Lyt når som helst, hvor som helst

Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis

  • Lyt og læs så meget du har lyst til
  • Opdag et kæmpe bibliotek fyldt med fortællinger
  • Eksklusive titler + Mofibo Originals
  • Opsig når som helst
Prøv nu
DK - Details page - Device banner - 894x1036
Cover for 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business

8 Steps to Better Security: A Simple Cyber Resilience Guide for Business

2 Bedømmelse

3

Varighed
7T 49M
Sprog
Engelsk
Format
Kategori

Fakta

Harden your business against internal and external cybersecurity threats with a single accessible resource.

In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps.

Written to be accessible to non-technical businesspeople as well as security professionals, and with insights from other security industry leaders, this important book will walk you through how to: foster a strong security culture that extends from the custodial team to the C-suite; build an effective security team, regardless of the size or nature of your business; comply with regulatory requirements, including general data privacy rules and industry-specific legislation; and test your cybersecurity, including third-party penetration testing and internal red team specialists. Perfect for CISOs, security leaders, non-technical businesspeople, and managers at any level, 8 Steps to Better Security is also a must-have resource for companies of all sizes, and in all industries.

© 2021 Ascent Audio (Lydbog): 9781663717085

Udgivelsesdato

Lydbog: 26. oktober 2021

Tags

    Andre kan også lide...

