Start tilbuddet
Lydbøger
E-bøger
Bogserier
Kategorier
Studierabat hele livet
Log Ind
Lydbøger
E-bøger
Bogserier
Kategorier
Studierabat hele livet
Log Ind
Start tilbuddet
Hjem
Narrators
David Spark
Prøv nu
Hjem
Narrators
David Spark
Prøv nu
Lydbøger indlæst af David Spark
Welcome to Defense in Depth
Geoff Belknap
Security Metrics
Geoff Belknap
Privacy
Geoff Belknap
Building an Information Security Council
Geoff Belknap
Insider Threats
Geoff Belknap
Secure Controls Framework
Geoff Belknap
Threat Intelligence
Geoff Belknap
Security IS the Business
Geoff Belknap
RSA 2019: Success or Failure?
Geoff Belknap
CISO Burnout
Geoff Belknap
Tools for Managing 3rd Party Risk
Geoff Belknap
Software Fixing Hardware Problems
Geoff Belknap
Machine Learning Failures
Geoff Belknap
Privileged Access Management
Geoff Belknap
Vulnerability Management
Geoff Belknap
Is the Cybersecurity Industry Solving Our Problems?
Geoff Belknap
How CISOs Discover New Solutions
Geoff Belknap
Cybersecurity Hiring
Geoff Belknap
Managing Obsolete (Yet Business Critical) Systems
Geoff Belknap
ERP Security
Geoff Belknap
Amplifying Your Security Posture
Geoff Belknap
Camry Security
Geoff Belknap
Tool Consolidation
Geoff Belknap
Economics of Data
Geoff Belknap
CISO Series One Year Review
Geoff Belknap
Cyber Harassment
Geoff Belknap
Bad Best Practices
Geoff Belknap
Hacker Culture
Geoff Belknap
ATT&CK Matrix
Geoff Belknap
Proactive Security
Geoff Belknap
100% Security
Geoff Belknap
Employee Hacking
Geoff Belknap
Cybersecurity Excuses
Geoff Belknap
Top CISO Communication Issues
Geoff Belknap
Ransomware
Geoff Belknap
Resiliency
Geoff Belknap
Securing the New Internet
Geoff Belknap
User-Centric Security
Geoff Belknap
Cyber Defense Matrix
Geoff Belknap
Best Starting Security Framework
Geoff Belknap
Is Product Security Improving?
Geoff Belknap
The Cloud and Shared Security
Geoff Belknap
Cybersecurity and the Media
Geoff Belknap
Cybersecurity Readiness as Hiring Criteria
Geoff Belknap
InfoSec Trends for 2020
Geoff Belknap
UX in Cybersecurity
Geoff Belknap
Account Takeover
Geoff Belknap
Building a Fully Remote Security Team
Geoff Belknap
The Iran Cybersecurity Threat
Geoff Belknap
Presenting to the Board
Geoff Belknap
Post Breach Desperation and Salary Negotiations
Geoff Belknap
When Are CISOs Responsible for Breaches?
Geoff Belknap
Lack of Diversity in Cybersecurity
Geoff Belknap
Personality Tests in the Workplace
Geoff Belknap
Toxic Security Teams
Geoff Belknap
CISO Tenure
Geoff Belknap
Hybrid Cloud
Geoff Belknap
Who Should the CISO Report To?
Geoff Belknap
Is Governance the Most Important Part of GRC?
Geoff Belknap
Internet of Things
Geoff Belknap
Responsible Disclosure
Geoff Belknap
Should Risk Lead GRC?
Geoff Belknap
Fix Security Problems with What You've Got
Geoff Belknap
DevSecOps
Geoff Belknap
Asset Valuation
Geoff Belknap
Prevention vs. Detection and Containment
Geoff Belknap
Data Classification
Geoff Belknap
Bug Bounties
Geoff Belknap
Shared Accounts
Geoff Belknap
Role of the BISO
Geoff Belknap
Security Budgets
Geoff Belknap
Drudgery of Cybercrime
Geoff Belknap
Shared Threat Intelligence
Geoff Belknap
API Security
Geoff Belknap
Securing a Cloud Migration
Geoff Belknap
InfoSec Fatigue
Geoff Belknap
Secure Access
Geoff Belknap
How Vendors Should Approach CISOs
Geoff Belknap
Trusting Security Vendor Claims
Geoff Belknap
Junior Cyber People
Geoff Belknap
What Cyber Pro Are You Trying to Hire?
Geoff Belknap
When Red Teams Break Down
Geoff Belknap
Is College Necessary for a Job in Cybersecurity?
