The chief information security officer :: insights, tools and survival skills /
Chief Information Security Officers are bombarded with huge challenges every day, from recommending security applications to strategic thinking and business innovation. This guide describes the hard and soft skills that a successful CISO requires: not just a good knowledge of information security, b...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Ely :
IT Governance Pub.,
2011.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Chief Information Security Officers are bombarded with huge challenges every day, from recommending security applications to strategic thinking and business innovation. This guide describes the hard and soft skills that a successful CISO requires: not just a good knowledge of information security, but also attributes such as flexibility and communication skills. |
Beschreibung: | 1 online resource (x, 64 pages) |
Bibliographie: | Includes bibliographical references. |
ISBN: | 9781849281836 1849281831 1849281963 9781849281966 |
Internformat
MARC
LEADER | 00000cam a2200000Mi 4500 | ||
---|---|---|---|
001 | ZDB-4-EBU-ocn726735460 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr |n|---||||| | ||
008 | 110523s2011 enk ob 000 0 eng d | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d OCLCQ |d MHW |d N$T |d OCLCQ |d COO |d OCLCQ |d UMI |d DEBSZ |d JSTOR |d OCLCF |d OCLCQ |d YDXCP |d S4S |d NMC |d OCLCQ |d AGLDB |d MERUC |d OCLCQ |d IOG |d U3W |d OCLCA |d STF |d CEF |d AU@ |d OCLCQ |d WYU |d LVT |d DKC |d OCLCQ |d UKAHL |d VT2 |d OCLCQ |d UX1 |d BRF |d EYM |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d DEGRU |d UEJ |d OCLCO |d OCLCQ | ||
019 | |a 823946663 |a 857076778 |a 884543259 |a 904052556 |a 1058161201 |a 1060198170 |a 1175625933 |a 1179845654 |a 1194858354 | ||
020 | |a 9781849281836 |q (electronic bk.) | ||
020 | |a 1849281831 |q (electronic bk.) | ||
020 | |z 1849281823 | ||
020 | |z 9781849281829 | ||
020 | |z 9781849281966 | ||
020 | |a 1849281963 | ||
020 | |a 9781849281966 | ||
035 | |a (OCoLC)726735460 |z (OCoLC)823946663 |z (OCoLC)857076778 |z (OCoLC)884543259 |z (OCoLC)904052556 |z (OCoLC)1058161201 |z (OCoLC)1060198170 |z (OCoLC)1175625933 |z (OCoLC)1179845654 |z (OCoLC)1194858354 | ||
037 | |a CL0500000270 |b Safari Books Online | ||
037 | |a 22573/ctt4k5ft7 |b JSTOR | ||
043 | |a e-uk--- | ||
050 | 4 | |a HD58.8 | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
072 | 7 | |a COM053000 |2 bisacsh | |
082 | 7 | |a 005.8 | |
049 | |a MAIN | ||
100 | 1 | |a Kouns, Barry. | |
245 | 1 | 4 | |a The chief information security officer : |b insights, tools and survival skills / |c Barry L. Kouns & Jake Kouns. |
260 | |a Ely : |b IT Governance Pub., |c 2011. | ||
300 | |a 1 online resource (x, 64 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
520 | |a Chief Information Security Officers are bombarded with huge challenges every day, from recommending security applications to strategic thinking and business innovation. This guide describes the hard and soft skills that a successful CISO requires: not just a good knowledge of information security, but also attributes such as flexibility and communication skills. | ||
588 | 0 | |a Print version record. | |
504 | |a Includes bibliographical references. | ||
505 | 0 | |a The nature of the CISO role -- The traditional CISO job description -- The changing CISO role -- The new CISO's toolbox -- Risk management -- The inforamtion security management system -- CISO survival -- Summary : you become what you think about. | |
650 | 0 | |a Data protection. |0 http://id.loc.gov/authorities/subjects/sh85035859 | |
650 | 0 | |a Computer security. | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Protection de l'information (Informatique) | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Data protection |2 fast | |
700 | 1 | |a Kouns, Jake. |1 https://id.oclc.org/worldcat/entity/E39PBJymxV67pmFdq3c4HcpF8C |0 http://id.loc.gov/authorities/names/n2008070665 | |
758 | |i has work: |a The chief information security officer (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGHf9VbPdTBtjw4WPPmFmm |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Kouns, Barry. |t Chief information security officer. |d Ely : IT Governance Publishing, ©2011 |z 9781849281829 |w (OCoLC)714721260 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBU |q FWS_PDA_EBU |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=391159 |3 Volltext |
938 | |a De Gruyter |b DEGR |n 9781849281836 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH26134992 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL699181 | ||
938 | |a EBSCOhost |b EBSC |n 391159 | ||
938 | |a YBP Library Services |b YANK |n 6215699 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBU | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBU-ocn726735460 |
---|---|
_version_ | 1816796901377310720 |
adam_text | |
any_adam_object | |
author | Kouns, Barry |
author2 | Kouns, Jake |
author2_role | |
author2_variant | j k jk |
author_GND | http://id.loc.gov/authorities/names/n2008070665 |
author_facet | Kouns, Barry Kouns, Jake |
author_role | |
author_sort | Kouns, Barry |
author_variant | b k bk |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HD58 |
callnumber-raw | HD58.8 |
callnumber-search | HD58.8 |
callnumber-sort | HD 258.8 |
callnumber-subject | HD - Industries, Land Use, Labor |
collection | ZDB-4-EBU |
contents | The nature of the CISO role -- The traditional CISO job description -- The changing CISO role -- The new CISO's toolbox -- Risk management -- The inforamtion security management system -- CISO survival -- Summary : you become what you think about. |
ctrlnum | (OCoLC)726735460 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03911cam a2200709Mi 4500</leader><controlfield tag="001">ZDB-4-EBU-ocn726735460</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |n|---|||||</controlfield><controlfield tag="008">110523s2011 enk ob 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">EBLCP</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">EBLCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MHW</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UMI</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">JSTOR</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">S4S</subfield><subfield code="d">NMC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IOG</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCA</subfield><subfield code="d">STF</subfield><subfield code="d">CEF</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">LVT</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKAHL</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UX1</subfield><subfield code="d">BRF</subfield><subfield code="d">EYM</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">DEGRU</subfield><subfield code="d">UEJ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">823946663</subfield><subfield code="a">857076778</subfield><subfield code="a">884543259</subfield><subfield code="a">904052556</subfield><subfield code="a">1058161201</subfield><subfield code="a">1060198170</subfield><subfield code="a">1175625933</subfield><subfield code="a">1179845654</subfield><subfield code="a">1194858354</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849281836</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849281831</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1849281823</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781849281829</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781849281966</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849281963</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849281966</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)726735460</subfield><subfield code="z">(OCoLC)823946663</subfield><subfield code="z">(OCoLC)857076778</subfield><subfield code="z">(OCoLC)884543259</subfield><subfield code="z">(OCoLC)904052556</subfield><subfield code="z">(OCoLC)1058161201</subfield><subfield code="z">(OCoLC)1060198170</subfield><subfield code="z">(OCoLC)1175625933</subfield><subfield code="z">(OCoLC)1179845654</subfield><subfield code="z">(OCoLC)1194858354</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000270</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">22573/ctt4k5ft7</subfield><subfield code="b">JSTOR</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">e-uk---</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HD58.8</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kouns, Barry.</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The chief information security officer :</subfield><subfield code="b">insights, tools and survival skills /</subfield><subfield code="c">Barry L. Kouns & Jake Kouns.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Ely :</subfield><subfield code="b">IT Governance Pub.,</subfield><subfield code="c">2011.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (x, 64 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Chief Information Security Officers are bombarded with huge challenges every day, from recommending security applications to strategic thinking and business innovation. This guide describes the hard and soft skills that a successful CISO requires: not just a good knowledge of information security, but also attributes such as flexibility and communication skills.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">The nature of the CISO role -- The traditional CISO job description -- The changing CISO role -- The new CISO's toolbox -- Risk management -- The inforamtion security management system -- CISO survival -- Summary : you become what you think about.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85035859</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kouns, Jake.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJymxV67pmFdq3c4HcpF8C</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2008070665</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">The chief information security officer (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGHf9VbPdTBtjw4WPPmFmm</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Kouns, Barry.</subfield><subfield code="t">Chief information security officer.</subfield><subfield code="d">Ely : IT Governance Publishing, ©2011</subfield><subfield code="z">9781849281829</subfield><subfield code="w">(OCoLC)714721260</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBU</subfield><subfield code="q">FWS_PDA_EBU</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=391159</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">De Gruyter</subfield><subfield code="b">DEGR</subfield><subfield code="n">9781849281836</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH26134992</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL699181</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">391159</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">6215699</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBU</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBU-ocn726735460 |