    1. Cybersecutity First Principles
      Cybersecutity First Principles Rick Howard
    2. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1
      CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
    3. The Language of Deception: Weaponizing Next Generation AI
      The Language of Deception: Weaponizing Next Generation AI Justin Hutchens
    4. Certified Information Security Manager CISM Study Guide
      Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
    5. Cloud Security For Dummies
      Cloud Security For Dummies Ted Coombs
    6. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)
      CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
    7. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies
      CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
    8. The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework
      The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Mathieu Gorge
    9. The DevSecOps Playbook: Deliver Continuous Security at Speed
      The DevSecOps Playbook: Deliver Continuous Security at Speed Sean D. Mack
    10. Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration
      Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration Hans Weber
    11. Get in the Game: How to Level Up Your Business with Gaming, Esports, and Emerging Technologies
      Get in the Game: How to Level Up Your Business with Gaming, Esports, and Emerging Technologies Jonathan Stringfield
    12. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It
      A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
    13. Your Data, Their Billions: Unraveling and Simplifying Big Tech
      Your Data, Their Billions: Unraveling and Simplifying Big Tech Jane S. Hoffman
    14. Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1
      Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1 HUGO HOFFMAN
    15. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
      (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
    16. Distrust: Big Data, Data-Torturing, and the Assault on Science
      Distrust: Big Data, Data-Torturing, and the Assault on Science Gary Smith
    17. The Art of Attack: Attacker Mindset for Security Professionals
      The Art of Attack: Attacker Mindset for Security Professionals Maxie Reynolds
    18. The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power
      The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power Joseph Turow
    19. Machines of Loving Grace: The Quest for Common Ground Between Humans and Robots
      Machines of Loving Grace: The Quest for Common Ground Between Humans and Robots John Markoff
    20. Virtual You: How Building Your Digital Twin Will Revolutionize Medicine and Change Your Life
      Virtual You: How Building Your Digital Twin Will Revolutionize Medicine and Change Your Life Roger Highfield
    21. Contraception: A Concise History
      Contraception: A Concise History Donna J. Drucker
    22. Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1
      Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS
    23. Knowledge and Power: The Information Theory of Capitalism and How It Is Revolutionizing Our World
      Knowledge and Power: The Information Theory of Capitalism and How It Is Revolutionizing Our World George Gilder
    24. Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers
      Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers Robb Wilson
    25. Web3: Charting the Internet's Next Economic and Cultural Frontier
      Web3: Charting the Internet's Next Economic and Cultural Frontier Alex Tapscott
    26. Beyond the Valley: How Innovators around the World Are Overcoming Inequality and Creating the Technologies of Tomorrow
      Beyond the Valley: How Innovators around the World Are Overcoming Inequality and Creating the Technologies of Tomorrow Ramesh Srinivasan
    27. The Energy Wars – The Future of Renewable Energy & Sustainability: How Solar, Wind, and Nuclear Are Shaping the Battle for a Greener Future
      The Energy Wars – The Future of Renewable Energy & Sustainability: How Solar, Wind, and Nuclear Are Shaping the Battle for a Greener Future James Nemeth
    28. Business Ethics for Better Behavior
      Business Ethics for Better Behavior Jason Brennan
    29. When Gadgets Betray Us: The Dark Side of Our Infatuation With New Technologies
      When Gadgets Betray Us: The Dark Side of Our Infatuation With New Technologies Robert Vamosi
    30. Everyday Calculus: Discovering the Hidden Math All around Us
      Everyday Calculus: Discovering the Hidden Math All around Us Oscar E. Fernandez
    31. AI for beginners: Begin your AI developer journey in 2024
      AI for beginners: Begin your AI developer journey in 2024 Et Tu Code
    32. The Universe Next Door, Sixth Edition: A Basic Worldview Catalog
      The Universe Next Door, Sixth Edition: A Basic Worldview Catalog James W Sire
    33. The Midrange Theory: Basketball’s Evolution in the Age of Analytics
      The Midrange Theory: Basketball’s Evolution in the Age of Analytics Seth Partnow
    34. A Brief History of a Perfect Future: Inventing the world that we can proudly leave our kids by 2050
      A Brief History of a Perfect Future: Inventing the world that we can proudly leave our kids by 2050 Paul B. Carroll
    35. Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI
      Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI Reid Blackman
    36. Long Hard Road: The Lithium-Ion Battery and the Electric Car
      Long Hard Road: The Lithium-Ion Battery and the Electric Car Charles J. Murray
    37. Maxims for Thinking Analytically: The Wisdom of Legendary Harvard Professor Richard Zeckhauser
      Maxims for Thinking Analytically: The Wisdom of Legendary Harvard Professor Richard Zeckhauser Dan Levy
    38. Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1
      Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1 HUGO HOFFMAN
    39. Win the Game of Googleopoly: Unlocking the Secret Strategy of Search Engines
      Win the Game of Googleopoly: Unlocking the Secret Strategy of Search Engines Sean V. Bradley
    40. Emergent Actors in World Politics: How States and Nations Develop and Dissolve
      Emergent Actors in World Politics: How States and Nations Develop and Dissolve Lars-Erik Cederman
    41. Gold, Oil and Avocados: A Recent History of Latin America in Sixteen Commodities
      Gold, Oil and Avocados: A Recent History of Latin America in Sixteen Commodities Andy Robinson
    42. When AI Rules the World: China, the U.S., and the Race to Control a Smart Planet
      When AI Rules the World: China, the U.S., and the Race to Control a Smart Planet Handel Jones
    43. How to Measure Anything in Cybersecurity Risk, 2nd Edition
      How to Measure Anything in Cybersecurity Risk, 2nd Edition Douglas W. Hubbard

    Vælg dit abonnement

    • Over 600.000 titler

    • Download og nyd titler offline

    • Eksklusive titler + Mofibo Originals

    • Børnevenligt miljø (Kids Mode)

    • Det er nemt at opsige når som helst

    Den mest populære

    Premium

    For dig som lytter og læser ofte.

    129 kr. /måned
    • 1 konto

    • 100 timer/måned

    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Start tilbuddet

    Unlimited

    For dig som lytter og læser ubegrænset.

    149 kr. /måned
    • 1 konto

    • Ubegrænset adgang

    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Start tilbuddet

    Family

    For dig som ønsker at dele historier med familien.

    Fra 179 kr. /måned
    • 2-6 konti

    • 100 timer/måned pr. konto

    • Fri lytning til podcasts

    • Kun 39 kr. pr. ekstra konto

    • Ingen binding

    2 konti

    179 kr. /måned
    Start tilbuddet

    Flex

    For dig som vil prøve Mofibo.

    89 kr. /måned
    • 1 konto

    • 20 timer/måned

    • Gem op til 100 ubrugte timer

    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Prøv gratis