Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: The expert's voice in cybersecurity
    Parallel Title: Erscheint auch als
    Keywords: Cyber intelligence (Computer security) ; Cyberterrorism ; Prevention ; Computer security ; Data protection ; Electronic books ; Electronic books ; local
    Abstract: Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity program that is seamlessly coordinated with policy, programmatics, IT life cycle, and assessment. Fail-safe cyberdefense is a pipe dream. Given sufficient time, an intelligent attacker can eventually defeat defensive measures protecting an enterprise's computer systems and IT networks. To prevail, an enterprise cybersecurity program must manage risk by detecting attacks early enough and delaying them long enough that the defenders have time to respond effectively. Enterprise Cybersecurity shows players at all levels of responsibility how to unify their organization's people, budgets, technologies, and processes into a cost-efficient cybersecurity program capable of countering advanced cyberattacks and containing damage in the event of a breach. The authors of Enterprise Cybersecurity explain at both strategic and tactical levels how to accomplish the mission of leading, designing, deploying, operating, managing, and supporting cybersecurity capabilities in an enterprise environment. The authors are recognized experts and thought leaders in this rapidly evolving field, drawing on decades of collective experience in cybersecurity and IT. In capacities ranging from executive strategist to systems architect to cybercombatant, Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, and Abdul Aslam have fought on the front lines of cybersecurity against advanced persistent threats to government, military, and business entities.
    Note: Place of publication taken from publisher's website. - Includes bibliographical references and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9781484232583
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: The expert's voice in cybersecurity
    Keywords: Computer security ; Computer crimes ; Prevention ; Computer networks ; Security measures ; Electronic books ; local ; Electronic books
    Abstract: Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats . The study guide will help you understand the book's ideas and put them to work. The guide can be used for self-study or in the classroom. Enterprise cybersecurity is about implementing a cyberdefense program that will succeed in defending against real-world attacks. While we often know what should be done, the resources to do it often are not sufficient. The reality is that the Cybersecurity Conundrum-what the defenders request, what the frameworks specify, and what the budget allows versus what the attackers exploit-gets in the way of what needs to be done. Cyberattacks in the headlines affecting millions of people show that this conundrum fails more often than we would prefer. Cybersecurity professionals want to implement more than what control frameworks specify, and more than what the budget allows. Ironically, another challenge is that even when defenders get everything that they want, clever attackers are extremely effective at finding and exploiting the gaps in those defenses, regardless of their comprehensiveness. Therefore, the cybersecurity challenge is to spend the available budget on the right protections, so that real-world attacks can be thwarted without breaking the bank. People involved in or interested in successful enterprise cybersecurity can use this study guide to gain insight into a comprehensive framework for coordinating an entire enterprise cyberdefense program. What You'll Learn Know the methodology of targeted attacks and why they succeed Master the cybersecurity risk management process Understand why cybersecurity capabilities are the foundation of effective cyberdefenses Organize a cybersecurity program's policy, people, budget, technology, and assessment Assess and score a cybersecurity program Report cybersecurity program status against compliance and regulatory frameworks Use the operational processes and supporting information systems of a successful cybersecurity program Create a data-driven and objectively managed cybersecurity program Discover how cybersecurity is evolving and will continue to ev...
    Note: Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Apress ;
    Language: English
    Pages: 1 online resource (xiv, 315 p.) , ill.
    Parallel Title: Erscheint auch als
    Keywords: Information technology ; Management ; Technological innovations ; Management ; Executives ; Interviews ; Electronic books ; Electronic books ; local
    Abstract: Scott Donaldson, Stanley Siegel and Gary Donaldson interview many of the world's most influential chief technology officers in CTOs at Work, offering a brand-new companion volume to the highly acclaimed bestseller Founders at Work by Jessica Livingston and Peter Seibel's best-selling Coders at Work , both from Apress. As the words "at work" suggest, the authors focus on how their interviewees tackle the day-to-day work of the CTO while revealing much more: how they got there, how they manage and allocate projects, and how they interact with business units and ensure that their companies take advantage of technologies, teamwork, and software development practices to respond to organizational needs and improve employee productivity. Surveying a variety of unique corporations, CTOs at Work offers insights into the present and future of CTOs in organizations around the world. What you'll learn How many chief technical officers from the world's leading corporations do their job, and the skills they consider most essential for carrying out their work effectively Interesting applications of technology and software development used to increase productivity or profitability in today's leading organizations The technology- and business-related challenges and opportunities that CTOs foresee in years to come Who this book is for Anyone interested in how a CTO views the use of technologies in an organization and leads its software development initiatives. This book is especially useful for managers, developers, and IT personnel charged with using automation to increase productivity. Indeed, it's not just for aspiring CTOs, but also for project managers, software engineers, and application developers who want a better understanding of the strategies their senior IT executives employ to make their organizations as productive and competitive as possible.
    Note: Includes index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...