The CISO evolution business knowledge for cybersecurity executives
Learn to effectively deliver business aligned cybersecurity outcomes In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professi...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
[Place of publication not identified]
Ascent Audio
2022
|
Ausgabe: | [First edition]. |
Schlagworte: | |
Online-Zugang: | lizenzpflichtig lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-078669820 | ||
003 | DE-627-1 | ||
005 | 20240228121651.0 | ||
007 | cr uuu---uuuuu | ||
008 | 220609s2022 xx |||||o 00| ||eng c | ||
020 | |a 9781663718556 |c electronic audio bk. |9 978-1-6637-1855-6 | ||
020 | |a 1663718555 |c electronic audio bk. |9 1-6637-1855-5 | ||
035 | |a (DE-627-1)078669820 | ||
035 | |a (DE-599)KEP078669820 | ||
035 | |a (ORHE)9781663718556 | ||
035 | |a (DE-627-1)078669820 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 658.4/038011 |2 23/eng/20220503 | |
100 | 1 | |a Sharp, Matthew K. |e VerfasserIn |4 aut | |
245 | 1 | 4 | |a The CISO evolution |b business knowledge for cybersecurity executives |c Matthew K. Sharp, Kyriakos (Rock) Lambros |
250 | |a [First edition]. | ||
264 | 1 | |a [Place of publication not identified] |b Ascent Audio |c 2022 | |
300 | |a 1 online resource (1 sound file (13 hr., 8 min.)) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; title from title details screen (O'Reilly, viewed May 3, 2022) | ||
520 | |a Learn to effectively deliver business aligned cybersecurity outcomes In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes. The authors use illustrative stories to show professionals how to establish an executive presence and avoid the most common pitfalls experienced by technology experts when speaking and presenting to executives. The book will show you how to: - Inspire trust in senior business leaders by properly aligning and setting expectations around risk appetite and capital allocation - Properly characterize the indispensable role of cybersecurity in your company's overall strategic plan - Acquire the necessary funding and resources for your company's cybersecurity program and avoid the stress and anxiety that comes with underfunding. | ||
650 | 0 | |a Chief information officers | |
650 | 0 | |a Computer security | |
650 | 0 | |a Management information systems |x Security measures | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Chefs des services de l'information | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Systèmes d'information de gestion ; Sécurité ; Mesures | |
650 | 4 | |a Chief information officers | |
650 | 4 | |a Computer security | |
650 | 4 | |a Downloadable audio books | |
650 | 4 | |a Audiobooks | |
650 | 4 | |a Audiobooks | |
650 | 4 | |a Livres audio | |
700 | 1 | |a Lambros, Kyriakos P. |e VerfasserIn |4 aut | |
700 | 1 | |a Grove, Christopher |e ErzählerIn |4 nrt | |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781663718556/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/~/9781663718556/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-078669820 |
---|---|
_version_ | 1818767253087191040 |
adam_text | |
any_adam_object | |
author | Sharp, Matthew K. Lambros, Kyriakos P. |
author2 | Grove, Christopher |
author2_role | nrt |
author2_variant | c g cg |
author_facet | Sharp, Matthew K. Lambros, Kyriakos P. Grove, Christopher |
author_role | aut aut |
author_sort | Sharp, Matthew K. |
author_variant | m k s mk mks k p l kp kpl |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)078669820 (DE-599)KEP078669820 (ORHE)9781663718556 |
dewey-full | 658.4/038011 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/038011 |
dewey-search | 658.4/038011 |
dewey-sort | 3658.4 538011 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
edition | [First edition]. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03294cam a22005532 4500</leader><controlfield tag="001">ZDB-30-ORH-078669820</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121651.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">220609s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781663718556</subfield><subfield code="c">electronic audio bk.</subfield><subfield code="9">978-1-6637-1855-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1663718555</subfield><subfield code="c">electronic audio bk.</subfield><subfield code="9">1-6637-1855-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)078669820</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP078669820</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781663718556</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)078669820</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/038011</subfield><subfield code="2">23/eng/20220503</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sharp, Matthew K.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The CISO evolution</subfield><subfield code="b">business knowledge for cybersecurity executives</subfield><subfield code="c">Matthew K. Sharp, Kyriakos (Rock) Lambros</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Ascent Audio</subfield><subfield code="c">2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 sound file (13 hr., 8 min.))</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title details screen (O'Reilly, viewed May 3, 2022)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Learn to effectively deliver business aligned cybersecurity outcomes In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes. The authors use illustrative stories to show professionals how to establish an executive presence and avoid the most common pitfalls experienced by technology experts when speaking and presenting to executives. The book will show you how to: - Inspire trust in senior business leaders by properly aligning and setting expectations around risk appetite and capital allocation - Properly characterize the indispensable role of cybersecurity in your company's overall strategic plan - Acquire the necessary funding and resources for your company's cybersecurity program and avoid the stress and anxiety that comes with underfunding.