Cybersecurity leadership demystified: a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Birmingham
Packt Publishing
2022
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Print on demand edition |
Beschreibung: | xx, 252 Seiten Illustrationen, Diagramme |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV048205645 | ||
003 | DE-604 | ||
005 | 20220628 | ||
007 | t | ||
008 | 220509s2022 a||| |||| 00||| eng d | ||
015 | |a GBC1I9934 |2 dnb | ||
020 | |z 9781801819282 |9 978-1-80181-928-2 | ||
020 | |z 1801819289 |9 1-80181-928-9 | ||
035 | |a (OCoLC)1334035234 | ||
035 | |a (DE-599)BVBBV048205645 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-739 | ||
084 | |a SR 860 |0 (DE-625)143367: |2 rvk | ||
100 | 1 | |a Ozkaya, Erdal |e Verfasser |0 (DE-588)1191303470 |4 aut | |
245 | 1 | 0 | |a Cybersecurity leadership demystified |b a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO |c Dr. Erdal Ozkaya |
264 | 1 | |a Birmingham |b Packt Publishing |c 2022 | |
300 | |a xx, 252 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Print on demand edition | ||
650 | 4 | |a Computer security / Management | |
650 | 4 | |a Data protection | |
650 | 4 | |a Sécurité informatique / Gestion | |
650 | 4 | |a Protection de l'information (Informatique) | |
650 | 7 | |a Computer security / Management |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Technologiemanagement |0 (DE-588)4215161-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Technologiemanagement |0 (DE-588)4215161-2 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i ebook version |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=033586551&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-033586551 |
Datensatz im Suchindex
_version_ | 1804183974078054400 |
---|---|
adam_text | Table of Contents Preface A CISO s Role in Security Leadership Defining a CISO and their responsibilities Definition of a CISO Responsibilities of a CISO What exactly is a CISO? Understanding the similarities and differences between a CISO and a CSO Distinguishing between a CIO, a CTO, and a CISO Designing a security leadership role 2 Expanding the role of a CISO The changing role of a CISO 2 Howto become a CISO 3 4 CISO responsibilities Who should not become a CISO? 8 8 9 11 11 Learning about CISO certification 12 5 _ EC-Council CISO program CCISO program Other certifications 12 13 13 7 Summary Further reading 14 14 Internal staff policies Other company policies 18 18 Leading auditing and compliance initiatives 19 6 2 End-to-End Security Operations Evaluating the IT threat landscape 16 Knowledge of company operations Assessment tools Trends in cyber threats 16 16 17 Devising policies and controls to reduce risk 17 Anti-malware and anti-spyware software 19 Compliance with international regulations 20
x Table of Contents Examples of regulations and regulatory bodies 20 Managing information security initiatives 21 Strategic security planning The hiring of a security team 21 22 Establishing partnerships with vendors and security experts 22 Establishing partnerships 23 Security experts as a knowledge resource System security evaluation tools Creating long-term working relationships with vendors Establishing clear communication channels Customer advisory groups 25 25 Summary Further reading 26 26 Getting to know the EFTA 46 History of the EFTA The EFTA requirements for service providers 47 Introducing COPPA 48 COPPA violations COPPA compliance 49 50 23 24 24 З Compliance and Regulations Defining data compliance Understanding GDPR 30 32 The history of GDPR GDPR key definitions GDRP data protection principles The CISO role in GDPR 32 33 34 35 Learning about HIPAA 36 Privacy rule Right to access PHI Potential risks The three HIPAA rules 36 37 38 38 Introducing the CCPA 40 What does the CCPA entail? The CCPA rights Personal information Failure to comply with the CCPA 41 41 42 42 Understanding the HITECH Act 43 Important HITECH amendments and provisions Goals of the HITECH Act 44 45 47 Learning about Sarbanes-Oxley 51 History of the Sarbanes-Oxley Act 51 Key provisions of the Sarbanes-Oxley Act 52 Understanding FISMA 53 Reasons for creating FISMA FISMA compliance FISMA non-compliance penalties 53 53 54 Finding out about PIPEDA Understanding IT compliance and the CISO s role Summary Further reading 55 56 56 57
