Start tilbuddet
Lydbøger
E-bøger
Bogserier
Kategorier
Studierabat hele livet
Log Ind
Lydbøger
E-bøger
Bogserier
Kategorier
Studierabat hele livet
Log Ind
Start tilbuddet
Hjem
David Spark
Hjem
David Spark
Bøger fra David Spark
Can’t Our Employees Just Go Back to Stealing Pens?
Mike Johnson
How Can We Fix Alert Fatigue?
Geoff Belknap
Why Bother Helping Users When We Can Complain About Them?
Mike Johnson
Welcome to Defense in Depth
Geoff Belknap
Security Metrics
Geoff Belknap
Privacy
Geoff Belknap
Building an Information Security Council
Geoff Belknap
Insider Threats
Geoff Belknap
Secure Controls Framework
Geoff Belknap
Threat Intelligence
Geoff Belknap
Security IS the Business
Geoff Belknap
RSA 2019: Success or Failure?
Geoff Belknap
CISO Burnout
Geoff Belknap
Tools for Managing 3rd Party Risk
Geoff Belknap
Software Fixing Hardware Problems
Geoff Belknap
Machine Learning Failures
Geoff Belknap
Privileged Access Management
Geoff Belknap
Vulnerability Management
Geoff Belknap
Is the Cybersecurity Industry Solving Our Problems?
Geoff Belknap
How CISOs Discover New Solutions
Geoff Belknap
Cybersecurity Hiring
Geoff Belknap
Managing Obsolete (Yet Business Critical) Systems
Geoff Belknap
ERP Security
Geoff Belknap
Amplifying Your Security Posture
Geoff Belknap
Camry Security
Geoff Belknap
Tool Consolidation
Geoff Belknap
Economics of Data
Geoff Belknap
CISO Series One Year Review
Geoff Belknap
Cyber Harassment
Geoff Belknap
Bad Best Practices
Geoff Belknap
Hacker Culture
Geoff Belknap
ATT&CK Matrix
Geoff Belknap
Proactive Security
Geoff Belknap
100% Security
Geoff Belknap
Employee Hacking
Geoff Belknap
Cybersecurity Excuses
Geoff Belknap
Top CISO Communication Issues
Geoff Belknap
Ransomware
Geoff Belknap
Resiliency
Geoff Belknap
Securing the New Internet
Geoff Belknap
User-Centric Security
Geoff Belknap
Cyber Defense Matrix
Geoff Belknap
Best Starting Security Framework
Geoff Belknap
Is Product Security Improving?
Geoff Belknap
The Cloud and Shared Security
Geoff Belknap
Cybersecurity and the Media
Geoff Belknap
Cybersecurity Readiness as Hiring Criteria
Geoff Belknap
InfoSec Trends for 2020
Geoff Belknap
UX in Cybersecurity
Geoff Belknap
Account Takeover
Geoff Belknap
Building a Fully Remote Security Team
Geoff Belknap
The Iran Cybersecurity Threat
Geoff Belknap
Presenting to the Board
Geoff Belknap
Post Breach Desperation and Salary Negotiations
Geoff Belknap
When Are CISOs Responsible for Breaches?
Geoff Belknap
Lack of Diversity in Cybersecurity
Geoff Belknap
Personality Tests in the Workplace
Geoff Belknap
Toxic Security Teams
Geoff Belknap
CISO Tenure
Geoff Belknap
Hybrid Cloud
Geoff Belknap
Who Should the CISO Report To?
Geoff Belknap
Is Governance the Most Important Part of GRC?
Geoff Belknap
Internet of Things
Geoff Belknap
Responsible Disclosure
Geoff Belknap
Should Risk Lead GRC?