Geoff Belknap
Calling Users Stupid
Geoff Belknap
XDR: Extended Detection and Response
Geoff Belknap
Legal Protection for CISOs
Geoff Belknap
Privacy Is An Uphill Battle
Geoff Belknap
Measuring the Success of Your Security Program
Geoff Belknap
Leaked Secrets in Code Repositories
Geoff Belknap
Securing Digital Transformations
Geoff Belknap
What's an Entry Level Cybersecurity Job?
Geoff Belknap
Data Protection and Visibility
Geoff Belknap
Why Don't More Companies Take Cybersecurity Seriously?
Geoff Belknap
Imposter Syndrome
Geoff Belknap
Inherently Vulnerable By Design
Geoff Belknap
Should CISOs Be Licensed Professionals?
Geoff Belknap
Are our Data Protection Strategies Evolving?
Geoff Belknap
Building a Security Team
Geoff Belknap
How Do You Know if You're Good at Security?
Geoff Belknap
Does a CISO Need Tech Skills?
Geoff Belknap
How to Make Cybersecurity More Efficient
Geoff Belknap
Data Destruction
Geoff Belknap
Should Finance or Legal Mentor Cyber?
Geoff Belknap
How Much Log Data Is Enough?
Geoff Belknap
Vendor CISOs
Geoff Belknap
What Is Security's Mission?
Geoff Belknap
Cloud Security Myths
Geoff Belknap
Cybersecurity Isn’t That Difficult
Geoff Belknap
Securing the Super Bowl and Other Huge Events
Geoff Belknap
Mentoring
Geoff Belknap
What’s the Obsession with Zero Trust?
Geoff Belknap
Insider Risk
Geoff Belknap
Do Startups Need a CISO?
Geoff Belknap
How Much Do You Know About Your Data?
Geoff Belknap
Security Hygiene for Software Development
Geoff Belknap
Hiring Talent with No Security Experience
Geoff Belknap
Fear of Automation
Geoff Belknap
Starting Pay for Cyber Staff
Geoff Belknap
Cloud Configuration Fails
Geoff Belknap
Salesforce Security
Geoff Belknap
Retaining Cyber Talent
Geoff Belknap
CISO Recruiting Is Broken
Geoff Belknap
Educating the Board About Cybersecurity
Geoff Belknap
How do I get my first cybersecurity job?
Geoff Belknap
Measuring the Success of Cloud Security
Geoff Belknap
What's the Value of Certifications?
Geoff Belknap
How Does Ransomware Enter the Network?
Geoff Belknap
First Steps as a CISO
Geoff Belknap
Managing Lateral Movement
Geoff Belknap
Preventing Ransomware
Geoff Belknap
Cybersecurity Is Not Easy to Get Into
Geoff Belknap
Convergence of SIEM and SOAR
Geoff Belknap
Can Technology Solve Phishing?
Geoff Belknap
Ransomware Kill Chain
Geoff Belknap
The "Are We Secure?" Question
Geoff Belknap
How to Be a Vendor that CISOs Love
Geoff Belknap
Why Is Security Recruiting So Broken?
Geoff Belknap
Proactive Vulnerability Management
Geoff Belknap
Ageism in Cybersecurity
Geoff Belknap
How Do We Turn Tables Against Adversaries?
Geoff Belknap
How Do You Measure Cybersecurity Success?
Geoff Belknap
Convergence of Physical and Digital Security
Geoff Belknap
How Can We Simplify Security?
Geoff Belknap
When Social Engineering Bypasses Our Cyber Tools
Geoff Belknap
Promises of Automation
Geoff Belknap
Making Cybersecurity Faster and More Responsive
Geoff Belknap
DDoS Solutions
Geoff Belknap
What Should We Stop Doing in Cybersecurity?
Geoff Belknap
Is Your Data Safer in the Cloud?
Geoff Belknap
How to Pitch to a Security Analyst
Geoff Belknap
Viewing 150 out of 613 items
Load more
Lyt når som helst, hvor som helst
Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis
Lyt og læs så meget du har lyst til
Opdag et kæmpe bibliotek fyldt med fortællinger
Eksklusive titler + Mofibo Originals
Opsig når som helst
Prøv nu
Læs mere
Om Mofibo
Jobs
Investor Relations
Presse
Bæredygtighed
Udforsk
Søg
Bøger
Bogserier
Mofibo Originals
Podcasts
Forfattere
Indlæsere
Kategorier
Brugbare links
Hjælpecenter
Abonnementer
Køb gavekort
Indløs gavekort
Indløs kampagnekode
Studierabat hele livet
Sprog og region
Dansk
Danmark
Følg os
Privatlivspolitik
Medlemsvilkår
Cookies