The CISO Perspective: Understand the importance of the CISO in the cyber threat landscape
By Barry Kouns and Jake Kouns
()
About this ebook
In this updated edition, the security threat landscape has widened and the challenge for CISOs to be more than just security coordinators has become a mandate for organizational survival. This book challenges and guides information security professionals to think about information security and risk management from the enterprise level, and not just from the IT perspective.
Read this book and understand how:
- The CISO’s role can improve an organization’s cyber strategy.
- An enterprise’s view of information security, business continuity, compliance, safety, and physical security is crucial for the success of your organisation’s cyber security defense.
- Soft skills are crucial in order for the CISO to communicate effectively with the Board and other departments in the organisation.
- Standards such as ISO 27001:2022 can help your organisation implement a suitable ISMS (information security management system).
- Risk management is imperative to identify, analyze, evaluate and protect the organization’s assets.
Barry Kouns
Barry Kouns is a security and risk management expert with over 25 years of experience in information security consulting, risk assessment and quality management. Barry formed and operates SQM-Advisors, an information security, risk assessment and IT service management firm that has led eight organisations to ISO/IEC 27001:2005 certification. He is frequently quoted in magazines and news articles on information security and has held the position of Trainer for the British Standards Institute (BSI). He holds a BS in Statistics and an MS in Industrial Engineering Management. Barry has earned the CISSP designation and is a trained ISO/IEC/27001 Lead Auditor and ISMS Implementer, and is ITIL Foundation certified.
Related to The CISO Perspective
Related ebooks
The Chief Information Security Officer: Insights, tools and survival skills Rating: 1 out of 5 stars1/5Infosec Management Fundamentals Rating: 5 out of 5 stars5/5Nine Steps to Success: An ISO27001:2013 Implementation Overview Rating: 1 out of 5 stars1/5How Cyber Security Can Protect Your Business: A guide for all stakeholders Rating: 0 out of 5 stars0 ratingsOnce more unto the Breach: Managing information security in an uncertain world Rating: 0 out of 5 stars0 ratingsSecurity Leader Insights for Success: Lessons and Strategies from Leading Security Professionals Rating: 0 out of 5 stars0 ratingsFundamentals of Information Security Risk Management Auditing: An introduction for managers and auditors Rating: 5 out of 5 stars5/5The Chief Security Officer’s Handbook: Leading Your Team into the Future Rating: 0 out of 5 stars0 ratingsBecoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders Rating: 5 out of 5 stars5/5Executive's Guide to Cyber Risk: Securing the Future Today Rating: 0 out of 5 stars0 ratingsCyber Security: The complete guide to cyber threats and protection Rating: 0 out of 5 stars0 ratingsInformation Security for Small and Midsized Businesses Rating: 0 out of 5 stars0 ratingsBuilding an Effective Cybersecurity Program, 2nd Edition Rating: 0 out of 5 stars0 ratingsGovernance and Internal Controls for Cutting Edge IT Rating: 0 out of 5 stars0 ratingsMeasures and Metrics in Corporate Security Rating: 0 out of 5 stars0 ratingsFight Fire with Fire: Proactive Cybersecurity Strategies for Today's Leaders Rating: 0 out of 5 stars0 ratingsThe Protective Circle: A Comprehensive Framework for Executive Protection Excellence Rating: 0 out of 5 stars0 ratingsApplication security in the ISO27001:2013 Environment Rating: 4 out of 5 stars4/5The CISO’s Transformation: Security Leadership in a High Threat Landscape Rating: 0 out of 5 stars0 ratingsCorporate Security Management: Challenges, Risks, and Strategies Rating: 5 out of 5 stars5/5Application Security in the ISO27001 Environment Rating: 0 out of 5 stars0 ratingsCybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5A Practitioner's Guide to Adapting the NIST Cybersecurity Framework Rating: 0 out of 5 stars0 ratingsSecurity Leader Insights for Information Protection: Lessons and Strategies from Leading Security Professionals Rating: 0 out of 5 stars0 ratingsThe Future and Opportunities of Cybersecurity in the Workforce Rating: 3 out of 5 stars3/5Information Security Breaches: Avoidance and Treatment based on ISO27001 Rating: 0 out of 5 stars0 ratingsCyber Guardians: Empowering Board Members for Effective Cybersecurity Rating: 0 out of 5 stars0 ratings
