The business-minded chief information security officer : (Record no. 73468)

MARC details
000 -LEADER
fixed length control field 03849nam a2200493 i 4500
001 - CONTROL NUMBER
control field 9781951527518
003 - CONTROL NUMBER IDENTIFIER
control field BEP
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240726104636.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 190417s2020 nyua fo 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781951527518
Qualifying information
040 ## - CATALOGING SOURCE
Original cataloging agency CaBNVSL
Language of cataloging eng
Description conventions rda
Transcribing agency CaBNVSL
Modifying agency CaBNVSL
050 04 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HD30
Item number .B875 2020
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Kissinger, Bryan C.,
Relator term Author
245 10 - TITLE STATEMENT
Title The business-minded chief information security officer :
Remainder of title how to organize, evangelize, and operate an enterprise-wide IT risk management program /
Statement of responsibility, etc. Bryan C. Kissinger.
250 ## - EDITION STATEMENT
Edition statement First edition.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. New York, New York (222 East 46th Street, New York, NY 10017) :
Name of publisher, distributor, etc. Business Expert Press,
Date of publication, distribution, etc. (c)2020.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (128 pages) :
Other physical details illustrations (some color)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type data file
Source rda
490 1# - SERIES STATEMENT
Series statement Business law and corporate risk management collection,
505 00 - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1. Before you take the job --
Title Chapter 2. First 90 days on the job --
-- Chapter 3. Organize your program --
-- Chapter 4. Evangelize your program --
-- Chapter 5. Operate your program.
520 3# - SUMMARY, ETC.
Summary, etc. Information technology (IT) risk and information security management are top of mind for corporate boards and senior business leaders. Continued intensity of cyber terrorism attacks, regulatory and compliance requirements, and customer privacy concerns are driving the need for a business-minded chief information security officer (CISO) to lead organizational efforts to protect critical infrastructure and sensitive data. While most CISOs report administratively to the chief information officer (CIO), there is a growing realization that this key leadership role requires an individual with both strong technical experience and businessacumen. A CISO must be able to both develop a practical program aligned with overall business goals and objectives and evangelize this plan with key stakeholders across the organization. The modern CISO cannot sit in a bunker somewhere in the IT operations center and expect to achieve buy-in and support for the activities required to operate a program. This book describes the thought process and specific activities a leader should consider as they interview for the IT risk/information security leader role, what they should do within their first 90 days, and how to organize, evangelize, and operate the program once they are into the job. It provides practical, tested strategies for designing your program and guidance to help you be successful long term. It is chock full of examples, case studies, and diagrams right out of real corporate information security programs. The Business-Minded Chief Information Security Officer is a handbook for success as you begin this important position within any company.
530 ## - COPYRIGHT INFORMATION:
COPYRIGHT INFORMATION COPYRIGHT NOT covered - Click this link to request copyright permission:
Uniform Resource Identifier <a href="b">b</a>
530 ## - COPYRIGHT INFORMATION:
COPYRIGHT INFORMATION
538 ## - SYSTEM DETAILS NOTE
System details note Mode of access: World Wide Web.
538 ## - SYSTEM DETAILS NOTE
System details note System requirements: Adobe Acrobat reader.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on PDF viewed 03/09/2020.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Chief information officers.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Management information systems
General subdivision Security measures.
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Information security.
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Cyber security.
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Information risk.
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term CISO.
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Chief information security officer.
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Business-minded.
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term IT.
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Maturity.
655 #0 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
856 41 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://go.openathens.net/redirector/ciu.edu?url=https://portal.igpublish.com/iglibrary/search/BEPB0000960.html">https://go.openathens.net/redirector/ciu.edu?url=https://portal.igpublish.com/iglibrary/search/BEPB0000960.html</a>
-- Click here to access this RESOURCE ONLINE | Login using your my.ciu username & password
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type
DONATED BY:
VENDOR Business Expert Press
Classification part HD30.2
PUBLICATION YEAR (c)2020
LOCATION
REQUESTED BY:
--
-- NFIC
-- Cynthia Snell
902 ## - LOCAL DATA ELEMENT B, LDB (RLIN)
a 1
b Cynthia Snell
c 1
d Cynthia Snell
Holdings
Withdrawn status Lost status Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Uniform Resource Identifier Price effective from Koha item type
        Non-fiction G. Allen Fleece Library G. Allen Fleece Library   03/20/2023 Business Expert Press   HD30.2 9781951527518 03/20/2023 https://go.openathens.net/redirector/ciu.edu?url=https://portal.igpublish.com/iglibrary/search/BEPB0000960.html 03/20/2023 Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD)