Lyt når som helst, hvor som helst

Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis

  • Lyt og læs så meget du har lyst til
  • Opdag et kæmpe bibliotek fyldt med fortællinger
  • Eksklusive titler + Mofibo Originals
  • Opsig når som helst
Start tilbuddet
DK - Details page - Device banner - 894x1036
Cover for 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business

8 Steps to Better Security: A Simple Cyber Resilience Guide for Business

2 Bedømmelse

3

Varighed
7T 49M
Sprog
Engelsk
Format
Kategori

Fakta

Harden your business against internal and external cybersecurity threats with a single accessible resource.

In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps.

Written to be accessible to non-technical businesspeople as well as security professionals, and with insights from other security industry leaders, this important book will walk you through how to: foster a strong security culture that extends from the custodial team to the C-suite; build an effective security team, regardless of the size or nature of your business; comply with regulatory requirements, including general data privacy rules and industry-specific legislation; and test your cybersecurity, including third-party penetration testing and internal red team specialists. Perfect for CISOs, security leaders, non-technical businesspeople, and managers at any level, 8 Steps to Better Security is also a must-have resource for companies of all sizes, and in all industries.

© 2021 Ascent Audio (Lydbog): 9781663717085

Udgivelsesdato

Lydbog: 26. oktober 2021

Tags

    Andre kan også lide...

