Keeping the Barbarians Out: How CIOs Can Secure Their Department and Company: Tips and Techniques for CIOs to Use in Order to Secure Both Their IT Department and Their Company
Written by Dr. Jim Anderson
Narrated by Dr. Jim Anderson
()
About this audiobook
There are a lot of bad guys out there. For some odd reason, a lot of them seem to want to break into your company's networks and applications. As the CIO, it's your job to make sure that this does not happen. Got any thoughts on how to go about doing that?
What You'll Find Inside:
- CIO’S NEED TO LEARN HOW TO DEFEND AGAINST THE INSIDER THREAT
- WHY BYOD SPELLS DOOM FOR CIOS
- DO WE REALLY NEED TO ENCRYPT OUR CUSTOMER DATA? 3 WAYS TO GET YOUR COMPANY TO TAKE DIGITAL SECURITY SERIOUSLY
As much as we like to spend our time looking outwards in order to detect the next threat that our company may be facing, perhaps we're looking in the wrong direction. Just as big of a deal may be the insider threat that lurks within the company. No matter where it comes from, cybercrime is your problem to deal with.
CIOs have to deal with trends as they come and go. Right now the Bring Your Own Device To Work (BYOD) phase is in full swing and if you aren't careful could cause a lot of problems for the IT department. At the same time, it's the code that your teams create that will secure your applications. Do you know if they are writing secure code or are they leaving doors wide open?
In order to measure where the threats are coming from and how big of deal they are, CIOs need to become comfortable with measuring the level of risk that they are dealing with. A big part of measuring risk is getting information about threats from other CIOs. This can be difficult to do because CIOs really don't like to share information like this.
Since we can't always be certain that we can keep the bad guys out, we need to make sure that we've taken the needed steps to secure our networks. Should they happen to get inside of the company, we need to take extra steps to make sure that they can't get what they came for. This brings up the interesting question of whether or not we should go to the effort and expense of encrypting our customer data.
No matter what our final decision on encrypting the company's digital assets is, we still have a responsibly as CIO to make sure that the company understands the threats that it is facing and that it starts to take digital security seriously.
More audiobooks from Dr. Jim Anderson
Understanding What Leadership Means for IT Managers: Tips and Techniques that IT Managers Can Use in Order to Develop Leadership Skills Rating: 0 out of 5 stars0 ratingsCritical CIO Management Skills: Decision Making Skills That Every CIO Needs To Have In Order To Be Able To Make The Right Choice Rating: 0 out of 5 stars0 ratingsSecrets to Planning the Perfect Speech for Negotiators: How to Plan to Give the Best Speech of Your Life! Rating: 0 out of 5 stars0 ratingsCIO Secrets for Growing Innovation: Tips and Techniques for CIOs to Use in Order to Make Innovation Happen in Their IT Department Rating: 0 out of 5 stars0 ratingsSecrets to Planning the Perfect Speech Rating: 0 out of 5 stars0 ratingsSolving the Technology Challenge for IT Managers: Technologies that IT Managers Can Use in Order to Make Their Teams More Productive Rating: 0 out of 5 stars0 ratingsStaffing Skills IT Managers Must Have: Tips and Techniques that IT Managers Can Use in Order to Correctly Staff Their Teams Rating: 0 out of 5 stars0 ratingsThe Business of Being a CIO: How CIOs Can Use Their Technical Skills to Help Their Company Solve Real-World Business Problems Rating: 0 out of 5 stars0 ratingsSecrets to Planning the Perfect Speech for Broadcast Journalists: How to Plan to Give the Best Speech of Your Life! Rating: 0 out of 5 stars0 ratingsHow to Show What You Mean During a Presentation: How to use Visual Techniques to Transform a Speech into a Memorable Event Rating: 0 out of 5 stars0 ratingsSecrets to Planning the Perfect Speech for Curators: How to Plan to Give the Best Speech of Your Life! Rating: 0 out of 5 stars0 ratingsPreparing for Your Next Negotiation: What You Need to Do BEFORE a Negotiation Starts in Order to Get the Best Possible Deal Rating: 0 out of 5 stars0 ratings
Related to Keeping the Barbarians Out
Related audiobooks
