Start tilbuddet
Lydbøger
E-bøger
Bogserier
Kategorier
Studierabat hele livet
Log Ind
Lydbøger
E-bøger
Bogserier
Kategorier
Studierabat hele livet
Log Ind
Start tilbuddet
Hjem
David Spark
Hjem
David Spark
Bøger fra David Spark
Can’t Our Employees Just Go Back to Stealing Pens?
Mike Johnson
How Can We Fix Alert Fatigue?
Geoff Belknap
Why Bother Helping Users When We Can Complain About Them?
Mike Johnson
Welcome to Defense in Depth
Geoff Belknap
Security Metrics
Geoff Belknap
Privacy
Geoff Belknap
Building an Information Security Council
Geoff Belknap
Insider Threats
Geoff Belknap
Secure Controls Framework
Geoff Belknap
Threat Intelligence
Geoff Belknap
Security IS the Business
Geoff Belknap
RSA 2019: Success or Failure?
Geoff Belknap
CISO Burnout
Geoff Belknap
Tools for Managing 3rd Party Risk
Geoff Belknap
Software Fixing Hardware Problems
Geoff Belknap
Machine Learning Failures
Geoff Belknap
Privileged Access Management
Geoff Belknap
Vulnerability Management
Geoff Belknap
Is the Cybersecurity Industry Solving Our Problems?
Geoff Belknap
How CISOs Discover New Solutions
Geoff Belknap
Cybersecurity Hiring
Geoff Belknap
Managing Obsolete (Yet Business Critical) Systems
Geoff Belknap
ERP Security
Geoff Belknap
Amplifying Your Security Posture
Geoff Belknap
Camry Security
Geoff Belknap
Tool Consolidation
Geoff Belknap
Economics of Data
Geoff Belknap
CISO Series One Year Review
Geoff Belknap
Cyber Harassment
Geoff Belknap
Bad Best Practices
Geoff Belknap
Hacker Culture
Geoff Belknap
ATT&CK Matrix
Geoff Belknap
Proactive Security
Geoff Belknap
100% Security
Geoff Belknap
Employee Hacking
Geoff Belknap
Cybersecurity Excuses
Geoff Belknap
Top CISO Communication Issues
Geoff Belknap
Ransomware
Geoff Belknap
Resiliency
Geoff Belknap
Securing the New Internet
Geoff Belknap
User-Centric Security
Geoff Belknap
Cyber Defense Matrix
Geoff Belknap
Best Starting Security Framework
Geoff Belknap
Is Product Security Improving?
Geoff Belknap
The Cloud and Shared Security
Geoff Belknap
Cybersecurity and the Media
Geoff Belknap
Cybersecurity Readiness as Hiring Criteria
Geoff Belknap
InfoSec Trends for 2020
Geoff Belknap
UX in Cybersecurity
Geoff Belknap
Account Takeover
Geoff Belknap
Building a Fully Remote Security Team
Geoff Belknap
The Iran Cybersecurity Threat
Geoff Belknap
Presenting to the Board
Geoff Belknap
Post Breach Desperation and Salary Negotiations
Geoff Belknap
When Are CISOs Responsible for Breaches?
Geoff Belknap
Lack of Diversity in Cybersecurity
Geoff Belknap
Personality Tests in the Workplace
Geoff Belknap
Toxic Security Teams
Geoff Belknap
CISO Tenure
Geoff Belknap
Hybrid Cloud
Geoff Belknap
Who Should the CISO Report To?
Geoff Belknap
Is Governance the Most Important Part of GRC?
Geoff Belknap
Internet of Things
Geoff Belknap
Responsible Disclosure
Geoff Belknap
Should Risk Lead GRC?
Geoff Belknap
Fix Security Problems with What You've Got
Geoff Belknap
DevSecOps
Geoff Belknap
Asset Valuation
Geoff Belknap
Prevention vs. Detection and Containment
Geoff Belknap
Data Classification
Geoff Belknap
Bug Bounties
Geoff Belknap
Shared Accounts
Geoff Belknap
Role of the BISO
Geoff Belknap
Security Budgets
Geoff Belknap
Drudgery of Cybercrime
Geoff Belknap
Shared Threat Intelligence
Geoff Belknap
API Security
Geoff Belknap
Securing a Cloud Migration
Geoff Belknap
InfoSec Fatigue
Geoff Belknap
Secure Access
Geoff Belknap
How Vendors Should Approach CISOs
Geoff Belknap
Trusting Security Vendor Claims
Geoff Belknap
Junior Cyber People
Geoff Belknap
What Cyber Pro Are You Trying to Hire?
Geoff Belknap
When Red Teams Break Down
Geoff Belknap
Is College Necessary for a Job in Cybersecurity?
Geoff Belknap
Calling Users Stupid
Geoff Belknap
XDR: Extended Detection and Response
Geoff Belknap
Legal Protection for CISOs
Geoff Belknap
Privacy Is An Uphill Battle
Geoff Belknap
Measuring the Success of Your Security Program
Geoff Belknap
Leaked Secrets in Code Repositories
Geoff Belknap
Securing Digital Transformations
Geoff Belknap
What's an Entry Level Cybersecurity Job?
Geoff Belknap
Data Protection and Visibility
Geoff Belknap
Why Don't More Companies Take Cybersecurity Seriously?
Geoff Belknap
Imposter Syndrome
Geoff Belknap
Inherently Vulnerable By Design
Geoff Belknap
Should CISOs Be Licensed Professionals?
Geoff Belknap
Are our Data Protection Strategies Evolving?
Geoff Belknap
Viewing 100 out of 625 items
Load more
Læs mere
Om Mofibo
Jobs
Investor Relations
Presse
Bæredygtighed
Udforsk
Søg
Bøger
Bogserier
Mofibo Originals
Podcasts
Forfattere
Indlæsere
Kategorier
Brugbare links
Hjælpecenter
Abonnementer
Køb gavekort
Indløs gavekort
Indløs kampagnekode
Studierabat hele livet
Sprog og region
Dansk
Danmark
Følg os
Privatlivspolitik
Medlemsvilkår
Cookies