Law For You
Critical Race Theory: The Cutting Edge Rating: 4 out of 5 stars4/5No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State Rating: 4 out of 5 stars4/5Trans: When Ideology Meets Reality Rating: 3 out of 5 stars3/5Legal Words You Should Know: Over 1,000 Essential Terms to Understand Contracts, Wills, and the Legal System Rating: 4 out of 5 stars4/58 Living Trust Forms: Legal Self-Help Guide Rating: 5 out of 5 stars5/5Win Your Case: How to Present, Persuade, and Prevail--Every Place, Every Time Rating: 5 out of 5 stars5/5The Everything Guide To Being A Paralegal: Winning Secrets to a Successful Career! Rating: 5 out of 5 stars5/5Wills and Trusts Kit For Dummies Rating: 5 out of 5 stars5/5The Law Rating: 4 out of 5 stars4/5Estate & Trust Administration For Dummies Rating: 0 out of 5 stars0 ratingsDeath in Mud Lick: A Coal Country Fight against the Drug Companies That Delivered the Opioid Epidemic Rating: 4 out of 5 stars4/5Legal Writing in Plain English: A Text with Exercises Rating: 3 out of 5 stars3/5Law For Dummies Rating: 4 out of 5 stars4/5The ZERO Percent: Secrets of the United States, the Power of Trust, Nationality, Banking and ZERO TAXES! Rating: 5 out of 5 stars5/5The Paralegal's Handbook: A Complete Reference for All Your Daily Tasks Rating: 4 out of 5 stars4/5The Socratic Method: A Practitioner's Handbook Rating: 4 out of 5 stars4/5Criminal Law Rating: 0 out of 5 stars0 ratingsThe LLC and Corporation Start-Up Guide: Your Complete Guide to Launching the Right Business Rating: 5 out of 5 stars5/5Executor's Guide, The: Settling a Loved One's Estate or Trust Rating: 0 out of 5 stars0 ratingsWith Liberty and Justice for Some: How the Law Is Used to Destroy Equality and Protect the Powerful Rating: 4 out of 5 stars4/5Summary of Tom Wheelwright's TaxFree Wealth Rating: 0 out of 5 stars0 ratingsNo Stone Unturned: The True Story of the World's Premier Forensic Investigators Rating: 4 out of 5 stars4/5Secrets of Criminal Defense Rating: 5 out of 5 stars5/5Win In Court Every Time Rating: 5 out of 5 stars5/5How to Think Like a Lawyer--and Why: A Common-Sense Guide to Everyday Dilemmas Rating: 3 out of 5 stars3/5The Everything Executor and Trustee Book: A Step-by-Step Guide to Estate and Trust Administration Rating: 3 out of 5 stars3/5Family Trusts: A Guide for Beneficiaries, Trustees, Trust Protectors, and Trust Creators Rating: 5 out of 5 stars5/5
Reviews for The CISO Perspective
0 ratings0 reviews
Book preview
The CISO Perspective - Barry Kouns
INTRODUCTION
This book is divided into eight chapters designed to introduce you to the CISO position. It discusses the tools used by the most effective CISOs and how current CISOs can grow with the challenges of the position. A brief description of each chapter follows:
Chapter 1: The nature of the CISO role
The CISO is bombarded with new issues on a daily basis, making it one of the most challenging positions in organizations today. CISOs find themselves responsible for the protection of the organization’s information, but often reporting to the CIO who is rewarded for making the organization’s information more readily available to all.
Chapter 2: The traditional CISO job description
The CISO is responsible for overseeing the overall corporate security strategy, security architecture, and security function. The scope of the role traditionally covers all implemented security technologies and services, including security applications, perimeter defenses, physical and logical access control, and access management for all employees, contractors, and visitors.
Chapter 3: The changing CISO role
The experience and skills that made yesterday’s CISO successful no longer meet today’s organizational needs. While being technology savvy is still very much a requirement of the role, today’s CISO must have excellent communication and presentation skills, be able to understand everything within a risk management framework, and demonstrate keen business and financial