000 | 03716nam a2200469 i 4500 | ||
---|---|---|---|
001 | 9781951527518 | ||
003 | BEP | ||
005 | 20240726104619.0 | ||
008 | 190417s2020 nyua fo 001 0 eng d | ||
020 | _a9781951527518 | ||
040 |
_aCaBNVSL _beng _erda _cCaBNVSL _dCaBNVSL |
||
050 | 0 | 4 |
_aHD _b.B875 2020 |
100 | 1 |
_aKissinger, Bryan C., _e1 |
|
245 | 1 | 0 |
_aThe business-minded chief information security officer : _bhow to organize, evangelize, and operate an enterprise-wide IT risk management program / _cBryan C. Kissinger. |
250 | _aFirst edition. | ||
260 |
_aNew York, New York (222 East 46th Street, New York, NY 10017) : _bBusiness Expert Press, _c(c)2020. |
||
300 |
_a1 online resource (128 pages) : _billustrations (some color) |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_adata file _2rda |
||
490 | 1 | _aBusiness law and corporate risk management collection, | |
505 | 0 | 0 |
_aChapter 1. Before you take the job -- _tChapter 2. First 90 days on the job -- _tChapter 3. Organize your program -- _tChapter 4. Evangelize your program -- _tChapter 5. Operate your program. |
520 | 3 | _aInformation technology (IT) risk and information security management are top of mind for corporate boards and senior business leaders. Continued intensity of cyber terrorism attacks, regulatory and compliance requirements, and customer privacy concerns are driving the need for a business-minded chief information security officer (CISO) to lead organizational efforts to protect critical infrastructure and sensitive data. While most CISOs report administratively to the chief information officer (CIO), there is a growing realization that this key leadership role requires an individual with both strong technical experience and businessacumen. A CISO must be able to both develop a practical program aligned with overall business goals and objectives and evangelize this plan with key stakeholders across the organization. The modern CISO cannot sit in a bunker somewhere in the IT operations center and expect to achieve buy-in and support for the activities required to operate a program. This book describes the thought process and specific activities a leader should consider as they interview for the IT risk/information security leader role, what they should do within their first 90 days, and how to organize, evangelize, and operate the program once they are into the job. It provides practical, tested strategies for designing your program and guidance to help you be successful long term. It is chock full of examples, case studies, and diagrams right out of real corporate information security programs. The Business-Minded Chief Information Security Officer is a handbook for success as you begin this important position within any company. | |
538 | _aMode of access: World Wide Web. | ||
538 | _aSystem requirements: Adobe Acrobat reader. | ||
588 | _aDescription based on PDF viewed 03/09/2020. | ||
650 | 0 | _aChief information officers. | |
650 | 0 | _aComputer security. | |
650 | 0 |
_aManagement information systems _xSecurity measures. |
|
653 | _aInformation security. | ||
653 | _aCyber security. | ||
653 | _aInformation risk. | ||
653 | _aCISO. | ||
653 | _aChief information security officer. | ||
653 | _aBusiness-minded. | ||
653 | _aIT. | ||
653 | _aMaturity. | ||
655 | 0 | _aElectronic books. | |
856 | 4 | 1 |
_uhttps://go.openathens.net/redirector/ciu.edu?url=https://portal.igpublish.com/iglibrary/search/BEPB0000960.html _zClick here to access this RESOURCE ONLINE | Login using your my.ciu username & password |
942 |
_m2020 _c1 _hHD. _i2021-2022 _dCynthia Snell |
||
999 |
_c72819 _d72819 |
||
902 |
_a1 _bCynthia Snell _c1 _dCynthia Snell |