Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
The real-world guide to defeating hackers and keeping your business secure Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity--but they fail to address the everyday steps that boards, managers, and employees can take to prevent attacks. The Cybersecurity Playbook is the step-by-step guide to protecting your organization from unknown threats and integrating good security habits into everyday business situations. This book provides clear guidance on how to identify weaknesses, assess possible threats, and implement effective policies.…mehr
The real-world guide to defeating hackers and keeping your business secure Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity--but they fail to address the everyday steps that boards, managers, and employees can take to prevent attacks. The Cybersecurity Playbook is the step-by-step guide to protecting your organization from unknown threats and integrating good security habits into everyday business situations. This book provides clear guidance on how to identify weaknesses, assess possible threats, and implement effective policies. Recognizing that an organization's security is only as strong as its weakest link, this book offers specific strategies for employees at every level. Drawing from her experience as CMO of one of the world's largest cybersecurity companies, author Allison Cerra incorporates straightforward assessments, adaptable action plans, and many current examples to provide practical recommendations for cybersecurity policies. By demystifying cybersecurity and applying the central concepts to real-world business scenarios, this book will help you: * Deploy cybersecurity measures using easy-to-follow methods and proven techniques * Develop a practical security plan tailor-made for your specific needs * Incorporate vital security practices into your everyday workflow quickly and efficiently The ever-increasing connectivity of modern organizations, and their heavy use of cloud-based solutions present unique challenges: data breaches, malicious software infections, and cyberattacks have become commonplace and costly to organizations worldwide. The Cybersecurity Playbook is the invaluable guide to identifying security gaps, getting buy-in from the top, promoting effective daily security routines, and safeguarding vital resources. Strong cybersecurity is no longer the sole responsibility of IT departments, but that of every executive, manager, and employee.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, D ausgeliefert werden.
ALLISON CERRA brings a practical approach to demystifying the confluence of significant technology trends--including mobility, cloud, big data, security, and collaboration--and signaling where these forces could lead cultures in the future. In 2015, Cerra joined the cybersecurity industry, where she marries her calling for marketing with a cause of educating unwitting participants in a virtual battle that is underestimated, if not ignored, by far too many.
Chapter 1 The Time I Ruined Easter 1Lessons Learned the Hard Way 8Additional Lessons for You 12Who Was at Fault? 14Remember This Crucial Element 15Why Me? 16Why You? 17W.I.S.D.O.M. 19Chapter 2 Mr./Ms. Cellophane 23The New Kid on the Block 26W.I.S.D.O.M. for the Board and CEO 38Making Mr./Ms. Cellophane Visible 41Chapter 3 "Good Morning, This is Your Wakeup Call." 47The Best Defense 54W.I.S.D.O.M. for the Employee 59Chapter 4 Stop the Line 69The Internet of Terrorism 74W.I.S.D.O.M. for the Product Developer 80Chapter 5 Bridging the Gap 87When Too Much of a Good Thing is Bad 90It Wasn't Always This Way 92W.I.S.D.O.M. for HR Professionals 96Chapter 6 Luck Favors the Prepared 109BREACH! 112Preparing for Battle 115W.I.S.D.O.M. for the Marketer/Communicator 119Chapter 7 Interesting Bedfellows 127The More Things Change . . . 132. . . the More They Stay the Same 137W.I.S.D.O.M. for the Finance Professional 142Chapter 8 Mr./Ms. Cellophane (Reprise) 147A Picture is Worth a Thousand Words 149Letting Go to Hold On 153Assuming the Mantle 156W.I.S.D.O.M. for the Cybersecurity Professional 158Chapter 9 Experiencing a Culture of Security 169Chapter 10 A Culture of Security for All 187W.I.S.D.O.M. for the CEO/Board Member 191W.I.S.D.O.M. for the Employee 191W.I.S.D.O.M. for the Product Developer 192W.I.S.D.O.M. for the HR Professional 192W.I.S.D.O.M. for the Marketer/Communicator 193W.I.S.D.O.M. for the Finance Professional 194W.I.S.D.O.M. for the Cybersecurity Professional 198Acknowledgments 201About the Author 203Index 205
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309