LEADER 01445nam--2200469---450- 001 990000492910203316 005 20100519144324.0 010 $a88-430-4022-3 035 $a0049291 035 $aUSA010049291 035 $a(ALEPH)000049291USA01 035 $a0049291 100 $a20010604d1992----km-y0itay0103----ba 101 $aita 102 $aIT 105 $a||||||||001yy 200 1 $a'Ndrangheta dall'unitą a oggi$fEnzo Ciconte$gprefazione di Nicola Trafaglia 205 $a2 ed. 210 $aRoma ; Bari$cLaterza$d1992 215 $aXVI, 415 p.$d21 cm 225 2 $aStoria e societą 410 $12001$aStoria e societą 606 0 $aMafia$yCalabria$xStoria 676 $a364.10609457 700 1$aCICONTE,$bEnzo$0139531 702 1$aTRANFAGLIA,$bNicola 801 0$aIT$bsalbc$gISBD 912 $a990000492910203316 951 $aXXX.A. Coll. 11/ 54 (COLL K 61)$b16537 G.$cXXX.A. Coll. 11/ 54 (COLL K)$d00247563 951 $aSANT.7 1 36$b1617 DDPG$cSANT.7 959 $aBK 969 $aGIU 969 $aDDPG 979 $aPATTY$b90$c20010604$lUSA01$h1736 979 $c20020403$lUSA01$h1658 979 $aPATRY$b90$c20040406$lUSA01$h1634 979 $aDDPG1$b90$c20070117$lUSA01$h1449 979 $aDDPG1$b90$c20070215$lUSA01$h1044 979 $aRSIAV5$b90$c20091125$lUSA01$h1133 979 $aRSIAV5$b90$c20100519$lUSA01$h1443 996 $aNdrangheta dall'Unitą a oggi$963369 997 $aUNISA LEADER 04140nam 2200553 450 001 9910830568503321 005 20220606171248.0 010 $a1-119-78250-3 010 $a1-119-78251-1 010 $a1-119-78249-X 024 8 $a17539204 035 $a(MiAaPQ)EBC6855757 035 $a(Au-PeEL)EBL6855757 035 $a(CKB)20667481700041 035 $a(OCoLC)1293250208 035 $a(OCoLC)1268544962 035 $a(OCoLC-P)1268544962 035 $a(CaSebORM)9781119782483 035 $a(EXLCZ)9920667481700041 100 $a20220225d2022 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 14$aThe CISO evolution $ebusiness knowledge for cybersecurity executives /$fMatthew K. Sharp, Kyriakos P. Lambros 210 1$aHoboken, New Jersey :$cWiley,$d[2022] 210 4$d©2022 215 $a1 online resource (343 pages) 300 $aIncludes index. 311 08$aPrint version: Sharp, Matthew K. The CISO Evolution Newark : John Wiley & Sons, Incorporated,c2022 9781119782483 327 $aIntro -- Table of Contents -- Title Page -- Copyright -- Dedication -- Foreword -- Preface -- Acknowledgments -- Introduction -- Part I - Foundational Business Knowledge -- Part II - Communication and Education -- Part III - Cybersecurity Leadership -- PART I: Foundational Business Knowledge -- CHAPTER 1: Financial Principles -- Opportunity -- Principle -- Application -- Key Insights -- Notes -- CHAPTER 2: Business Strategy Tools -- Opportunity -- Principle -- Application -- Key Insights -- Notes -- CHAPTER 3: Business Decisions -- Opportunity -- Principle -- Application -- Key Insights -- Notes -- CHAPTER 4: Value Creation -- Opportunity -- Principle -- Application -- Key Insights -- Notes -- CHAPTER 5: Articulating the Business Case -- Opportunity -- Principle -- Application -- Key Insights -- Notes -- PART II: Communication and Education -- CHAPTER 6: Cybersecurity: A Concern of the Business, Not Just IT -- Opportunity -- Principle -- Application -- Key Insights -- Notes -- CHAPTER 7: Translating Cyber Risk into Business Risk -- Opportunity -- Principle -- Application -- Key Insights -- Notes -- CHAPTER 8: Communication - You Do It Every Day (or Do You?) -- Opportunity -- Principle -- Application -- Key Insights -- Notes -- Part III: Cybersecurity Leadership -- CHAPTER 9: Relationship Management -- Opportunity -- Principle -- Application -- Key Insights -- Notes -- CHAPTER 10: Recruiting and Leading High Performing Teams -- Opportunity -- Principle -- Application -- Key Insights -- Notes -- CHAPTER 11: Managing Human Capital -- Opportunity -- Principle -- Application -- Key Insights -- Notes -- CHAPTER 12: Negotiation -- Opportunity -- Principle -- Application -- Key Insights -- Notes -- Conclusion -- Index -- End User License Agreement. 330 $a"Cybersecurity is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. A CISO (chief information security officer) is the senior-level executive within an organization responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected. The CISO directs staff in identifying, developing, implementing, and maintaining processes across the enterprise to reduce information and IT risks."--$cProvided by publisher 606 $aChief information officers 606 $aComputer security 606 $aManagement information systems$xSecurity measures 615 0$aChief information officers. 615 0$aComputer security. 615 0$aManagement information systems$xSecurity measures. 676 $a658.4/038011 700 $aSharp$b Matthew K.$01611194 702 $aLambros$b Kyriakos P. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910830568503321 996 $aThe CISO evolution$93939324 997 $aUNINA