Audiobook9 hours
Cybersecurity Program Development for Business: The Essential Planning Guide
Written by Chris Moschovitis
Narrated by Sean Pratt
Rating: 5 out of 5 stars
5/5
()
About this audiobook
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need; to core risk management principles; to threats, tools, roles, and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. From beginning to end, it's a thorough overview, but it can also function as a useful reference book as individual questions and difficulties arise.
- Unlike other cybersecurity books, the text is not bogged down with industry jargon
- Speaks specifically to the executive who is not familiar with the development or implementation of cybersecurity programs
- Shows you how to make pragmatic, rational, and informed decisions for your organization
- Written by a top-flight technologist with decades of experience and a track record of success
If you're a business manager or executive who needs to make sense of cybersecurity, this book demystifies it for you.
- Unlike other cybersecurity books, the text is not bogged down with industry jargon
- Speaks specifically to the executive who is not familiar with the development or implementation of cybersecurity programs
- Shows you how to make pragmatic, rational, and informed decisions for your organization
- Written by a top-flight technologist with decades of experience and a track record of success
If you're a business manager or executive who needs to make sense of cybersecurity, this book demystifies it for you.
Related to Cybersecurity Program Development for Business
Related audiobooks
Facing Cyber Threats Head On: Protecting Yourself and Your Business Rating: 5 out of 5 stars5/5Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Rating: 5 out of 5 stars5/5Hacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 4 out of 5 stars4/5Navigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-Suite Rating: 5 out of 5 stars5/5The Art of Attack: Attacker Mindset for Security Professionals Rating: 5 out of 5 stars5/5The Pentester BluePrint: Starting a Career as an Ethical Hacker Rating: 5 out of 5 stars5/5The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Rating: 5 out of 5 stars5/5CYBERSECURITY FOR BEGINNERS: HOW TO DEFEND AGAINST HACKERS & MALWARE Rating: 4 out of 5 stars4/58 Steps to Better Security: A Simple Cyber Resilience Guide for Business Rating: 4 out of 5 stars4/5Cryptography: The Key to Digital Security, How It Works, and Why It Matters Rating: 5 out of 5 stars5/5Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Rating: 4 out of 5 stars4/5Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit Rating: 0 out of 5 stars0 ratingsCybersecurity For Dummies Rating: 4 out of 5 stars4/5The CISO Evolution: Business Knowledge for Cybersecurity Executives Rating: 5 out of 5 stars5/5HACKING: Denial of Service Attacks Rating: 4 out of 5 stars4/5HACKING: How to Hack Web Apps Rating: 5 out of 5 stars5/5Project Zero Trust: A Story about a Strategy for Aligning Security and the Business Rating: 5 out of 5 stars5/5We Have Root: Even More Advice from Schneier on Security Rating: 5 out of 5 stars5/5HACKING: Hacking Firewalls & Bypassing Honeypots Rating: 5 out of 5 stars5/5Cybersecurity Career Master Plan: Proven techniques and effective tips to help you advance in your cybersecurity career Rating: 0 out of 5 stars0 ratingsHACKING: Social Engineering Attacks, Techniques & Prevention Rating: 5 out of 5 stars5/5What is the Dark Web?: The truth about the hidden part of the internet Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking 2nd Edition Rating: 5 out of 5 stars5/5The Personal Cybersecurity Manual: How Anyone Can Protect Themselves from Fraud, Identity Theft, and Other Cybercrimes Rating: 0 out of 5 stars0 ratingsProtecting Your Internet Identity: Are You Naked Online? Rating: 0 out of 5 stars0 ratingsIf It's Smart, It's Vulnerable Rating: 4 out of 5 stars4/5Cyber Privacy: Who Has Your Data and Why You Should Care Rating: 2 out of 5 stars2/5Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails Rating: 4 out of 5 stars4/5Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity Rating: 5 out of 5 stars5/5
Business For You
The Millionaire Next Door: The Surprising Secrets Of Americas Wealthy Rating: 5 out of 5 stars5/5Rich Dad Poor Dad: What The Rich Teach Their Kids About Money - That the Poor and Middle Class Do Not! Rating: 5 out of 5 stars5/5The Charisma Myth: How Anyone Can Master the Art and Science of Personal Magnetism (Intl Ed) Rating: 5 out of 5 stars5/5Think Faster, Talk Smarter: How to Speak Successfully When You're Put on the Spot Rating: 4 out of 5 stars4/5How to Manage Your Money When You Don't Have Any Rating: 4 out of 5 stars4/5The Energy Bus: 10 Rules to Fuel Your Life, Work, and Team with Positive Energy Rating: 5 out of 5 stars5/5Becoming Bulletproof: Protect Yourself, Read People, Influence Situations, and Live Fearlessly Rating: 5 out of 5 stars5/5Manage Your Day-to-Day: Build Your Routine, Find Your Focus, and Sharpen Your Creative Mind Rating: 4 out of 5 stars4/5How To Win Friends And Influence People Rating: 4 out of 5 stars4/5You Will Own Nothing: Your War with a New Financial World Order and How to Fight Back Rating: 4 out of 5 stars4/5The TenX Rule: The Only Difference Between Success and Failure Rating: 5 out of 5 stars5/5The Sociopath Next Door: The Ruthless Versus the Rest of Us Rating: 4 out of 5 stars4/5Extreme Ownership: How U.S. Navy SEALs Lead and Win Rating: 5 out of 5 stars5/5Elon Musk Rating: 5 out of 5 stars5/5Your Next Five Moves: Master the Art of Business Strategy Rating: 5 out of 5 stars5/5Algorithms to Live By: The Computer Science of Human Decisions Rating: 4 out of 5 stars4/5Principles for Dealing with the Changing World Order: Why Nations Succeed or Fail Rating: 5 out of 5 stars5/5Seeing What Others Don't: The Remarkable Ways We Gain Insights Rating: 4 out of 5 stars4/5The End of the World is Just the Beginning: Mapping the Collapse of Globalization Rating: 5 out of 5 stars5/5The Art of Happiness: A Handbook for Living Rating: 4 out of 5 stars4/5Getting Things Done: The Art of Stress-Free Productivity Rating: 4 out of 5 stars4/5Win Every Argument: The Art of Debating, Persuading, and Public Speaking Rating: 5 out of 5 stars5/5Factfulness: Ten Reasons We're Wrong About the World--and Why Things Are Better Than You Think Rating: 4 out of 5 stars4/5The New One Minute Manager Rating: 5 out of 5 stars5/5The Hard Thing About Hard Things: Building a Business When There Are No Easy Answers Rating: 5 out of 5 stars5/5Essentialism by Greg McKeown - Book Summary: The Disciplined Pursuit of Less Rating: 5 out of 5 stars5/5The Critical Moments: Navigating Power Plays, Outbursts, Ultimatums, and More Rating: 4 out of 5 stars4/5High Conflict: Why We Get Trapped and How We Get Out Rating: 5 out of 5 stars5/5How To Lie With Statistics Rating: 4 out of 5 stars4/5
Reviews for Cybersecurity Program Development for Business
Rating: 4.8 out of 5 stars
5/5
15 ratings0 reviews