Table of Contents xi 4 Role of HR in Security Understanding security posture 60 Security posture features IT assets inventory Security controls Attack vectors Attack surface Automating the security posture Ways of improving an organization s security posture Assessing an organization s security posture Important steps in security posture assessment 63 Exploring human error and its impact on organizations 65 Preventing insider security threats 66 Hiring procedures 67 60 61 61 61 62 62 62 63 Performing verification checks for job candidates 68 Security education and training 68 Security risk awareness 69 Organizational culture 69 Policies for IAM 70 General safety procedures Tl Employment procedures 73 Vendors, contractors, and consultants 74 - procedures Tight hiring practices 74 Using strong authentication mechanisms75 Securing internet access 75 Investigating anomalous activities 75 Refocusing perimeter strategies and tools 76 Monitoring misuse of assets 76 Summary Further reading 76 77 □ How Documentation Contributes to Security Why information system documentation for security is important What is information security documentation? Why document? Approving the security documentation Maintaining the security documentation Communicating the security documentation ISO 27001 85 80 Describing some examples of cybersecurity documents 86 80 82 84 84 Information security policy (ISP) Incident management plan (IMP) Risk management Disaster recovery (DR) and the business continuity plan (BCP) 90 84 Tips for better security Building a cyber strategy plan 92 93 Understanding
compliance with documentation 85 86 87 87
xii Table of Contents Why do we need to build a cyber strategy? Howto build a cyber strategy Best cyber-attack strategies Best cyber defense strategies 94 95 98 Summary Further reading 99 102 103 6 Disaster Recovery and Business Continuity Integrating cybersecurity with a DPP BIA Classification of data DRaaS User training and education 107 107 108 109 Learning about supply chain continuity Introducing the key components of a BC plan Understanding the relationship between cybersecurity and BC 112 How to identify BC risks Types of DR Using Al for DR and BC processes Emerging technologies in the DR and BC landscape Tips on building a strong and effective DR plan Importance of a certified and skilled cybersecurity workforce Planning for ransomware and DoS attacks Using quality backups Summary Further reading Developing a communication plan Automated testing processes Immutable data backups Data reuse Continuous updates Long-term planning 109 110 110 111 111 112 114 114 115 116 116 117 118 119 120 120 121 121 122 В ri ngingSta keholders On Board Evaluating business opportunities versus security risks 124 The role of a CISO in risk management 125 Optimal budgeting Communication Corporate governance Duties of top management in an organization 126 127 127 128 Reporting to the board of directors Getting employees on board Getting customers on board Getting shareholders on board Getting the community on board Summary Further reading 129 130 131 132 133 134 134
Table of Contents xiii 8 Other CISO Tasks Contributing to technical projects Partnering with internal and external providers Security policies implementation Security planning needs resources Role in recruitment Partnering with security tool providers and consultants 136 137 137 138 138 139 Evaluating employee behavior 140 Employee motivation The remuneration and rewarding systems Employee skill level User and entity behavior analytics (UEBA) Financial reporting Addressing cybersecurity as a business problem Summary Further reading 141 141 142 143 144 145 145 141 9 Congratulations! You Are Hired How to get hired as a CISO 148 Qualifications for a CISO job Job experience Communication ability Leadership skills Steps to follow to become a CISO 148 149 149 149 150 The top skills required to succeed as a CISO 151 Your first 90 days as a CISO 153 List of dos in the first 90 days 155 Summary Further reading 158 158 Building a cybersecurity strategy Telling your story Presenting to the board Leadership and team Summary Further reading 166 167 168 169 169 170 10 Security Leadership Developing suitable security policies Communicating cybersecurity issues clearly Getting a bigger budget Leading by example Having training conferences and seminars for employees 163 163 164 165 165
xiv Table of Contents 11 Conclusion Defining the CISO role and what the role entails 172 How a CISO ensures E2E security operations are in place in an organization 172 The compliance factor and how a CISO addresses the issue 173 The role of HR management in cybersecurity issues 173 How documentation plays a huge role in effective security leadership 174 DR and BC factors in cybersecurity 174 Understanding the role of various stakeholders in an organization 175 Other CISO roles in an organization 175 Getting hired as a CISO executive 176 What security leadership entails176 Summary 176 12 Ask the Experts Protecting and defending your organization from cyberattacks - by Marcus Murray 178 Path to becoming a successful CISO - by Adel Abdel Moneim 185 Recommendations for cybersecurity professionals who want to be CISOs - by Mert Sarica 200 How a modern CISO could work on improving security within their organizations and maintain a good cybersecurity posture - by Dr. Mike Jankowski-Lorekand Paula Januszkiewicz 203 Advice for a CISO - by Raif Sarica and Şükrü Durmaz Cybersecurity leadership demystified - Pave your way to becoming a world-class modern-day cybersecurity expert and a global CISO - by Dr. Timothy C. Summers The future of cybersecurity leadership - by Timothy C. Summers, Ph.D. Working with security experts - by Vladimir Meloski 211 216 217 223