    1. Cybersecutity First Principles
      Cybersecutity First Principles Rick Howard
    2. Spatial Computing
      Spatial Computing Pamela Vold
    3. Certified Information Security Manager CISM Study Guide
      Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
    4. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)
      CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
    5. Web3: Charting the Internet's Next Economic and Cultural Frontier
      Web3: Charting the Internet's Next Economic and Cultural Frontier Alex Tapscott
    6. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies
      CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
    7. Cloud Security For Dummies
      Cloud Security For Dummies Ted Coombs
    8. CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1
      CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1 John Knowles
    9. Distrust: Big Data, Data-Torturing, and the Assault on Science
      Distrust: Big Data, Data-Torturing, and the Assault on Science Gary Smith
    10. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1
      CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
    11. Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration
      Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration Hans Weber
    12. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions
      Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
    13. The Energy Wars – The Future of Renewable Energy & Sustainability: How Solar, Wind, and Nuclear Are Shaping the Battle for a Greener Future
      The Energy Wars – The Future of Renewable Energy & Sustainability: How Solar, Wind, and Nuclear Are Shaping the Battle for a Greener Future James Nemeth
    14. A Brief History of a Perfect Future: Inventing the world that we can proudly leave our kids by 2050
      A Brief History of a Perfect Future: Inventing the world that we can proudly leave our kids by 2050 Paul B. Carroll
    15. The Anti-Oligarchy Constitution: Reconstructing the Economic Foundations of American Democracy
      The Anti-Oligarchy Constitution: Reconstructing the Economic Foundations of American Democracy William E. Forbath
    16. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
      Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
    17. How Big-Tech Barons Smash Innovation—and How to Strike Back
      How Big-Tech Barons Smash Innovation—and How to Strike Back Maurice E. Stucke
    18. TouchPoints: Creating Powerful Leadership Connections in the Smallest of Moments
      TouchPoints: Creating Powerful Leadership Connections in the Smallest of Moments Mette Norgaard
    19. Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1
      Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1 HUGO HOFFMAN
    20. Business Ethics for Better Behavior
      Business Ethics for Better Behavior Jason Brennan
    21. The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework
      The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Mathieu Gorge
    22. The DevSecOps Playbook: Deliver Continuous Security at Speed
      The DevSecOps Playbook: Deliver Continuous Security at Speed Sean D. Mack
    23. Inevitable: Inside the Messy, Unstoppable Transition to Electric Vehicles
      Inevitable: Inside the Messy, Unstoppable Transition to Electric Vehicles Mike Colias
    24. The Great Persuasion: Reinventing Free Markets Since the Depression
      The Great Persuasion: Reinventing Free Markets Since the Depression Angus Burgin
    25. Completing Capitalism: Heal Business to Heal the World
      Completing Capitalism: Heal Business to Heal the World Bruno Roche
    26. The Road to Reinvention: How to Drive Disruption and Accelerate Transformation
      The Road to Reinvention: How to Drive Disruption and Accelerate Transformation Josh Linkner
    27. How to Measure Anything in Cybersecurity Risk, 2nd Edition
      How to Measure Anything in Cybersecurity Risk, 2nd Edition Douglas W. Hubbard
    28. Born Digital: The Story of a Distracted Generation
      Born Digital: The Story of a Distracted Generation Robert Wigley
    29. Autonomy: The Quest to Build the Driverless Car - And How It Will Reshape Our World
      Autonomy: The Quest to Build the Driverless Car - And How It Will Reshape Our World Lawrence Burns
    30. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
      (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
    31. Modern Technology: Chemical, Electrical, Industrial, and Mechanical Engineering (4 in 1)
      Modern Technology: Chemical, Electrical, Industrial, and Mechanical Engineering (4 in 1) Phil Gilberts
    32. The Knowledge Gene
      The Knowledge Gene Lynne Kelly
    33. Long Hard Road: The Lithium-Ion Battery and the Electric Car
      Long Hard Road: The Lithium-Ion Battery and the Electric Car Charles J. Murray
    34. Maxims for Thinking Analytically: The Wisdom of Legendary Harvard Professor Richard Zeckhauser
      Maxims for Thinking Analytically: The Wisdom of Legendary Harvard Professor Richard Zeckhauser Dan Levy
    35. Hackable: How to Do Application Security Right
      Hackable: How to Do Application Security Right Ted Harrington
    36. Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI
      Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI Reid Blackman
    37. Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1
      Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1 HUGO HOFFMAN
    38. Reprogramming The American Dream: From Rural America to Silicon Valley—Making AI Serve Us All
      Reprogramming The American Dream: From Rural America to Silicon Valley—Making AI Serve Us All Greg Shaw
    39. Industrial Designs: Ideas and Inventive Problem Solving for Industrial Design
      Industrial Designs: Ideas and Inventive Problem Solving for Industrial Design Phil Gilberts
    40. Win the Game of Googleopoly: Unlocking the Secret Strategy of Search Engines
      Win the Game of Googleopoly: Unlocking the Secret Strategy of Search Engines Sean V. Bradley
    41. The Midrange Theory: Basketball’s Evolution in the Age of Analytics
      The Midrange Theory: Basketball’s Evolution in the Age of Analytics Seth Partnow
    42. Building a Cyber Risk Management Program: Evolving Security for the Digital Age
      Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen
    43. Competition Overdose: How Free Market Mythology Transformed Us from Citizen Kings to Market Servants
      Competition Overdose: How Free Market Mythology Transformed Us from Citizen Kings to Market Servants Maurice E. Stucke
    44. GINI: Capitalism, Cryptocurrencies & the Battle for Human Rights
