Start tilbuddet
Lydbøger
E-bøger
Bogserier
Kategorier
Studierabat hele livet
Mofibo Reader
Log Ind
Lydbøger
E-bøger
Bogserier
Kategorier
Studierabat hele livet
Mofibo Reader
Log Ind
Start tilbuddet
Hjem
Narrators
David Spark
Prøv nu
Hjem
Narrators
David Spark
Prøv nu
Lydbøger indlæst af David Spark
Welcome to Defense in Depth
David Spark
Security Metrics
David Spark
Privacy
David Spark
Building an Information Security Council
David Spark
Insider Threats
David Spark
Secure Controls Framework
David Spark
Threat Intelligence
David Spark
Security IS the Business
David Spark
RSA 2019: Success or Failure?
David Spark
CISO Burnout
David Spark
Tools for Managing 3rd Party Risk
David Spark
Software Fixing Hardware Problems
David Spark
Machine Learning Failures
David Spark
Privileged Access Management
David Spark
Vulnerability Management
David Spark
Is the Cybersecurity Industry Solving Our Problems?
David Spark
How CISOs Discover New Solutions
David Spark
Cybersecurity Hiring
David Spark
Managing Obsolete (Yet Business Critical) Systems
David Spark
ERP Security
David Spark
Amplifying Your Security Posture
David Spark
Camry Security
David Spark
Tool Consolidation
David Spark
Economics of Data
David Spark
CISO Series One Year Review
David Spark
Cyber Harassment
David Spark
Bad Best Practices
David Spark
Hacker Culture
David Spark
ATT&CK Matrix
David Spark
Proactive Security
David Spark
100% Security
David Spark
Employee Hacking
David Spark
Cybersecurity Excuses
David Spark
Top CISO Communication Issues
David Spark
Ransomware
David Spark
Resiliency
David Spark
Securing the New Internet
David Spark
User-Centric Security
David Spark
Cyber Defense Matrix
David Spark
Best Starting Security Framework
David Spark
Is Product Security Improving?
David Spark
The Cloud and Shared Security
David Spark
Cybersecurity and the Media
David Spark
Cybersecurity Readiness as Hiring Criteria
David Spark
InfoSec Trends for 2020
David Spark
UX in Cybersecurity
David Spark
Account Takeover
David Spark
Building a Fully Remote Security Team
David Spark
The Iran Cybersecurity Threat
David Spark
Presenting to the Board
David Spark
Post Breach Desperation and Salary Negotiations
David Spark
When Are CISOs Responsible for Breaches?
David Spark
Lack of Diversity in Cybersecurity
David Spark
Personality Tests in the Workplace
David Spark
Toxic Security Teams
David Spark
CISO Tenure
David Spark
Hybrid Cloud
David Spark
Who Should the CISO Report To?
David Spark
Is Governance the Most Important Part of GRC?
David Spark
Internet of Things
David Spark
Responsible Disclosure
David Spark
Should Risk Lead GRC?
David Spark
Fix Security Problems with What You've Got
David Spark
DevSecOps
David Spark
Asset Valuation
David Spark
Prevention vs. Detection and Containment
David Spark
Data Classification
David Spark
Bug Bounties
David Spark
Shared Accounts
David Spark
Role of the BISO
David Spark
Security Budgets
David Spark
Drudgery of Cybercrime
David Spark
Shared Threat Intelligence
David Spark
API Security
David Spark
Securing a Cloud Migration
David Spark
InfoSec Fatigue
David Spark
Secure Access
David Spark
How Vendors Should Approach CISOs
David Spark
Trusting Security Vendor Claims
David Spark
Junior Cyber People
David Spark
What Cyber Pro Are You Trying to Hire?
David Spark
When Red Teams Break Down
David Spark
Is College Necessary for a Job in Cybersecurity?
David Spark
Calling Users Stupid
David Spark
XDR: Extended Detection and Response
David Spark
Legal Protection for CISOs
David Spark
Privacy Is An Uphill Battle
David Spark
Measuring the Success of Your Security Program
David Spark
Leaked Secrets in Code Repositories
David Spark
Securing Digital Transformations
David Spark
What's an Entry Level Cybersecurity Job?
David Spark
Data Protection and Visibility
David Spark
Why Don't More Companies Take Cybersecurity Seriously?
David Spark
Imposter Syndrome
David Spark
Inherently Vulnerable By Design
David Spark
Should CISOs Be Licensed Professionals?
David Spark
Are our Data Protection Strategies Evolving?