Zero Trust and Third-Party Risk: Reduce the Blast Radius Rating: 0 out of 5 stars0 ratingsCybersecurity Handbook for Small to Mid-size Businesses Rating: 0 out of 5 stars0 ratingsHOW TO IMPLEMENT ARTIFICIAL INTELLIGENCE AND CYBERSECURITY IN MODERN BUSINESSES: BASICS AND GUIDES FOR DUMMIES AND BEGINNERS Rating: 0 out of 5 stars0 ratingsWhat CIOs Need to Know About Working With Partners Rating: 0 out of 5 stars0 ratingsCybersecurity for Beginners: Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide Rating: 0 out of 5 stars0 ratingsHow to Build High Performance IT Teams: Tips and Techniques that IT Managers Can Use in Order to Develop Productive Teams Rating: 0 out of 5 stars0 ratingsHow CIOs Can Make Innovation Happen: Tips and Techniques for CIOs to Use in Order to Make Innovation Happen in Their IT Department Rating: 0 out of 5 stars0 ratingsThe Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Rating: 0 out of 5 stars0 ratingsThe Business of Being a CIO: How CIOs Can Use Their Technical Skills to Help Their Company Solve Real-World Business Problems Rating: 0 out of 5 stars0 ratingsSolving the Technology Challenge for IT Managers: Technologies that IT Managers Can Use in Order to Make Their Teams More Productive Rating: 0 out of 5 stars0 ratingsCISSP: 3 in 1- Beginner's Guide + Tips and Tricks + Simple and Effective Strategies to Learn About Information Systems Security Rating: 0 out of 5 stars0 ratingsCYBERSECURITY and CYBERWAR: Gain the Experience to Navigate Critical Cybersecurity Challenges Rating: 0 out of 5 stars0 ratingsCybersecurity Fundamentals: How to Establish Effective Security Management Functions Rating: 5 out of 5 stars5/5Cybercrime Investigators Handbook Rating: 0 out of 5 stars0 ratingsDigital Resilience: Is Your Company Ready for the Next Cyber Threat? Rating: 4 out of 5 stars4/5Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit Rating: 0 out of 5 stars0 ratingsCIO Secrets for Growing Innovation: Tips and Techniques for CIOs to Use in Order to Make Innovation Happen in Their IT Department Rating: 0 out of 5 stars0 ratingsThe Ransomware Threat Landscape: Prepare for, recognise and survive ransomware attacks Rating: 0 out of 5 stars0 ratingsHackable: How to Do Application Security Right Rating: 0 out of 5 stars0 ratingsCybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsDuty of Care: An Executive Guide for Corporate Boards in the Digital Era Rating: 4 out of 5 stars4/5Unleashing the Power of IT: Bringing People, Business, and Technology Together Rating: 4 out of 5 stars4/58 Steps to Better Security: A Simple Cyber Resilience Guide for Business Rating: 4 out of 5 stars4/5Rethinking IT Security: What Needs to Be Said — How Can We Solve the IT Security Problem Long Term? Rating: 0 out of 5 stars0 ratingsSecurity Awareness For Dummies Rating: 5 out of 5 stars5/5
Management For You
The 7 Habits of Highly Effective People Rating: 4 out of 5 stars4/5The 12 Week Year: Get More Done in 12 Weeks than Others Do in 12 Months Rating: 4 out of 5 stars4/5Company Rules: Or Everything I Know About Business I Learned from the CIA Rating: 4 out of 5 stars4/5Good to Great Rating: 5 out of 5 stars5/5The 6 Types of Working Genius: A Better Way to Understand Your Gifts, Your Frustrations, and Your Team Rating: 5 out of 5 stars5/5The Hard Thing About Hard Things: Building a Business When There Are No Easy Answers Rating: 5 out of 5 stars5/5The Coaching Habit: Say Less, Ask More & Change the Way You Lead Forever Rating: 5 out of 5 stars5/5The Introverted Leader: Building on Your Quiet Strength Rating: 4 out of 5 stars4/5Thinking in Systems: A Primer Rating: 5 out of 5 stars5/5The 7 Habits of Highly Effective People: 30th Anniversary Edition Rating: 5 out of 5 stars5/5The E-Myth Revisited: Why Most Small Businesses Don't Work and Rating: 5 out of 5 stars5/5The Power Code: More Joy. Less Ego. Maximum Impact for Women (and Everyone). Rating: 4 out of 5 stars4/5Principle-Centered Leadership Rating: 4 out of 5 stars4/5Radical Candor: Be a Kick-Ass Boss Without Losing Your Humanity Rating: 4 out of 5 stars4/5Radical Candor: Fully Revised & Updated Edition: Be a Kick-Ass Boss Without Losing Your Humanity Rating: 4 out of 5 stars4/5The Innovator's Dilemma: When New Technologies Cause Great Firms to Fail Rating: 5 out of 5 stars5/5The New One Minute Manager Rating: 5 out of 5 stars5/525 Ways to Win with People: How to Make Others Feel Like a Million Bucks Rating: 5 out of 5 stars5/5The Authentic Leader: Five Essential Traits of Effective, Inspiring Leaders Rating: 4 out of 5 stars4/5The 4 Disciplines of Execution: Revised and Updated: Achieving Your Wildly Important Goals Rating: 5 out of 5 stars5/5The Anxious Achiever: Turn Your Biggest Fears into Your Leadership Superpower Rating: 4 out of 5 stars4/5The Effective Executive: The Definitive Guide to Getting the Right Things Done Rating: 4 out of 5 stars4/5Multipliers, Revised and Updated: How the Best Leaders Make Everyone Smarter Rating: 5 out of 5 stars5/5Spark: How to Lead Yourself and Others to Greater Success Rating: 5 out of 5 stars5/5Boundaries for Leaders: Results, Relationships, and Being Ridiculously In Charge Rating: 5 out of 5 stars5/5How to Talk to Anyone at Work: 72 Little Tricks for Big Success Communicating on the Job Rating: 5 out of 5 stars5/5Finance Secrets of Billion-Dollar Entrepreneurs: Venture Finance Without Venture Capital Rating: 4 out of 5 stars4/5Developing the Leader Within You 2.0 Rating: 5 out of 5 stars5/5
Reviews for Keeping the Barbarians Out
0 ratings0 reviews