03253nam 2200505 450 991055527100332120200608153331.01-119-64376-71-119-64378-31-119-64379-1(CKB)4100000010659503(MiAaPQ)EBC6132338(CaSebORM)9781119643777(EXLCZ)99410000001065950320200608d2020 uy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierTribe of hackers security leaders tribal knowledge from the best in cybersecurity leadership /Marcus J. Carey & Jennifer Jin1st editionHoboken, New Jersey :Wiley,[2020]©20201 online resource (314 pages)1-119-64377-5 Tribal Knowledge from the Best in Cybersecurity Leadership The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies for building, leading, and managing information security within organizations. Tribe of Hackers Security Leaders follows the same bestselling format as the original Tribe of Hackers, but with a detailed focus on how information security leaders impact organizational security. Information security is becoming more important and more valuable all the time. Security breaches can be costly, even shutting businessesand governments down, so security leadership is a high-stakes game. Leading teams of hackers is not always easy, but the future of your organization may depend on it. In this book, the world's top security experts answer the questions that Chief Information Security Officers and other security leaders are asking, including: -What's the most important decision you've made or action you've taken to enable a business risk' -How do you lead your team to execute and get results' -Do you have a workforce philosophy or unique approach to talent acquisition' -Have you created a cohesive strategy for your information security program or business unit' Anyone in or aspiring to an information security leadership role, whether at a team level or organization-wide, needs to read this book. Tribe of Hackers Security Leaders has the real-world advice and practical guidance you need to advance your cybersecurity leadership career.Penetration testing (Computer security)Information technologySecurity measuresManagementComputer securityComputer networksSecurity measuresPenetration testing (Computer security)Information technologySecurity measuresManagement.Computer security.Computer networksSecurity measures.005.8Carey Marcus J.1218185Jin JenniferMiAaPQMiAaPQMiAaPQBOOK9910555271003321Tribe of hackers security leaders2818074UNINA