David Spark
Building a Security Team
David Spark
How Do You Know if You're Good at Security?
David Spark
Does a CISO Need Tech Skills?
David Spark
How to Make Cybersecurity More Efficient
David Spark
Data Destruction
David Spark
Should Finance or Legal Mentor Cyber?
David Spark
How Much Log Data Is Enough?
David Spark
Vendor CISOs
David Spark
What Is Security's Mission?
David Spark
Cloud Security Myths
David Spark
Cybersecurity Isn’t That Difficult
David Spark
Securing the Super Bowl and Other Huge Events
David Spark
Mentoring
David Spark
What’s the Obsession with Zero Trust?
David Spark
Insider Risk
David Spark
Do Startups Need a CISO?
David Spark
How Much Do You Know About Your Data?
David Spark
Security Hygiene for Software Development
David Spark
Hiring Talent with No Security Experience
David Spark
Fear of Automation
David Spark
Starting Pay for Cyber Staff
David Spark
Cloud Configuration Fails
David Spark
Salesforce Security
David Spark
Retaining Cyber Talent
David Spark
CISO Recruiting Is Broken
David Spark
Educating the Board About Cybersecurity
David Spark
How do I get my first cybersecurity job?
David Spark
Measuring the Success of Cloud Security
David Spark
What's the Value of Certifications?
David Spark
How Does Ransomware Enter the Network?
David Spark
First Steps as a CISO
David Spark
Managing Lateral Movement
David Spark
Preventing Ransomware
David Spark
Cybersecurity Is Not Easy to Get Into
David Spark
Convergence of SIEM and SOAR
David Spark
Can Technology Solve Phishing?
David Spark
Ransomware Kill Chain
David Spark
The "Are We Secure?" Question
David Spark
How to Be a Vendor that CISOs Love
David Spark
Why Is Security Recruiting So Broken?
David Spark
Proactive Vulnerability Management
David Spark
Ageism in Cybersecurity
David Spark
How Do We Turn Tables Against Adversaries?
David Spark
How Do You Measure Cybersecurity Success?
David Spark
Convergence of Physical and Digital Security
David Spark
How Can We Simplify Security?
David Spark
When Social Engineering Bypasses Our Cyber Tools
David Spark
Promises of Automation
David Spark
Making Cybersecurity Faster and More Responsive
David Spark
DDoS Solutions
David Spark
What Should We Stop Doing in Cybersecurity?
David Spark
Is Your Data Safer in the Cloud?
David Spark
How to Pitch to a Security Analyst
David Spark
Building a Cybersecurity Culture
David Spark
When Vendors Pounce on New CISOs
David Spark
Offensive Security
David Spark
Building a Data-First Security Program
David Spark
How to Think Like a Cybercrook
David Spark
Start a Cybersecurity Department from Scratch
David Spark
Virtual Patching
David Spark
Training for a Cyber Disaster
David Spark
Why Do So Many Cybersecurity Products Suck?
David Spark
Technical vs. Compliance Professionals
David Spark
Is Shift Left Working?
David Spark
Are We Taking Zero Trust Too Far?
David Spark
Does the Cybersecurity Industry Suck?
David Spark
Who Investigates Cyber Solutions?
David Spark
Where's the Trust in Zero Trust?
David Spark
Onboarding Cyber Professionals with No Experience
David Spark
Building a Security Awareness Training Program
David Spark
Getting Ahead of the Ongoing Malware Fight
David Spark
Can Security Be a Profit Center?
David Spark
How Is Our Data Being Weaponized Against Us?
David Spark
How Can We Improve Recruiting of CISOs and Security Leaders?
David Spark
How Can You Tell If Your Security Program Is Improving?
David Spark
What Is Attack Surface Profiling?
David Spark
Data Protection for Whatever Comes Next
David Spark
Practical Cybersecurity for IT Professionals
David Spark
We're All Still Learning Cyber
David Spark
Minimizing Damage from a Breach
David Spark
Roles to Prepare You to Be a CISO
David Spark
How to Follow Up With a CISO
David Spark
Can You Have Culture Fit and Diversity, or Are They Mutually Exclusive?
David Spark
Managing the Onslaught of Files
David Spark
How to Build a Greenfield Security Program
David Spark
Cybersecurity Burnout
David Spark
How to Engage with Non-Technical Business Leaders
David Spark
Moving Security from a Prevention to a Resilience Strategy
David Spark
Walk a Mile in a Security Recruiter's Shoes
David Spark
How Can We Make Sense of Cybersecurity Titles?