Table of Contents xv A CISO s communication with the board on three critical subjects - by Dr. Süleyman Özarslan Crush the triangle - by Raymond Comvalius 229 Index Another Book You May Enjoy 232
|
adam_txt |
Table of Contents Preface A CISO's Role in Security Leadership Defining a CISO and their responsibilities Definition of a CISO Responsibilities of a CISO What exactly is a CISO? Understanding the similarities and differences between a CISO and a CSO Distinguishing between a CIO, a CTO, and a CISO Designing a security leadership role 2 Expanding the role of a CISO The changing role of a CISO 2 Howto become a CISO 3 4 CISO responsibilities Who should not become a CISO? 8 8 9 11 11 Learning about CISO certification 12 5 _ EC-Council CISO program CCISO program Other certifications 12 13 13 7 Summary Further reading 14 14 Internal staff policies Other company policies 18 18 Leading auditing and compliance initiatives 19 6 2 End-to-End Security Operations Evaluating the IT threat landscape 16 Knowledge of company operations Assessment tools Trends in cyber threats 16 16 17 Devising policies and controls to reduce risk 17 Anti-malware and anti-spyware software 19 Compliance with international regulations 20
x Table of Contents Examples of regulations and regulatory bodies 20 Managing information security initiatives 21 Strategic security planning The hiring of a security team 21 22 Establishing partnerships with vendors and security experts 22 Establishing partnerships 23 Security experts as a knowledge resource System security evaluation tools Creating long-term working relationships with vendors Establishing clear communication channels Customer advisory groups 25 25 Summary Further reading 26 26 Getting to know the EFTA 46 History of the EFTA The EFTA requirements for service providers 47 Introducing COPPA 48 COPPA violations COPPA compliance 49 50 23 24 24 З Compliance and Regulations Defining data compliance Understanding GDPR 30 32 The history of GDPR GDPR key definitions GDRP data protection principles The CISO role in GDPR 32 33 34 35 Learning about HIPAA 36 Privacy rule Right to access PHI Potential risks The three HIPAA rules 36 37 38 38 Introducing the CCPA 40 What does the CCPA entail? The CCPA rights Personal information Failure to comply with the CCPA 41 41 42 42 Understanding the HITECH Act 43 Important HITECH amendments and provisions Goals of the HITECH Act 44 45 47 Learning about Sarbanes-Oxley 51 History of the Sarbanes-Oxley Act 51 Key provisions of the Sarbanes-Oxley Act 52 Understanding FISMA 53 Reasons for creating FISMA FISMA compliance FISMA non-compliance penalties 53 53 54 Finding out about PIPEDA Understanding IT compliance and the CISO's role Summary Further reading 55 56 56 57
Table of Contents xi 4 Role of HR in Security Understanding security posture 60 Security posture features IT assets inventory Security controls Attack vectors Attack surface Automating the security posture Ways of improving an organization's security posture Assessing an organization's security posture Important steps in security posture assessment 63 Exploring human error and its impact on organizations 65 Preventing insider security threats 66 Hiring procedures 67 60 61 61 61 62 62 62 63 Performing verification checks for job candidates 68 Security education and training 68 Security risk awareness 69 Organizational culture 69 Policies for IAM 70 General safety procedures Tl Employment procedures 73 Vendors, contractors, and consultants 74 - procedures Tight hiring practices 74 Using strong authentication mechanisms75 Securing internet access 75 Investigating anomalous activities 75 Refocusing perimeter strategies and tools 76 Monitoring misuse of assets 76 Summary Further reading 76 77 □ How Documentation Contributes to Security Why information system documentation for security is important What is information security documentation? Why document? Approving the security documentation Maintaining the security documentation Communicating the security documentation ISO 27001 85 80 Describing some examples of cybersecurity documents 86 80 82 84 84 Information security policy (ISP) Incident management plan (IMP) Risk management Disaster recovery (DR) and the business continuity plan (BCP) 90 84 Tips for better security Building a cyber strategy plan 92 93 Understanding
compliance with documentation 85 86 87 87
