The Cybersecurity Playbook: Practical Steps for Every Leader and Employee To Make Your Organization More Secure; Christopher Young