Geoff Belknap
Fix Security Problems with What You've Got
Geoff Belknap
DevSecOps
Geoff Belknap
Asset Valuation
Geoff Belknap
Prevention vs. Detection and Containment
Geoff Belknap
Data Classification
Geoff Belknap
Bug Bounties
Geoff Belknap
Shared Accounts
Geoff Belknap
Role of the BISO
Geoff Belknap
Security Budgets
Geoff Belknap
Drudgery of Cybercrime
Geoff Belknap
Shared Threat Intelligence
Geoff Belknap
API Security
Geoff Belknap
Securing a Cloud Migration
Geoff Belknap
InfoSec Fatigue
Geoff Belknap
Secure Access
Geoff Belknap
How Vendors Should Approach CISOs
Geoff Belknap
Trusting Security Vendor Claims
Geoff Belknap
Junior Cyber People
Geoff Belknap
What Cyber Pro Are You Trying to Hire?
Geoff Belknap
When Red Teams Break Down
Geoff Belknap
Is College Necessary for a Job in Cybersecurity?
Geoff Belknap
Calling Users Stupid
Geoff Belknap
XDR: Extended Detection and Response
Geoff Belknap
Legal Protection for CISOs
Geoff Belknap
Privacy Is An Uphill Battle
Geoff Belknap
Measuring the Success of Your Security Program
Geoff Belknap
Leaked Secrets in Code Repositories
Geoff Belknap
Securing Digital Transformations
Geoff Belknap
What's an Entry Level Cybersecurity Job?
Geoff Belknap
Data Protection and Visibility
Geoff Belknap
Why Don't More Companies Take Cybersecurity Seriously?
Geoff Belknap
Imposter Syndrome
Geoff Belknap
Inherently Vulnerable By Design
Geoff Belknap
Should CISOs Be Licensed Professionals?
Geoff Belknap
Are our Data Protection Strategies Evolving?
Geoff Belknap
Building a Security Team
Geoff Belknap
How Do You Know if You're Good at Security?
Geoff Belknap
Does a CISO Need Tech Skills?
Geoff Belknap
How to Make Cybersecurity More Efficient
Geoff Belknap
Data Destruction
Geoff Belknap
Should Finance or Legal Mentor Cyber?
Geoff Belknap
How Much Log Data Is Enough?
Geoff Belknap
Vendor CISOs
Geoff Belknap
What Is Security's Mission?
Geoff Belknap
Cloud Security Myths
Geoff Belknap
Cybersecurity Isn’t That Difficult
Geoff Belknap
Securing the Super Bowl and Other Huge Events
Geoff Belknap
Mentoring
Geoff Belknap
What’s the Obsession with Zero Trust?
Geoff Belknap
Insider Risk
Geoff Belknap
Do Startups Need a CISO?
Geoff Belknap
How Much Do You Know About Your Data?
Geoff Belknap
Security Hygiene for Software Development
Geoff Belknap
Hiring Talent with No Security Experience
Geoff Belknap
Fear of Automation
Geoff Belknap
Starting Pay for Cyber Staff
Geoff Belknap
Cloud Configuration Fails
Geoff Belknap
Salesforce Security
Geoff Belknap
Retaining Cyber Talent
Geoff Belknap
CISO Recruiting Is Broken
Geoff Belknap
Educating the Board About Cybersecurity
Geoff Belknap
How do I get my first cybersecurity job?
Geoff Belknap
Measuring the Success of Cloud Security
Geoff Belknap
What's the Value of Certifications?
Geoff Belknap
How Does Ransomware Enter the Network?
Geoff Belknap
First Steps as a CISO
Geoff Belknap
Managing Lateral Movement
Geoff Belknap
Preventing Ransomware
Geoff Belknap
Cybersecurity Is Not Easy to Get Into
Geoff Belknap
Convergence of SIEM and SOAR
Geoff Belknap
Can Technology Solve Phishing?
Geoff Belknap
Ransomware Kill Chain
Geoff Belknap
The "Are We Secure?" Question
Geoff Belknap
How to Be a Vendor that CISOs Love
Geoff Belknap
Why Is Security Recruiting So Broken?
Geoff Belknap
Proactive Vulnerability Management
Geoff Belknap
Ageism in Cybersecurity
Geoff Belknap
How Do We Turn Tables Against Adversaries?
Geoff Belknap
How Do You Measure Cybersecurity Success?
Geoff Belknap
Convergence of Physical and Digital Security
Geoff Belknap
How Can We Simplify Security?