xii Table of Contents Why do we need to build a cyber strategy? Howto build a cyber strategy Best cyber-attack strategies Best cyber defense strategies 94 95 98 Summary Further reading 99 102 103 6 Disaster Recovery and Business Continuity Integrating cybersecurity with a DPP BIA Classification of data DRaaS User training and education 107 107 108 109 Learning about supply chain continuity Introducing the key components of a BC plan Understanding the relationship between cybersecurity and BC 112 How to identify BC risks Types of DR Using Al for DR and BC processes Emerging technologies in the DR and BC landscape Tips on building a strong and effective DR plan Importance of a certified and skilled cybersecurity workforce Planning for ransomware and DoS attacks Using quality backups Summary Further reading Developing a communication plan Automated testing processes Immutable data backups Data reuse Continuous updates Long-term planning 109 110 110 111 111 112 114 114 115 116 116 117 118 119 120 120 121 121 122 В ri ngingSta keholders On Board Evaluating business opportunities versus security risks 124 The role of a CISO in risk management 125 Optimal budgeting Communication Corporate governance Duties of top management in an organization 126 127 127 128 Reporting to the board of directors Getting employees on board Getting customers on board Getting shareholders on board Getting the community on board Summary Further reading 129 130 131 132 133 134 134
Table of Contents xiii 8 Other CISO Tasks Contributing to technical projects Partnering with internal and external providers Security policies implementation Security planning needs resources Role in recruitment Partnering with security tool providers and consultants 136 137 137 138 138 139 Evaluating employee behavior 140 Employee motivation The remuneration and rewarding systems Employee skill level User and entity behavior analytics (UEBA) Financial reporting Addressing cybersecurity as a business problem Summary Further reading 141 141 142 143 144 145 145 141 9 Congratulations! You Are Hired How to get hired as a CISO 148 Qualifications for a CISO job Job experience Communication ability Leadership skills Steps to follow to become a CISO 148 149 149 149 150 The top skills required to succeed as a CISO 151 Your first 90 days as a CISO 153 List of dos in the first 90 days 155 Summary Further reading 158 158 Building a cybersecurity strategy Telling your story Presenting to the board Leadership and team Summary Further reading 166 167 168 169 169 170 10 Security Leadership Developing suitable security policies Communicating cybersecurity issues clearly Getting a bigger budget Leading by example Having training conferences and seminars for employees 163 163 164 165 165
xiv Table of Contents 11 Conclusion Defining the CISO role and what the role entails 172 How a CISO ensures E2E security operations are in place in an organization 172 The compliance factor and how a CISO addresses the issue 173 The role of HR management in cybersecurity issues 173 How documentation plays a huge role in effective security leadership 174 DR and BC factors in cybersecurity 174 Understanding the role of various stakeholders in an organization 175 Other CISO roles in an organization 175 Getting hired as a CISO executive 176 What security leadership entails176 Summary 176 12 Ask the Experts Protecting and defending your organization from cyberattacks - by Marcus Murray 178 Path to becoming a successful CISO - by Adel Abdel Moneim 185 Recommendations for cybersecurity professionals who want to be CISOs - by Mert Sarica 200 How a modern CISO could work on improving security within their organizations and maintain a good cybersecurity posture - by Dr. Mike Jankowski-Lorekand Paula Januszkiewicz 203 Advice for a CISO - by Raif Sarica and Şükrü Durmaz Cybersecurity leadership demystified - Pave your way to becoming a world-class modern-day cybersecurity expert and a global CISO - by Dr. Timothy C. Summers The future of cybersecurity leadership - by Timothy C. Summers, Ph.D. Working with security experts - by Vladimir Meloski 211 216 217 223
Table of Contents xv A CISO's communication with the board on three critical subjects - by Dr. Süleyman Özarslan Crush the triangle - by Raymond Comvalius 229 Index Another Book You May Enjoy 232 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Ozkaya, Erdal |
author_GND | (DE-588)1191303470 |
author_facet | Ozkaya, Erdal |
author_role | aut |
author_sort | Ozkaya, Erdal |
author_variant | e o eo |
building | Verbundindex |
bvnumber | BV048205645 |
classification_rvk | SR 860 |
