000 04109nam a2200601 i 4500
001 9781951527518
003 BEP
005 20241023114919.0
006 m eo d
007 cr cn |||m|||a
008 190417s2020 nyua fo 001 0 eng d
020 _a9781951527518
_qe-book
035 _a(OCoLC)1144095061
035 _a(CaBNVSL)slc00000345
040 _aCaBNVSL
_beng
_erda
_cCaBNVSL
_dCaBNVSL
050 4 _aHD30.2
100 1 _aKissinger, Bryan C.,
_eauthor.
245 1 4 _aThe business-minded chief information security officer :
_bhow to organize, evangelize, and operate an enterprise-wide IT risk management program /
_cBryan C. Kissinger.
250 _aFirst edition.
264 1 _aNew York, New York (222 East 46th Street, New York, NY 10017) :
_bBusiness Expert Press,
_c[(c)2020.]
300 _a1 online resource (128 pages) :
_billustrations (some color)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _adata file
_2rda
490 1 _aBusiness law and corporate risk management collection,
_x2333-6730
500 _aIncludes index.
505 0 _aChapter 1. Before you take the job --
_tChapter 2. First 90 days on the job --
_tChapter 3. Organize your program --
_tChapter 4. Evangelize your program --
_tChapter 5. Operate your program.
506 _aAccess restricted to authorized users and institutions.
520 3 _aInformation technology (IT) risk and information security management are top of mind for corporate boards and senior business leaders. Continued intensity of cyber terrorism attacks, regulatory and compliance requirements, and customer privacy concerns are driving the need for a business-minded chief information security officer (CISO) to lead organizational efforts to protect critical infrastructure and sensitive data. While most CISOs report administratively to the chief information officer (CIO), there is a growing realization that this key leadership role requires an individual with both strong technical experience and businessacumen. A CISO must be able to both develop a practical program aligned with overall business goals and objectives and evangelize this plan with key stakeholders across the organization. The modern CISO cannot sit in a bunker somewhere in the IT operations center and expect to achieve buy-in and support for the activities required to operate a program. This book describes the thought process and specific activities a leader should consider as they interview for the IT risk/information security leader role, what they should do within their first 90 days, and how to organize, evangelize, and operate the program once they are into the job. It provides practical, tested strategies for designing your program and guidance to help you be successful long term. It is chock full of examples, case studies, and diagrams right out of real corporate information security programs. The Business-Minded Chief Information Security Officer is a handbook for success as you begin this important position within any company.
530 _a2
_ub
530 _aAlso available in printing.
538 _aMode of access: World Wide Web.
538 _aSystem requirements: Adobe Acrobat reader.
588 _aDescription based on PDF viewed 03/09/2020.
650 0 _aChief information officers.
650 0 _aComputer security.
650 0 _aManagement information systems
_xSecurity measures.
653 _aInformation security.
653 _aCyber security.
653 _aInformation risk.
653 _aCISO.
653 _aChief information security officer.
653 _aBusiness-minded.
653 _aIT.
653 _aMaturity.
655 0 _a[genre]
655 0 _aElectronic books.
776 0 8 _iPrint version:
_z9781951527501
830 0 _aBusiness law and corporate risk management collection.
_x2333-6730
856 4 0 _uhttps://go.openathens.net/redirector/ciu.edu?url=https://portal.igpublish.com/iglibrary/search/BEPB0000960.html
942 _2lcc
_bCIU
_cOB
_eBEP
_QOL
_zBEP9781951527518
999 _c73468
_d73468
902 _c1
_dCynthia Snell