illustrated | Not Illustrated |
indexdate | 2024-11-26T14:49:02Z |
institution | BVB |
isbn | 9781849281836 1849281831 1849281963 9781849281966 |
language | English |
oclc_num | 726735460 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (x, 64 pages) |
psigel | ZDB-4-EBU |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | IT Governance Pub., |
record_format | marc |
spelling | Kouns, Barry. The chief information security officer : insights, tools and survival skills / Barry L. Kouns & Jake Kouns. Ely : IT Governance Pub., 2011. 1 online resource (x, 64 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Chief Information Security Officers are bombarded with huge challenges every day, from recommending security applications to strategic thinking and business innovation. This guide describes the hard and soft skills that a successful CISO requires: not just a good knowledge of information security, but also attributes such as flexibility and communication skills. Print version record. Includes bibliographical references. The nature of the CISO role -- The traditional CISO job description -- The changing CISO role -- The new CISO's toolbox -- Risk management -- The inforamtion security management system -- CISO survival -- Summary : you become what you think about. Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Computer security. Computer Security https://id.nlm.nih.gov/mesh/D016494 Protection de l'information (Informatique) Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Data protection fast Kouns, Jake. https://id.oclc.org/worldcat/entity/E39PBJymxV67pmFdq3c4HcpF8C http://id.loc.gov/authorities/names/n2008070665 has work: The chief information security officer (Text) https://id.oclc.org/worldcat/entity/E39PCGHf9VbPdTBtjw4WPPmFmm https://id.oclc.org/worldcat/ontology/hasWork Print version: Kouns, Barry. Chief information security officer. Ely : IT Governance Publishing, ©2011 9781849281829 (OCoLC)714721260 FWS01 ZDB-4-EBU FWS_PDA_EBU https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=391159 Volltext |
spellingShingle | Kouns, Barry The chief information security officer : insights, tools and survival skills / The nature of the CISO role -- The traditional CISO job description -- The changing CISO role -- The new CISO's toolbox -- Risk management -- The inforamtion security management system -- CISO survival -- Summary : you become what you think about. Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Computer security. Computer Security https://id.nlm.nih.gov/mesh/D016494 Protection de l'information (Informatique) Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Data protection fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh85035859 https://id.nlm.nih.gov/mesh/D016494 |
title | The chief information security officer : insights, tools and survival skills / |
title_auth | The chief information security officer : insights, tools and survival skills / |
title_exact_search | The chief information security officer : insights, tools and survival skills / |
title_full | The chief information security officer : insights, tools and survival skills / Barry L. Kouns & Jake Kouns. |
title_fullStr | The chief information security officer : insights, tools and survival skills / Barry L. Kouns & Jake Kouns. |
title_full_unstemmed | The chief information security officer : insights, tools and survival skills / Barry L. Kouns & Jake Kouns. |
title_short | The chief information security officer : |
title_sort | chief information security officer insights tools and survival skills |
title_sub | insights, tools and survival skills / |
topic | Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Computer security. Computer Security https://id.nlm.nih.gov/mesh/D016494 Protection de l'information (Informatique) Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Data protection fast |
topic_facet | Data protection. Computer security. Computer Security Protection de l'information (Informatique) Sécurité informatique. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer security Data protection |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=391159 |
work_keys_str_mv | AT kounsbarry thechiefinformationsecurityofficerinsightstoolsandsurvivalskills AT kounsjake thechiefinformationsecurityofficerinsightstoolsandsurvivalskills AT kounsbarry chiefinformationsecurityofficerinsightstoolsandsurvivalskills AT kounsjake chiefinformationsecurityofficerinsightstoolsandsurvivalskills |