Lyt når som helst, hvor som helst

Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis

  • Lyt og læs så meget du har lyst til
  • Opdag et kæmpe bibliotek fyldt med fortællinger
  • Eksklusive titler + Mofibo Originals
  • Opsig når som helst
Start tilbuddet
DK - Details page - Device banner - 894x1036
Cover for Building a Cyber Resilient Business: A cyber handbook for executives and boards

Building a Cyber Resilient Business: A cyber handbook for executives and boards

Varighed
6T 34M
Sprog
Engelsk
Format
Kategori

Fakta

With cyberattacks on the rise, it has become essential for C-suite executives and board members to step up and collectively recognize cyber risk as a top priority business risk. However, non-cyber executives find it challenging to understand their role in increasing the business’s cyber resilience due to its complex nature and the lack of a clear return on investment. This audiobook demystifies the perception that cybersecurity is a technical problem, drawing parallels between the key responsibilities of the C-suite roles to line up with the mission of the Chief Information Security Officer (CISO). The audiobook equips you with all you need to know about cyber risks to run the business effectively. Each chapter provides a holistic overview of the dynamic priorities of the C-suite (from the CFO to the CIO, COO, CRO, and so on), and unpacks how cybersecurity must be embedded in every business function. The audiobook also contains self-assessment questions, which are a helpful tool in evaluating any major cybersecurity initiatives and/or investment required. With this audiobook, you’ll have a deeper appreciation of the various ways all executives can contribute to the organization’s cyber program, in close collaboration with the CISO and the security team, and achieve a cyber-resilient, profitable, and sustainable business.

© 2023 Packt Publishing (Lydbog): 9781837637348
© 2022 Packt Publishing (E-bog): 9781803239699

Udgivelsesdato

Lydbog: 24. januar 2023
E-bog: 4. november 2022

Andre kan også lide...