David Spark
Cybersecurity Budgets
David Spark
Do We Need a Marketing Manager for the Security Team?
David Spark
Reducing the Attack Surface
David Spark
How Should We Gauge a Company's Cyber Health?
David Spark
Can You Be a vCISO If You’ve Never Been a CISO?
David Spark
How Should We Discuss Cyber With the C-Suite?
David Spark
Do CISOs Have More Stress than Other C-Suite Jobs
David Spark
Ambulance Chasing Security Vendors
David Spark
Securing Unmanaged Assets
David Spark
What Can the Cyber Haves Do for the Cyber Have Nots?
David Spark
Why Is There a Cybersecurity Skills Gap?
David Spark
Limitations of Security Frameworks
David Spark
What Leads a Security Program: Risk or Maturity?
David Spark
How Can We Improve the Cyber Sales Cycle?
David Spark
Third Party Risk vs. Third Party Trust
David Spark
Can You Build a Security Program on Open Source?
David Spark
How to Become a CISO
David Spark
Why You Should Be Your Company's Next CISO
David Spark
Security That Accounts for Human Fallibility
David Spark
What We Love About Working in Cybersecurity
David Spark
Do Breaches Happen Because the Tool Fails, or the Tool Was Poorly Configured?
David Spark
How to Always Make a Business Case for Security
David Spark
Gartner Created Product Categories
David Spark
How Should Security Vendors Engage With CISOs?
David Spark
Successful Cloud Security
David Spark
Do RFPs Work?
David Spark
Reputational Damage from Breaches
David Spark
How Must Processes Change to Reduce Risk?
David Spark
How Should We Trust Entry Level Employees?
David Spark
How to Create a Positive Security Culture
David Spark
How To Get More People Into Cybersecurity
David Spark
How Should Security Better Engage with Application Owners?
David Spark
Let's Write Better Cybersecurity Job Descriptions
David Spark
Finding Your Security Community
David Spark
How Do We Get Better Control of Cloud Data?
David Spark
Securing SaaS Applications
David Spark
Improving Adoption of Least Privileged Access
David Spark
Create A Pipeline of Cyber Talent
David Spark
Security Concerns with ChatGPT
David Spark
How Do We Influence Secure Behavior?
David Spark
How Security Leaders Deal with Intense Stress
David Spark
Getting Ahead Of Your Threat Intelligence Program
David Spark
How to Prime Your Data Lake
David Spark
Cybersecurity Questions Heard Around the Kitchen Table
David Spark
How to Manage Users' Desires for New Technology
David Spark
Is Remote Work Helping or Hurting Cybersecurity?
David Spark
The Value of RSA, Black Hat, and Mega Cyber Tradeshows
David Spark
New SEC Rules for Cyber Security
David Spark
What's Entry Level in Cybersecurity?
David Spark
People Are the Top Attack Vector (Not the Weakest Link)
David Spark
Responsibly Embracing Generative AI
David Spark
Building a Cyber Strategy for Unknown Unknowns
David Spark
Mitigating Generative AI Risks
David Spark
Do We Have to Fix ALL the Critical Vulnerabilities?
David Spark
Warning Signs You're About To Be Attacked
David Spark
Doing Third Party Risk Management Right
David Spark
The Do's and Don'ts of Approaching CISOs
David Spark
Use Red Teaming To Build, Not Validate, Your Security Program
David Spark
CISOs Responsibilities Before and After an M&A
David Spark
Is "Compliance Doesn't Equal Security" a Pointless Argument?
David Spark
Why Do Cybersecurity Startups Fail?
David Spark
Tracking Anomalous Behaviors of Legitimate Identities
David Spark
When Is Data an Asset and When Is It a Liability?
David Spark
Viewing 250 out of 580 items
Load more
Lyt når som helst, hvor som helst
Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis
Lyt og læs så meget du har lyst til
Opdag et kæmpe bibliotek fyldt med fortællinger
Eksklusive titler + Mofibo Originals
Opsig når som helst
Prøv nu
Læs mere
Om Mofibo
Jobs
Investor Relations
Presse
Bæredygtighed
Udforsk
Søg
Bøger
Bogserier
Mofibo Originals
Podcasts
Forfattere
Indlæsere
Kategorier
Brugbare links
Hjælpecenter
Abonnementer
Køb gavekort
Indløs gavekort
Indløs kampagnekode
Studierabat hele livet
Sprog og region
Dansk
Danmark
Følg os
Privatlivspolitik
Medlemsvilkår
Cookies