Audiobook7 hours
See Yourself in Cyber: Security Careers Beyond Hacking
Written by Ed Adams
Narrated by Rich Miller
Rating: 0 out of 5 stars
()
About this audiobook
In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organization-inhabiting a variety of roles not traditionally associated with cybersecurity-can contribute to improving its cybersecurity backbone. You'll discover how developers, DevOps professionals, managers, and others can strengthen your cybersecurity. You'll also find out how improving your firm's diversity and inclusion can have dramatically positive effects on your team's talent.
Using the familiar analogy of the color wheel, the author explains the modern roles and responsibilities of practitioners who operate within each "slice." He also includes: real-world examples and case studies that demonstrate the application of the ideas discussed; interviews with established industry leaders in a variety of disciplines explaining what non-security professionals can do to improve cybersecurity; and actionable strategies and specific methodologies for professionals working in several different fields interested in meeting their cybersecurity obligations. Perfect for managers, directors, executives, and other business leaders, See Yourself in Cyber: Security Careers Beyond Hacking is also ideal for policymakers, regulators, and compliance professionals.
Using the familiar analogy of the color wheel, the author explains the modern roles and responsibilities of practitioners who operate within each "slice." He also includes: real-world examples and case studies that demonstrate the application of the ideas discussed; interviews with established industry leaders in a variety of disciplines explaining what non-security professionals can do to improve cybersecurity; and actionable strategies and specific methodologies for professionals working in several different fields interested in meeting their cybersecurity obligations. Perfect for managers, directors, executives, and other business leaders, See Yourself in Cyber: Security Careers Beyond Hacking is also ideal for policymakers, regulators, and compliance professionals.
Related to See Yourself in Cyber
Related audiobooks
The DevSecOps Playbook: Deliver Continuous Security at Speed Rating: 0 out of 5 stars0 ratingsRethinking IT Security: What Needs to Be Said — How Can We Solve the IT Security Problem Long Term? Rating: 0 out of 5 stars0 ratingsThe CISO Evolution: Business Knowledge for Cybersecurity Executives Rating: 5 out of 5 stars5/5A Leader's Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Rating: 0 out of 5 stars0 ratingsCybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsSecurity Chaos Engineering: Sustaining Resilience in Software and Systems Rating: 0 out of 5 stars0 ratingsNIST Cloud Security: Cyber Threats, Policies, And Best Practices Rating: 5 out of 5 stars5/5Cyber Security: Essential principles to secure your organisation Rating: 5 out of 5 stars5/5Building a Cyber Risk Management Program: Evolving Security for the Digital Age Rating: 0 out of 5 stars0 ratingsCybersecurity Handbook for Small to Mid-size Businesses Rating: 0 out of 5 stars0 ratingsKey Security Concepts that all CISOs Should Know-Cyber Guardians: A CISO’s Guide to Protecting the Digital World Rating: 0 out of 5 stars0 ratingsHow Cyber Security Can Protect Your Business: A guide for all stakeholders Rating: 0 out of 5 stars0 ratingsThe Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks Rating: 0 out of 5 stars0 ratingsStart-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit Rating: 0 out of 5 stars0 ratingsIt Depends: Writing on Technology Leadership 2012-2022 Rating: 0 out of 5 stars0 ratingsHow to Measure Anything in Cybersecurity Risk, 2nd Edition Rating: 0 out of 5 stars0 ratingsHacking For Dummies, 7th Edition Rating: 5 out of 5 stars5/5Red Team Operations: Attack: Black Box Hacking, Social Engineering & Web App Scanning Rating: 5 out of 5 stars5/5Gray Hat: Vulnerability Scanning & Penetration Testing Rating: 0 out of 5 stars0 ratingsEnterprise Artificial Intelligence Transformation Rating: 5 out of 5 stars5/5The Ransomware Threat Landscape: Prepare for, recognise and survive ransomware attacks Rating: 0 out of 5 stars0 ratingsHOW TO IMPLEMENT ARTIFICIAL INTELLIGENCE AND CYBERSECURITY IN MODERN BUSINESSES: BASICS AND GUIDES FOR DUMMIES AND BEGINNERS Rating: 0 out of 5 stars0 ratingsSoftware Development Fundamentals Rating: 5 out of 5 stars5/5Governance in the Digital Age: A Guide for the Modern Corporate Board Director Rating: 0 out of 5 stars0 ratingsOWASP Top 10 Vulnerabilities: Beginner's Guide To Web Application Security Risks Rating: 0 out of 5 stars0 ratingsDuty of Care: An Executive Guide for Corporate Boards in the Digital Era Rating: 4 out of 5 stars4/5Lean Enterprise: How High Performance Organizations Innovate at Scale Rating: 5 out of 5 stars5/5
Security For You
Certified Information Security Manager CISM Study Guide Rating: 0 out of 5 stars0 ratingsCybersecurity For Dummies Rating: 4 out of 5 stars4/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Rating: 5 out of 5 stars5/5CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) Rating: 5 out of 5 stars5/5Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 Rating: 0 out of 5 stars0 ratingsCompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Project Zero Trust: A Story about a Strategy for Aligning Security and the Business Rating: 5 out of 5 stars5/5Hacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 4 out of 5 stars4/5Social Engineering: The Art of Human Hacking Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking 2nd Edition Rating: 5 out of 5 stars5/5Cybersecurity First Principles: A Reboot of Strategy and Tactics Rating: 5 out of 5 stars5/5Cybersecurity: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5Governance of Enterprise IT based on COBIT 5: A Management Guide Rating: 0 out of 5 stars0 ratingsThe Art of Deception: Controlling the Human Element of Security Rating: 4 out of 5 stars4/5Darknet: A Beginner's Guide to Staying Anonymous Online Rating: 5 out of 5 stars5/5Tor Darknet Bundle (5 in 1): Master the Art of Invisibility Rating: 5 out of 5 stars5/5A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Rating: 4 out of 5 stars4/5Hackers & Painters: Big Ideas from the Computer Age Rating: 4 out of 5 stars4/5Through the Firewall: The Alchemy of Turning Crisis into Opportunity Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Rating: 4 out of 5 stars4/5The Wires of War: Technology and the Global Struggle for Power Rating: 4 out of 5 stars4/5Cybersecurity and Cyberwar: What Everyone Needs to Know Rating: 4 out of 5 stars4/5Bitcoin for Beginners & Dummies: Cryptocurrency & Blockchain Rating: 4 out of 5 stars4/5
Reviews for See Yourself in Cyber
Rating: 0 out of 5 stars
0 ratings
0 ratings0 reviews