04140nam 2200553 450 991083056850332120220606171248.01-119-78250-31-119-78251-11-119-78249-X17539204(MiAaPQ)EBC6855757(Au-PeEL)EBL6855757(CKB)20667481700041(OCoLC)1293250208(OCoLC)1268544962(OCoLC-P)1268544962(CaSebORM)9781119782483(EXLCZ)992066748170004120220225d2022 uy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierThe CISO evolution business knowledge for cybersecurity executives /Matthew K. Sharp, Kyriakos P. LambrosHoboken, New Jersey :Wiley,[2022]©20221 online resource (343 pages)Includes index.Print version: Sharp, Matthew K. The CISO Evolution Newark : John Wiley & Sons, Incorporated,c2022 9781119782483 Intro -- Table of Contents -- Title Page -- Copyright -- Dedication -- Foreword -- Preface -- Acknowledgments -- Introduction -- Part I - Foundational Business Knowledge -- Part II - Communication and Education -- Part III - Cybersecurity Leadership -- PART I: Foundational Business Knowledge -- CHAPTER 1: Financial Principles -- Opportunity -- Principle -- Application -- Key Insights -- Notes -- CHAPTER 2: Business Strategy Tools -- Opportunity -- Principle -- Application -- Key Insights -- Notes -- CHAPTER 3: Business Decisions -- Opportunity -- Principle -- Application -- Key Insights -- Notes -- CHAPTER 4: Value Creation -- Opportunity -- Principle -- Application -- Key Insights -- Notes -- CHAPTER 5: Articulating the Business Case -- Opportunity -- Principle -- Application -- Key Insights -- Notes -- PART II: Communication and Education -- CHAPTER 6: Cybersecurity: A Concern of the Business, Not Just IT -- Opportunity -- Principle -- Application -- Key Insights -- Notes -- CHAPTER 7: Translating Cyber Risk into Business Risk -- Opportunity -- Principle -- Application -- Key Insights -- Notes -- CHAPTER 8: Communication - You Do It Every Day (or Do You?) -- Opportunity -- Principle -- Application -- Key Insights -- Notes -- Part III: Cybersecurity Leadership -- CHAPTER 9: Relationship Management -- Opportunity -- Principle -- Application -- Key Insights -- Notes -- CHAPTER 10: Recruiting and Leading High Performing Teams -- Opportunity -- Principle -- Application -- Key Insights -- Notes -- CHAPTER 11: Managing Human Capital -- Opportunity -- Principle -- Application -- Key Insights -- Notes -- CHAPTER 12: Negotiation -- Opportunity -- Principle -- Application -- Key Insights -- Notes -- Conclusion -- Index -- End User License Agreement."Cybersecurity is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. A CISO (chief information security officer) is the senior-level executive within an organization responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected. The CISO directs staff in identifying, developing, implementing, and maintaining processes across the enterprise to reduce information and IT risks."--Provided by publisherChief information officersComputer securityManagement information systemsSecurity measuresChief information officers.Computer security.Management information systemsSecurity measures.658.4/038011Sharp Matthew K.1611194Lambros Kyriakos P.MiAaPQMiAaPQMiAaPQBOOK9910830568503321The CISO evolution3939324UNINA