Audiobook9 hours
Cybersecurity Program Development for Business: The Essential Planning Guide
Written by Chris Moschovitis
Narrated by Sean Pratt
Rating: 5 out of 5 stars
5/5
()
About this audiobook
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need; to core risk management principles; to threats, tools, roles, and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. From beginning to end, it's a thorough overview, but it can also function as a useful reference book as individual questions and difficulties arise.
- Unlike other cybersecurity books, the text is not bogged down with industry jargon
- Speaks specifically to the executive who is not familiar with the development or implementation of cybersecurity programs
- Shows you how to make pragmatic, rational, and informed decisions for your organization
- Written by a top-flight technologist with decades of experience and a track record of success
If you're a business manager or executive who needs to make sense of cybersecurity, this book demystifies it for you.
- Unlike other cybersecurity books, the text is not bogged down with industry jargon
- Speaks specifically to the executive who is not familiar with the development or implementation of cybersecurity programs
- Shows you how to make pragmatic, rational, and informed decisions for your organization
- Written by a top-flight technologist with decades of experience and a track record of success
If you're a business manager or executive who needs to make sense of cybersecurity, this book demystifies it for you.
Related to Cybersecurity Program Development for Business
Related audiobooks
Facing Cyber Threats Head On: Protecting Yourself and Your Business Rating: 5 out of 5 stars5/5Hacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 4 out of 5 stars4/5The Pentester BluePrint: Starting a Career as an Ethical Hacker Rating: 5 out of 5 stars5/5Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Rating: 5 out of 5 stars5/5Navigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-Suite Rating: 5 out of 5 stars5/5The Art of Attack: Attacker Mindset for Security Professionals Rating: 5 out of 5 stars5/5CYBERSECURITY FOR BEGINNERS: HOW TO DEFEND AGAINST HACKERS & MALWARE Rating: 4 out of 5 stars4/5Cryptography: The Key to Digital Security, How It Works, and Why It Matters Rating: 5 out of 5 stars5/5Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5The CISO Evolution: Business Knowledge for Cybersecurity Executives Rating: 5 out of 5 stars5/5The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Rating: 5 out of 5 stars5/58 Steps to Better Security: A Simple Cyber Resilience Guide for Business Rating: 4 out of 5 stars4/5Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit Rating: 0 out of 5 stars0 ratingsProject Zero Trust: A Story about a Strategy for Aligning Security and the Business Rating: 5 out of 5 stars5/5HACKING: Hacking Firewalls & Bypassing Honeypots Rating: 5 out of 5 stars5/5HACKING: How to Hack Web Apps Rating: 5 out of 5 stars5/5HACKING: Denial of Service Attacks Rating: 4 out of 5 stars4/5Cybersecurity Career Master Plan: Proven techniques and effective tips to help you advance in your cybersecurity career Rating: 0 out of 5 stars0 ratingsWhat is the Dark Web?: The truth about the hidden part of the internet Rating: 4 out of 5 stars4/5We Have Root: Even More Advice from Schneier on Security Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking 2nd Edition Rating: 5 out of 5 stars5/5HACKING: Social Engineering Attacks, Techniques & Prevention Rating: 5 out of 5 stars5/5Protecting Your Internet Identity: Are You Naked Online? Rating: 0 out of 5 stars0 ratingsHow I Rob Banks: And Other Such Places Rating: 4 out of 5 stars4/5If It's Smart, It's Vulnerable Rating: 4 out of 5 stars4/5How to Measure Anything in Cybersecurity Risk, 2nd Edition Rating: 0 out of 5 stars0 ratingsPhishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails Rating: 4 out of 5 stars4/5The Personal Cybersecurity Manual: How Anyone Can Protect Themselves from Fraud, Identity Theft, and Other Cybercrimes Rating: 0 out of 5 stars0 ratings
Business For You
The Warmth of Other Suns: The Epic Story of America's Great Migration Rating: 5 out of 5 stars5/5Extreme Ownership: How U.S. Navy SEALs Lead and Win Rating: 5 out of 5 stars5/5Think Faster, Talk Smarter: How to Speak Successfully When You're Put on the Spot Rating: 4 out of 5 stars4/5Company Rules: Or Everything I Know About Business I Learned from the CIA Rating: 4 out of 5 stars4/5How To Win Friends And Influence People Rating: 4 out of 5 stars4/5Elon Musk Rating: 5 out of 5 stars5/5Rich Dad Poor Dad: What The Rich Teach Their Kids About Money - That the Poor and Middle Class Do Not! Rating: 5 out of 5 stars5/5Getting to Yes: How to Negotiate Agreement Without Giving In Rating: 4 out of 5 stars4/5The Art of Happiness: A Handbook for Living Rating: 4 out of 5 stars4/5The Charisma Myth: How Anyone Can Master the Art and Science of Personal Magnetism (Intl Ed) Rating: 5 out of 5 stars5/5The Artist's Way at Work: Riding the Dragon: Twelve Weeks to Creative Freedom Rating: 4 out of 5 stars4/5Win Every Argument: The Art of Debating, Persuading, and Public Speaking Rating: 5 out of 5 stars5/5The End of the World is Just the Beginning: Mapping the Collapse of Globalization Rating: 5 out of 5 stars5/5The Millionaire Next Door: The Surprising Secrets Of Americas Wealthy Rating: 5 out of 5 stars5/5Becoming Bulletproof: Protect Yourself, Read People, Influence Situations, and Live Fearlessly Rating: 5 out of 5 stars5/5Getting Things Done: The Art of Stress-Free Productivity Rating: 4 out of 5 stars4/5The TenX Rule: The Only Difference Between Success and Failure Rating: 5 out of 5 stars5/5Your Next Five Moves: Master the Art of Business Strategy Rating: 5 out of 5 stars5/5Astor: The Rise and Fall of an American Fortune Rating: 4 out of 5 stars4/5The Energy Bus: 10 Rules to Fuel Your Life, Work, and Team with Positive Energy Rating: 5 out of 5 stars5/5You Will Own Nothing: Your War with a New Financial World Order and How to Fight Back Rating: 4 out of 5 stars4/5The Anatomy of Peace, Fourth Edition: Resolving the Heart of Conflict Rating: 5 out of 5 stars5/5The Hard Thing About Hard Things: Building a Business When There Are No Easy Answers Rating: 5 out of 5 stars5/5Silva Mind Control Method Of Mental Dynamics Rating: 5 out of 5 stars5/5Seeing What Others Don't: The Remarkable Ways We Gain Insights Rating: 4 out of 5 stars4/5Algorithms to Live By: The Computer Science of Human Decisions Rating: 4 out of 5 stars4/5The Catalyst: How to Change Anyone's Mind Rating: 5 out of 5 stars5/5The Sociopath Next Door: The Ruthless Versus the Rest of Us Rating: 4 out of 5 stars4/5
Reviews for Cybersecurity Program Development for Business
Rating: 4.8 out of 5 stars
5/5
15 ratings0 reviews