      GINI: Capitalism, Cryptocurrencies & the Battle for Human Rights Ferris Eanfar
    45. Chemical Engineering: Design and Analysis of Chemical Process Engineering
      Chemical Engineering: Design and Analysis of Chemical Process Engineering Phil Gilberts
    46. Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers
      Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers Robb Wilson
    47. The Cloud Revolution: How the Convergence of New Technologies Will Unleash the Next Economic Boom and A Roaring 2020s
      The Cloud Revolution: How the Convergence of New Technologies Will Unleash the Next Economic Boom and A Roaring 2020s Mark P. Mills
    48. How to Speak Science: Gravity, Relativity, and Other Ideas That Were Crazy until Proven Brilliant
      How to Speak Science: Gravity, Relativity, and Other Ideas That Were Crazy until Proven Brilliant Bruce Benamran
    49. Probability Theory
      Probability Theory Introbooks Team
    50. Yellen: The Trailblazing Economist Who Navigated an Era of Upheaval
      Yellen: The Trailblazing Economist Who Navigated an Era of Upheaval Jon Hilsenrath
    51. The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power
      The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power Joseph Turow
    52. RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals
      RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals Brown Brown
    53. The Cost of Free Money: How Unfettered Capital Threatens Our Economic Future
      The Cost of Free Money: How Unfettered Capital Threatens Our Economic Future Paola Subacchi
    54. The Tyranny of Dead Ideas: Revolutionary Thinking for a New Age of Prosperity
      The Tyranny of Dead Ideas: Revolutionary Thinking for a New Age of Prosperity Matt Miller
    55. Winner Sells All: Amazon, Walmart, and the Battle for Our Wallets
      Winner Sells All: Amazon, Walmart, and the Battle for Our Wallets Jason Del Rey
    56. Edge of Armageddon: The Imminent Nuclear Consequence
      Edge of Armageddon: The Imminent Nuclear Consequence Robert Enochs
    57. Beyond the Valley: How Innovators around the World Are Overcoming Inequality and Creating the Technologies of Tomorrow
      Beyond the Valley: How Innovators around the World Are Overcoming Inequality and Creating the Technologies of Tomorrow Ramesh Srinivasan
    58. Game Theory: Applications to Economics and Economic Theory
      Game Theory: Applications to Economics and Economic Theory Daniel Shore
    59. Economic Warfare: Secrets of Wealth Creation in the Age of Welfare Politics
      Economic Warfare: Secrets of Wealth Creation in the Age of Welfare Politics Herman Cain
    60. The Digital Helix: Transforming Your Organization's DNA to Thrive in the Digital Age
      The Digital Helix: Transforming Your Organization's DNA to Thrive in the Digital Age Chris Aarons
    61. Not Very Intelligent Design: On the Origin, Creation and Evolution of the Theory of Intelligent Design
      Not Very Intelligent Design: On the Origin, Creation and Evolution of the Theory of Intelligent Design Neel Ingman
    62. Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
      Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors Perry Carpenter
    63. The Health Hazard: Take control, Restore Wellbeing and Optimise Impact
      The Health Hazard: Take control, Restore Wellbeing and Optimise Impact Alison Coughlan
    64. Social Capital: Life online in the shadow of Ireland’s tech boom
      Social Capital: Life online in the shadow of Ireland’s tech boom Aoife Barry
    65. The Rise of the Cobot: Grow Your Business Exponentially with Collaborative Artificial Intelligence
      The Rise of the Cobot: Grow Your Business Exponentially with Collaborative Artificial Intelligence John Rauscher
    66. Designing Transformative Experiences: A Toolkit for Leaders, Trainers, Teachers, and other Experience Designers
      Designing Transformative Experiences: A Toolkit for Leaders, Trainers, Teachers, and other Experience Designers Brad McLain
    67. The Deal Maker: How William C. Durant Made General Motors
      The Deal Maker: How William C. Durant Made General Motors Axel Madsen
    68. Cracking the China Conundrum: Why Conventional Economic Wisdom Is Wrong
      Cracking the China Conundrum: Why Conventional Economic Wisdom Is Wrong Yukon Huang
    69. The Boomerang Principle: Inspire Lifetime Loyalty from Your Employees
      The Boomerang Principle: Inspire Lifetime Loyalty from Your Employees Lee Caraher
    70. Haptics
      Haptics Lynette Jones
    71. Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1
      Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS
    72. Diplomacy Conversations: How to Win at Diplomacy, Or Strategy for Face-to-Face, Online, and Tournaments
      Diplomacy Conversations: How to Win at Diplomacy, Or Strategy for Face-to-Face, Online, and Tournaments Erik van Mechelen
    73. The Art of Attack: Attacker Mindset for Security Professionals
      The Art of Attack: Attacker Mindset for Security Professionals Maxie Reynolds
    74. The Miracle: The Epic Story of Asia's Quest for Wealth
      The Miracle: The Epic Story of Asia's Quest for Wealth Michael Schuman
    75. Exchange-Traded Funds For Dummies
      Exchange-Traded Funds For Dummies Russell Wild
    76. Winning at the Acquisition Game : Tools, Templates and Best Practices Across the M&A Process: Tools, Templates, and Best Practices Across the M&A Process
      Winning at the Acquisition Game : Tools, Templates and Best Practices Across the M&A Process: Tools, Templates, and Best Practices Across the M&A Process Timothy Galpin

    Vælg dit abonnement

    • Over 600.000 titler

    • Download og nyd titler offline

    • Eksklusive titler + Mofibo Originals

    • Børnevenligt miljø (Kids Mode)

    • Det er nemt at opsige når som helst

    Den mest populære

    Premium

    For dig som lytter og læser ofte.

    129 kr. /måned
    • 1 konto

    • 100 timer/måned

    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Start tilbuddet

    Unlimited

    For dig som lytter og læser ubegrænset.

    159 kr. /måned
    • 1 konto

    • Ubegrænset adgang

    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Start tilbuddet

    Family

    For dig som ønsker at dele historier med familien.

    Fra 179 kr. /måned
    • 2-6 konti

    • 100 timer/måned pr. konto

    • Fri lytning til podcasts

    • Kun 39 kr. pr. ekstra konto

    • Ingen binding

    2 konti

    179 kr. /måned
    Start tilbuddet

    Flex

    For dig som vil prøve Mofibo.

    89 kr. /måned
    • 1 konto

    • 20 timer/måned

    • Gem op til 100 ubrugte timer

    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Start tilbuddet