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Chief information officers</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Management information systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Chefs des services de l'information</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systèmes d'information de gestion ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Chief information officers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Downloadable audio books</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Audiobooks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Audiobooks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Livres audio</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lambros, Kyriakos P.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Grove, Christopher</subfield><subfield code="e">ErzählerIn</subfield><subfield code="4">nrt</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781663718556/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/~/9781663718556/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-078669820 |
illustrated | Not Illustrated |
indexdate | 2024-12-18T08:46:56Z |
institution | BVB |
isbn | 9781663718556 1663718555 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (1 sound file (13 hr., 8 min.)) |
psigel | ZDB-30-ORH |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Ascent Audio |
record_format | marc |
spelling | Sharp, Matthew K. VerfasserIn aut The CISO evolution business knowledge for cybersecurity executives Matthew K. Sharp, Kyriakos (Rock) Lambros [First edition]. [Place of publication not identified] Ascent Audio 2022 1 online resource (1 sound file (13 hr., 8 min.)) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; title from title details screen (O'Reilly, viewed May 3, 2022) Learn to effectively deliver business aligned cybersecurity outcomes In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes. The authors use illustrative stories to show professionals how to establish an executive presence and avoid the most common pitfalls experienced by technology experts when speaking and presenting to executives. The book will show you how to: - Inspire trust in senior business leaders by properly aligning and setting expectations around risk appetite and capital allocation - Properly characterize the indispensable role of cybersecurity in your company's overall strategic plan - Acquire the necessary funding and resources for your company's cybersecurity program and avoid the stress and anxiety that comes with underfunding. Chief information officers Computer security Management information systems Security measures Computer Security Chefs des services de l'information Sécurité informatique Systèmes d'information de gestion ; Sécurité ; Mesures Downloadable audio books Audiobooks Livres audio Lambros, Kyriakos P. VerfasserIn aut Grove, Christopher ErzählerIn nrt TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781663718556/?ar X:ORHE Aggregator lizenzpflichtig Volltext TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/~/9781663718556/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Sharp, Matthew K. Lambros, Kyriakos P. The CISO evolution business knowledge for cybersecurity executives Chief information officers Computer security Management information systems Security measures Computer Security Chefs des services de l'information Sécurité informatique Systèmes d'information de gestion ; Sécurité ; Mesures Downloadable audio books Audiobooks Livres audio |
title | The CISO evolution business knowledge for cybersecurity executives |
title_auth | The CISO evolution business knowledge for cybersecurity executives |
title_exact_search | The CISO evolution business knowledge for cybersecurity executives |
title_full | The CISO evolution business knowledge for cybersecurity executives Matthew K. Sharp, Kyriakos (Rock) Lambros |
title_fullStr | The CISO evolution business knowledge for cybersecurity executives Matthew K. Sharp, Kyriakos (Rock) Lambros |
title_full_unstemmed | The CISO evolution business knowledge for cybersecurity executives Matthew K. Sharp, Kyriakos (Rock) Lambros |
title_short | The CISO evolution |
title_sort | ciso evolution business knowledge for cybersecurity executives |
title_sub | business knowledge for cybersecurity executives |
topic | Chief information officers Computer security Management information systems Security measures Computer Security Chefs des services de l'information Sécurité informatique Systèmes d'information de gestion ; Sécurité ; Mesures Downloadable audio books Audiobooks Livres audio |
topic_facet | Chief information officers Computer security Management information systems Security measures Computer Security Chefs des services de l'information Sécurité informatique Systèmes d'information de gestion ; Sécurité ; Mesures Downloadable audio books Audiobooks Livres audio |
url | https://learning.oreilly.com/library/view/-/9781663718556/?ar https://learning.oreilly.com/library/view/~/9781663718556/?ar |
work_keys_str_mv | AT sharpmatthewk thecisoevolutionbusinessknowledgeforcybersecurityexecutives AT lambroskyriakosp thecisoevolutionbusinessknowledgeforcybersecurityexecutives AT grovechristopher thecisoevolutionbusinessknowledgeforcybersecurityexecutives AT sharpmatthewk cisoevolutionbusinessknowledgeforcybersecurityexecutives AT lambroskyriakosp cisoevolutionbusinessknowledgeforcybersecurityexecutives AT grovechristopher cisoevolutionbusinessknowledgeforcybersecurityexecutives |