CISO Soft Skills: Securing Organizations Impaired by by Ron Collette, Visit Amazon's Michael Gentile Page, search

By Ron Collette, Visit Amazon's Michael Gentile Page, search results, Learn about Author Central, Michael Gentile, , Skye Gentile

As firms fight to enforce potent security features, all too usually they concentration exclusively at the tangible parts, comparable to constructing safety regulations or probability administration implementations. whereas this stuff are vitally important, they're in basic terms 1/2 the equation essential to verify defense luck. CISO smooth talents: Securing corporations Impaired by way of worker Politics, Apathy, and illiberal Perspectives provides instruments that empower safety practitioners to spot the intangible damaging influencers of defense that plague such a lot agencies, and gives innovations to spot, reduce, and triumph over those pitfalls.

The ebook starts by means of explaining how utilizing the inaccurate standards to degree safety may end up in a declare of enough protection whilst target evaluate demonstrates this to not be the case. The authors as an alternative suggest that companies degree the luck in their efforts utilizing a realistic technique that illustrates either the tangible and intangible specifications wanted by means of a fit safeguard effort.

The center part discusses the basis motives that negatively impact either a CISO and an organization’s skill to actually safe itself. those root factors include:

  • Employee apathy
  • Employee myopia or tunnel vision
  • Employee primacy, frequently exhibited as place of work politics
  • The infancy of the data defense discipline

These chapters clarify what a CISO can do approximately those defense constraints, supplying quite a few functional and actionable workouts, instruments, and methods to spot, restrict, and make amends for the impression of safeguard constraints in any kind of organization.

The ultimate chapters talk about a few proactive thoughts that CISOs can make the most of to successfully safe hard paintings environments. Reflecting the event and strategies of these which are within the trenches of recent firms, this quantity offers sensible principles which can make a distinction within the day-by-day lives of safeguard practitioners.

Show description

Read Online or Download CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives PDF

Similar security & encryption books

Error control coding: from theory to practice

This creation to simple coding innovations makes use of examples to provide an explanation for basic innovations and their functions. advanced arithmetic are stored to a minimal. Drawing from electronic communications and knowledge conception, the booklet emphasizes the choice of applicable codes and the layout of decoders. Chapters disguise convolution codes, linear block codes, cyclic codes, finite box mathematics, BCH codes, Reed Solomon codes, functionality calculations for block codes, multistage coding, and iterative coding.

Swanson on Internal Auditing Raising the Bar

This booklet presents concise remark on strategic matters concerning the means inner audit is demonstrated, deliberate and played. High-level matters sit down along functional counsel to make sure the e-book has an entice all degrees of inner audit administration and employees, as every one reader can dip right into a variety of significant themes.

Multimedia Content Encryption: Techniques and Applications

The frequent use of photograph, audio, and video information makes media content material security more and more worthy and pressing. for max security, it really is not adequate to simply keep an eye on entry rights. on the way to absolutely shield multimedia information from piracy or unauthorized use, it needs to be secured via encryption ahead of its transmission or distribution.

Smart TV Security: Media Playback and Digital Video Broadcast

This e-book discusses the rising subject of clever television safety, together with its implications on customer privateness. the writer offers chapters at the structure and performance of clever TVs, a variety of assaults and defenses, and linked hazards for shoppers. This comprises the newest assaults on broadcast-related electronic companies and integrated media playback, in addition to entry to built-in cameras and microphones.

Extra info for CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives

Example text

Though this issue has been raised with executive management, few seem to show any interest in the issue (apathy). When one of the executives is reasonably engaged, he or she asks general questions regarding the status of the company firewall or about antivirus and deems the situation under control (myopia). Complete Step 4 Security Strategy Mission and Mandate Roles and Responsibilities Security Policies © 2009 by Taylor & Francis Group, LLC Appendix Training and Awareness Formal Security Project Portfolio Consumers Security Team © 2009 by Taylor & Francis Group, LLC ◾ 259 260 ◾ CISO Soft Skills Exercise 21: Tying It All Together Objective The objective of this exercise is to measure the intangible elements of the True Security Model within a project or workgroup environment.

Do you feel that the efforts of the security program within the organization utilize mature and fully developed techniques and approaches? (Circle one) Yes No 2. Please list five terms that best describe the efforts of the security program. 3. Do you feel that you have enough training, skills, or knowledge to understand what the security program is doing at your organization and why it is doing it? (Circle one) Yes No If the responses come back predominantly illustrating that your security program is not perceived as mature, there is a good chance that some work needs to be done in mitigating the infancy constraint.

For example, say your organization chooses a highly comprehensive definition of security. What will that mean to different roles within that entity? Perhaps the chief executive officer (CEO) has to spend even more time explaining security to the board of directors—an act that would compel the sanest of individuals to contemplate removing their eye with a ballpoint pen as an alternative. The result of such a definition could also result in a doubling of accountability for the chief information security officer (CISO) when compared with a meaningless or trivial definition.

Download PDF sample

Rated 4.41 of 5 – based on 18 votes