  1. The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework
    The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Mathieu Gorge
  2. Disrupt Disruption: How to Decode the Future, Disrupt Your Industry, and Transform Your Business
    Disrupt Disruption: How to Decode the Future, Disrupt Your Industry, and Transform Your Business Pascal Finette
  3. Bitcoin and Cryptocurrency handbook for beginners: learn now why buy bitcoin, the basics of investing and mining, risk-free
    Bitcoin and Cryptocurrency handbook for beginners: learn now why buy bitcoin, the basics of investing and mining, risk-free Marco Zucchetti
  4. Building a Cyber Risk Management Program: Evolving Security for the Digital Age
    Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen
  5. Industrial Designs: Ideas and Inventive Problem Solving for Industrial Design
    Industrial Designs: Ideas and Inventive Problem Solving for Industrial Design Phil Gilberts
  6. The Laws of Influence: Proven Strategies for Launching Your Life and Career
    The Laws of Influence: Proven Strategies for Launching Your Life and Career Brad Harker
  7. Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration
    Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration Hans Weber
  8. Summary: The End of the World Is Just the Beginning: Mapping the Collapse of Globalization By Peter Zeihan: Key Takeaways, Summary & Analysis
    Summary: The End of the World Is Just the Beginning: Mapping the Collapse of Globalization By Peter Zeihan: Key Takeaways, Summary & Analysis Brooks Bryant
  9. RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals
    RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals Brown Brown
  10. Not Very Intelligent Design: On the Origin, Creation and Evolution of the Theory of Intelligent Design
    Not Very Intelligent Design: On the Origin, Creation and Evolution of the Theory of Intelligent Design Neel Ingman
  11. Cybersecutity First Principles
    Cybersecutity First Principles Rick Howard
  12. Whistling Dixie: Ronald Reagan, the White South, and the Transformation of the Republican Party
    Whistling Dixie: Ronald Reagan, the White South, and the Transformation of the Republican Party Jonathan Bartho
  13. Choosing Leadership: Revised and Expanded: How to Create a Better Future by Building Your Courage, Capacity, and Wisdom
    Choosing Leadership: Revised and Expanded: How to Create a Better Future by Building Your Courage, Capacity, and Wisdom Linda Ginzel, PhD
  14. The Bombardier Story: From Snowmobiles to Global Transportation Powerhouse
    The Bombardier Story: From Snowmobiles to Global Transportation Powerhouse Larry MacDonald
  15. The Healthcare Mandate: How to Leverage Disruptive Innovation to Heal America's Biggest Industry
    The Healthcare Mandate: How to Leverage Disruptive Innovation to Heal America's Biggest Industry Nicholas Webb
  16. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies
    CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
  17. The Anti-Oligarchy Constitution: Reconstructing the Economic Foundations of American Democracy
    The Anti-Oligarchy Constitution: Reconstructing the Economic Foundations of American Democracy William E. Forbath
  18. Bitcoin And Cryptocurrency Trading For Beginners: Bitcoin Options Strategies & Leveraged Trading Using Technical Indicators
    Bitcoin And Cryptocurrency Trading For Beginners: Bitcoin Options Strategies & Leveraged Trading Using Technical Indicators Carlo Barzini
  19. The Network: The Battle for the Airwaves and the Birth of the Communications Age
    The Network: The Battle for the Airwaves and the Birth of the Communications Age Scott Woolley
  20. How to Measure Anything in Cybersecurity Risk, 2nd Edition
    How to Measure Anything in Cybersecurity Risk, 2nd Edition Douglas W. Hubbard
  21. Long Hard Road: The Lithium-Ion Battery and the Electric Car
    Long Hard Road: The Lithium-Ion Battery and the Electric Car Charles J. Murray
  22. Mastering Active Directory - Third Edition: Design, deploy, and protect Active Directory Domain Services for Windows Server 2022
    Mastering Active Directory - Third Edition: Design, deploy, and protect Active Directory Domain Services for Windows Server 2022 Dishan Francis
  23. The Mobile App Mastery: Innovate, Design, and Thrive in the App Ecosystem
    The Mobile App Mastery: Innovate, Design, and Thrive in the App Ecosystem Marcus Devlin
  24. Turnaround Time: Uniting an Airline and Its Employees in the Friendly Skies
    Turnaround Time: Uniting an Airline and Its Employees in the Friendly Skies Oscar Munoz
  25. Breached!: Why Data Security Law Fails and How to Improve It
    Breached!: Why Data Security Law Fails and How to Improve It Daniel J. Solove
  26. Artificial Intelligence: A Comprehensive Guide to AI, Machine Learning, Internet of Things, Robotics, Deep Learning, Predictive Analytics, Neural Networks, Reinforcement Learning, and Our Future
    Artificial Intelligence: A Comprehensive Guide to AI, Machine Learning, Internet of Things, Robotics, Deep Learning, Predictive Analytics, Neural Networks, Reinforcement Learning, and Our Future Neil Wilkins
  27. Economics for People and the Planet: Inequality in the Era of Climate Change
    Economics for People and the Planet: Inequality in the Era of Climate Change James Boyce
  28. Industrial Development: Aeronautical, Aerospace, Civil, and Industrial Engineering (5 in 1)
    Industrial Development: Aeronautical, Aerospace, Civil, and Industrial Engineering (5 in 1) Phil Gilberts
  29. Metaverse Management
    Metaverse Management Orion Zander
  30. The Nordstrom Way to Customer Experience Excellence: Creating a Values-Driven Service Culture, 3rd Edition
    The Nordstrom Way to Customer Experience Excellence: Creating a Values-Driven Service Culture, 3rd Edition Robert Spector
  31. Cybersecurity for Beginners: How to Defend Against Hackers & Malware
    Cybersecurity for Beginners: How to Defend Against Hackers & Malware ATTILA KOVACS
  32. How Trump’s tariffs changed the fates of these two factories
    How Trump’s tariffs changed the fates of these two factories PBS NewsHour
  33. Beyond the Building: How to Use Innovation to Create and Grow Your Commercial Real Estate Portfolio
