The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework
Written by Mathieu Gorge
Narrated by Zack Sage
()
About this audiobook
We’ve all read the cybersecurity horror stories: a prominent company exposes the private information of their customers only to scramble after the fact to apologize and safeguard the data. Cybersecurity is often an afterthought, a much lower priority than profit—until a data breach threatens the bottom line anyway.
In The Cyber-Elephant in the Boardroom, data security expert and CEO Mathieu Gorge, along with a host of guests, shows why protecting a company’s data should be top of mind for C-suites and corporate boards. With the innovative 5 Pillars of Security Framework, any C-level executive can understand their organization’s cyber risk and the steps they need to take to protect their information. There’s a cyber-elephant in the boardroom and it needs to be addressed!
Related to The Cyber-Elephant In The Boardroom
Related audiobooks
How CIOs Can Solve the Security Puzzle: Tips and Techniques for CIOs to Use in Order to Secure Both Their IT Department and Their Company Rating: 4 out of 5 stars4/5Zero Trust and Third-Party Risk: Reduce the Blast Radius Rating: 0 out of 5 stars0 ratingsCYBERSECURITY and CYBERWAR: Gain the Experience to Navigate Critical Cybersecurity Challenges Rating: 0 out of 5 stars0 ratingsCybersecurity Fundamentals: How to Establish Effective Security Management Functions Rating: 5 out of 5 stars5/5A Leader's Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Rating: 0 out of 5 stars0 ratingsCybersecurity For Beginners: How to apply the NIST Risk Management Framework Rating: 0 out of 5 stars0 ratingsThe Smartest Person in the Room Rating: 5 out of 5 stars5/5Cybersecurity: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5Cloud Security For Dummies Rating: 5 out of 5 stars5/5The Cyber Conundrum: How Do We Fix Cybersecurity? Rating: 4 out of 5 stars4/5Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future Rating: 5 out of 5 stars5/5Certified Information Security Manager CISM Study Guide Rating: 0 out of 5 stars0 ratingsThe CISO Evolution: Business Knowledge for Cybersecurity Executives Rating: 5 out of 5 stars5/5Hackable: How to Do Application Security Right Rating: 0 out of 5 stars0 ratingsSolving the Technology Challenge for IT Managers: Technologies that IT Managers Can Use in Order to Make Their Teams More Productive Rating: 0 out of 5 stars0 ratingsDigital Resilience: Is Your Company Ready for the Next Cyber Threat? Rating: 4 out of 5 stars4/5Facing Cyber Threats Head On: Protecting Yourself and Your Business Rating: 5 out of 5 stars5/5NIST Cloud Security: Cyber Threats, Policies, And Best Practices Rating: 5 out of 5 stars5/5Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Rating: 4 out of 5 stars4/5CISSP: Tips and Tricks to Learn and Study about Information Systems Security from A-Z Rating: 4 out of 5 stars4/58 Steps to Better Security: A Simple Cyber Resilience Guide for Business Rating: 4 out of 5 stars4/5Cybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsCybersecurity For Dummies Rating: 4 out of 5 stars4/5The Real Business of IT: How CIOs Create and Communicate Value Rating: 4 out of 5 stars4/5
Security For You
CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Rating: 5 out of 5 stars5/5CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Cybersecurity First Principles: A Reboot of Strategy and Tactics Rating: 5 out of 5 stars5/5Governance of Enterprise IT based on COBIT 5: A Management Guide Rating: 0 out of 5 stars0 ratingsCertified Information Security Manager CISM Study Guide Rating: 0 out of 5 stars0 ratingsSocial Engineering: The Science of Human Hacking 2nd Edition Rating: 5 out of 5 stars5/5Project Zero Trust: A Story about a Strategy for Aligning Security and the Business Rating: 5 out of 5 stars5/5Hacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 4 out of 5 stars4/5The Art of Deception: Controlling the Human Element of Security Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Hackers & Painters: Big Ideas from the Computer Age Rating: 4 out of 5 stars4/5Tor Darknet Bundle (5 in 1): Master the Art of Invisibility Rating: 5 out of 5 stars5/5Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 Rating: 0 out of 5 stars0 ratingsDarknet: A Beginner's Guide to Staying Anonymous Online Rating: 5 out of 5 stars5/5Blockchain For Dummies Rating: 5 out of 5 stars5/5A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Rating: 4 out of 5 stars4/5The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Rating: 4 out of 5 stars4/5Cybersecurity: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5The Smartest Person in the Room Rating: 5 out of 5 stars5/5Cybersecurity and Cyberwar: What Everyone Needs to Know Rating: 4 out of 5 stars4/5Bitcoin for Beginners & Dummies: Cryptocurrency & Blockchain Rating: 4 out of 5 stars4/5Through the Firewall: The Alchemy of Turning Crisis into Opportunity Rating: 5 out of 5 stars5/5The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Rating: 5 out of 5 stars5/5
Reviews for The Cyber-Elephant In The Boardroom
0 ratings0 reviews