Geoff Belknap
When Social Engineering Bypasses Our Cyber Tools
Geoff Belknap
Promises of Automation
Geoff Belknap
Making Cybersecurity Faster and More Responsive
Geoff Belknap
DDoS Solutions
Geoff Belknap
What Should We Stop Doing in Cybersecurity?
Geoff Belknap
Is Your Data Safer in the Cloud?
Geoff Belknap
How to Pitch to a Security Analyst
Geoff Belknap
Building a Cybersecurity Culture
Geoff Belknap
When Vendors Pounce on New CISOs
Geoff Belknap
Offensive Security
Geoff Belknap
Building a Data-First Security Program
Geoff Belknap
How to Think Like a Cybercrook
Geoff Belknap
Start a Cybersecurity Department from Scratch
Geoff Belknap
Virtual Patching
Geoff Belknap
Training for a Cyber Disaster
Geoff Belknap
Why Do So Many Cybersecurity Products Suck?
Geoff Belknap
Technical vs. Compliance Professionals
Geoff Belknap
Is Shift Left Working?
Geoff Belknap
Are We Taking Zero Trust Too Far?
Geoff Belknap
Does the Cybersecurity Industry Suck?
Geoff Belknap
Who Investigates Cyber Solutions?
Geoff Belknap
Where's the Trust in Zero Trust?
Geoff Belknap
Onboarding Cyber Professionals with No Experience
Geoff Belknap
Building a Security Awareness Training Program
Geoff Belknap
Getting Ahead of the Ongoing Malware Fight
Geoff Belknap
Can Security Be a Profit Center?
Geoff Belknap
How Is Our Data Being Weaponized Against Us?
Geoff Belknap
How Can We Improve Recruiting of CISOs and Security Leaders?
Geoff Belknap
How Can You Tell If Your Security Program Is Improving?
Geoff Belknap
What Is Attack Surface Profiling?
Geoff Belknap
Data Protection for Whatever Comes Next
Geoff Belknap
Practical Cybersecurity for IT Professionals
Geoff Belknap
We're All Still Learning Cyber
Geoff Belknap
Minimizing Damage from a Breach
Geoff Belknap
Roles to Prepare You to Be a CISO
Geoff Belknap
How to Follow Up With a CISO
Geoff Belknap
Can You Have Culture Fit and Diversity, or Are They Mutually Exclusive?
Geoff Belknap
Managing the Onslaught of Files
Geoff Belknap
How to Build a Greenfield Security Program
Geoff Belknap
Cybersecurity Burnout
Geoff Belknap
How to Engage with Non-Technical Business Leaders
Geoff Belknap
Moving Security from a Prevention to a Resilience Strategy
Geoff Belknap
Walk a Mile in a Security Recruiter's Shoes
Geoff Belknap
How Can We Make Sense of Cybersecurity Titles?
Geoff Belknap
Cybersecurity Budgets
Geoff Belknap
Do We Need a Marketing Manager for the Security Team?
Geoff Belknap
Reducing the Attack Surface
Geoff Belknap
How Should We Gauge a Company's Cyber Health?
Geoff Belknap
Can You Be a vCISO If You’ve Never Been a CISO?
Geoff Belknap
How Should We Discuss Cyber With the C-Suite?
Geoff Belknap
Do CISOs Have More Stress than Other C-Suite Jobs
Geoff Belknap
Ambulance Chasing Security Vendors
Geoff Belknap
Securing Unmanaged Assets
Geoff Belknap
What Can the Cyber Haves Do for the Cyber Have Nots?
Geoff Belknap
Viewing 200 out of 625 items
Load more
Læs mere
Om Mofibo
Jobs
Investor Relations
Presse
Bæredygtighed
Udforsk
Søg
Bøger
Bogserier
Mofibo Originals
Podcasts
Forfattere
Indlæsere
Kategorier
Brugbare links
Hjælpecenter
Abonnementer
Køb gavekort
Indløs gavekort
Indløs kampagnekode
Studierabat hele livet
Sprog og region
Dansk
Danmark
Følg os
Privatlivspolitik
Medlemsvilkår
Cookies