    Beyond the Building: How to Use Innovation to Create and Grow Your Commercial Real Estate Portfolio Rob Finlay
  34. Quantum Computing for Beginners: Unveiling the Future of Technology and Transforming Computational Horizons
    Quantum Computing for Beginners: Unveiling the Future of Technology and Transforming Computational Horizons Steve Abrams
  35. Biggest Cyber Crimes in the History
    Biggest Cyber Crimes in the History Introbooks Team
  36. Modern Economics
    Modern Economics Ben Bailey
  37. Debt, Deficits, and the Demise of the American Economy
    Debt, Deficits, and the Demise of the American Economy Jeff Cox
  38. Cloud Security For Dummies
    Cloud Security For Dummies Ted Coombs
  39. Project Myopia: Why Projects Damage Software #NoProjects
    Project Myopia: Why Projects Damage Software #NoProjects Allan Kelly
  40. Culture Through Crisis: One Team's Commitment to Winning With Purpose
    Culture Through Crisis: One Team's Commitment to Winning With Purpose Andrew Limouris
  41. Confessions of a Radical Tax Protestor: An Inside Expose of the Tax Resistance Movement
    Confessions of a Radical Tax Protestor: An Inside Expose of the Tax Resistance Movement Larry R. Williams
  42. The DevSecOps Playbook: Deliver Continuous Security at Speed
    The DevSecOps Playbook: Deliver Continuous Security at Speed Sean D. Mack
  43. Cryptography and Data Security: Book 1: Comprehensive Introduction to Foundations of Cryptography, Encryption and Decryption Techniques, Digital Signatures and Authentication.
    Cryptography and Data Security: Book 1: Comprehensive Introduction to Foundations of Cryptography, Encryption and Decryption Techniques, Digital Signatures and Authentication. Conor Williams
  44. You Can't Order Change: Lessons from Jim McNerney's Turnaround at Boeing
    You Can't Order Change: Lessons from Jim McNerney's Turnaround at Boeing Peter S. Cohan
  45. Leadership for the New Millennium
    Leadership for the New Millennium Alison Cameron
  46. Duty of Care: An Executive Guide for Corporate Boards in the Digital Era
    Duty of Care: An Executive Guide for Corporate Boards in the Digital Era Alizabeth Calder
  47. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
    8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
  48. Ethical Hacking for Beginners: Comprehensive Introduction to the  World of Cybersecurity
    Ethical Hacking for Beginners: Comprehensive Introduction to the World of Cybersecurity Brandon Scott
  49. Cybersecurity Career Master Plan: Proven techniques and effective tips to help you advance in your cybersecurity career
    Cybersecurity Career Master Plan: Proven techniques and effective tips to help you advance in your cybersecurity career Dr. Gerald Auger
  50. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)
    CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
  51. Joint Force Leadership: How SEALs and Fighter Pilots Lead to Success
    Joint Force Leadership: How SEALs and Fighter Pilots Lead to Success Mark Wayne McGinnis
  52. Performance Dashboards : Measuring, Monitoring and Managing Your Business: Measuring, Monitoring, and Managing Your Business
    Performance Dashboards : Measuring, Monitoring and Managing Your Business: Measuring, Monitoring, and Managing Your Business Wayne W. Eckerson
  53. Take Action
    Take Action Anthony Joseph
  54. Driven: Inside BMW, the Most Admired Car Company in the World
    Driven: Inside BMW, the Most Admired Car Company in the World David Kiley
  55. Corporatizing American Health Care: How We Lost Our Health Care System
    Corporatizing American Health Care: How We Lost Our Health Care System Robert W. Derlet
  56. Excess Returns: A comparative study of the methods of the world's greatest investors
    Excess Returns: A comparative study of the methods of the world's greatest investors Frederik Vanhaverbeke
  57. Civics, Law, and Justice: How We Became U.S.
    Civics, Law, and Justice: How We Became U.S. J. Layne Smith
  58. ChatGPT for Nonfiction Authors: How AI Can Improve Your Writing
    ChatGPT for Nonfiction Authors: How AI Can Improve Your Writing Acquilia Awa
  59. AI and the Future of the Public Sector: The Creation of Public Sector 4.0
    AI and the Future of the Public Sector: The Creation of Public Sector 4.0 Tony Boobier
  60. Management Divided: Contradictions of Labor Management
    Management Divided: Contradictions of Labor Management Matt Vidal
  61. Start Telling People: The guide to marketing strategy and brand building for future-defining startups
    Start Telling People: The guide to marketing strategy and brand building for future-defining startups Chris Matthews
  62. Attention All Passengers: The Airlines' Dangerous Descent---and How to Reclaim Our Skies
    Attention All Passengers: The Airlines' Dangerous Descent---and How to Reclaim Our Skies William J McGee
  63. Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1
    Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1 HUGO HOFFMAN
  64. Rigged Money: Beating Wall Street at Its Own Game
    Rigged Money: Beating Wall Street at Its Own Game Lee Munson
  65. The Power of Alternative Media
    The Power of Alternative Media Jay Walljasper
  66. Transhumanistic Solar System
    Transhumanistic Solar System Allen Young
  67. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
    Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III

Vælg dit abonnement

  • Over 600.000 titler

  • Download og nyd titler offline

  • Eksklusive titler + Mofibo Originals

  • Børnevenligt miljø (Kids Mode)

  • Det er nemt at opsige når som helst

Den mest populære

Premium

For dig som lytter og læser ofte.

129 kr. /måned
  • 1 konto

  • 100 timer/måned

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet

Unlimited

For dig som lytter og læser ubegrænset.

159 kr. /måned
  • 1 konto

  • Ubegrænset adgang

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet

Family

For dig som ønsker at dele historier med familien.

Fra 179 kr. /måned
  • 2-6 konti

  • 100 timer/måned pr. konto

  • Fri lytning til podcasts

  • Kun 39 kr. pr. ekstra konto

  • Ingen binding

2 konti

179 kr. /måned
Start tilbuddet

Flex

For dig som vil prøve Mofibo.

89 kr. /måned
  • 1 konto

  • 20 timer/måned

  • Gem op til 100 ubrugte timer

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Prøv gratis