ctrlnum | (OCoLC)1334035234 (DE-599)BVBBV048205645 |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01874nam a2200457 c 4500</leader><controlfield tag="001">BV048205645</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220628 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">220509s2022 a||| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBC1I9934</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781801819282</subfield><subfield code="9">978-1-80181-928-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1801819289</subfield><subfield code="9">1-80181-928-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1334035234</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048205645</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SR 860</subfield><subfield code="0">(DE-625)143367:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ozkaya, Erdal</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1191303470</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity leadership demystified</subfield><subfield code="b">a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO</subfield><subfield code="c">Dr. Erdal Ozkaya</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xx, 252 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print on demand edition</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security / Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique / Gestion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security / Management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Technologiemanagement</subfield><subfield code="0">(DE-588)4215161-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Technologiemanagement</subfield><subfield code="0">(DE-588)4215161-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">ebook version</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=033586551&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033586551</subfield></datafield></record></collection> |
id | DE-604.BV048205645 |
illustrated | Illustrated |
index_date | 2024-07-03T19:47:43Z |
indexdate | 2024-07-10T09:31:58Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033586551 |
oclc_num | 1334035234 |
open_access_boolean | |
owner | DE-739 |
owner_facet | DE-739 |
physical | xx, 252 Seiten Illustrationen, Diagramme |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Packt Publishing |
record_format | marc |
spelling | Ozkaya, Erdal Verfasser (DE-588)1191303470 aut Cybersecurity leadership demystified a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO Dr. Erdal Ozkaya Birmingham Packt Publishing 2022 xx, 252 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Print on demand edition Computer security / Management Data protection Sécurité informatique / Gestion Protection de l'information (Informatique) Computer security / Management fast Data protection fast Computersicherheit (DE-588)4274324-2 gnd rswk-swf Technologiemanagement (DE-588)4215161-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Technologiemanagement (DE-588)4215161-2 s DE-604 ebook version Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=033586551&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Ozkaya, Erdal Cybersecurity leadership demystified a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO Computer security / Management Data protection Sécurité informatique / Gestion Protection de l'information (Informatique) Computer security / Management fast Data protection fast Computersicherheit (DE-588)4274324-2 gnd Technologiemanagement (DE-588)4215161-2 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4215161-2 |
title | Cybersecurity leadership demystified a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO |
title_auth | Cybersecurity leadership demystified a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO |
title_exact_search | Cybersecurity leadership demystified a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO |
title_exact_search_txtP | Cybersecurity leadership demystified a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO |
title_full | Cybersecurity leadership demystified a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO Dr. Erdal Ozkaya |
title_fullStr | Cybersecurity leadership demystified a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO Dr. Erdal Ozkaya |
title_full_unstemmed | Cybersecurity leadership demystified a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO Dr. Erdal Ozkaya |
title_short | Cybersecurity leadership demystified |
title_sort | cybersecurity leadership demystified a comprehensive guide to becoming a world class modern cybersecurity leader and global ciso |
title_sub | a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO |
topic | Computer security / Management Data protection Sécurité informatique / Gestion Protection de l'information (Informatique) Computer security / Management fast Data protection fast Computersicherheit (DE-588)4274324-2 gnd Technologiemanagement (DE-588)4215161-2 gnd |
topic_facet | Computer security / Management Data protection Sécurité informatique / Gestion Protection de l'information (Informatique) Computersicherheit Technologiemanagement |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=033586551&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT ozkayaerdal cybersecurityleadershipdemystifiedacomprehensiveguidetobecomingaworldclassmoderncybersecurityleaderandglobalciso |