Fight Fire with Fire: Proactive Cybersecurity Strategies for Today’s Leaders
- Length: 240 pages
- Edition: 1
- Language: English
- Publisher: Wiley
- Publication Date: 2021-09-22
- ISBN-10: 1119854261
- ISBN-13: 9781119854265
- Sales Rank: #0 (See Top 100 Books)
Organizations around the world are in a struggle for survival, racing to transform themselves in a herculean effort to adapt to the digital age, all while protecting themselves from headline-grabbing cybersecurity threats. As organizations succeed or fail, the centrality and importance of cybersecurity and the role of the CISO—Chief Information Security Officer—becomes ever more apparent. It’s becoming clear that the CISO, which began as a largely technical role, has become nuanced, strategic, and a cross-functional leadership position.
Fight Fire with Fire: Proactive Cybersecurity Strategies for Today’s Leaders explores the evolution of the CISO’s responsibilities and delivers a blueprint to effectively improve cybersecurity across an organization.
Fight Fire with Fire draws on the deep experience of its many all-star contributors. For example:
- Learn how to talk effectively with the Board from engineer-turned-executive Marianne Bailey, a top spokesperson well-known for global leadership in cyber
- Discover how to manage complex cyber supply chain risk with Terry Roberts, who addresses this complex area using cutting-edge technology and emerging standards
- Tame the exploding IoT threat landscape with Sonia Arista, a CISO with decades of experience across sectors, including healthcare where edge devices monitor vital signs and robots perform surgery
These are just a few of the global trailblazers in cybersecurity who have banded together to equip today’s leaders to protect their enterprises and inspire tomorrow’s leaders to join them.
With fires blazing on the horizon, there is no time for a seminar or boot camp. Cyber leaders need information at their fingertips. Readers will find insight on how to close the diversity and skills gap and become well-versed in modern cyber threats, including attacks coming from organized crime and nation-states.
This book highlights a three-pronged approach that encompasses people, process, and technology to empower everyone to protect their organization. From effective risk management to supply chain security and communicating with the board, Fight Fire with Fire presents discussions from industry leaders that cover every critical competency in information security.
Perfect for IT and information security professionals seeking perspectives and insights they can’t find in certification exams or standard textbooks, Fight Fire with Fire is an indispensable resource for everyone hoping to improve their understanding of the realities of modern cybersecurity through the eyes of today’s top security leaders.
Title Page Copyright Page About the Author Acknowledgments Contents Introduction How Can We Be Effective CISOs? Who This Book Is For Part 1 People Chapter 1 From Technologist to Strategist A Path to CISO Responsibilities of a CISO CISO Archetypes Evolution of the CISO Role Technical Strengths Versus Security Officer Strengths Chapter 2 Communicating with the Board The Board Speak Their Language Preparing for the Board Meeting Keep It Direct, Crisp, and Simple Working Directly for the Board: The Ultimate Case Study The Power of One-on-One Meetings Get to Know Your Board Chapter 3 Building a Culture of Security The Building Blocks of the Journey Program and Cultural Foundation Program Build and Cultural Engagement Target Maturity and Cultural Enlightenment Reaching Trusted Advisor Conclusion Chapter 4 Who Is Behind the Evolving Threat Landscape? Cyberattacks: Who Is Behind External Threats? Key Tactics The Insider Threat Conclusion Chapter 5 Addressing the Skills and Diversity Gap Assessing the Skills Gap Assessing the Diversity Gap The Power of Diverse Teams Bridging the Skills and Diversity Gaps Advice for Those Starting a Career in Cybersecurity To Move Up, Think Outside the Box Conclusion Part 2 Process Chapter 6 Effective Cyber Risk Management Requires Broad Collaboration Understanding Your Organization’s Risk Appetite Measuring Actual Risk Against Risk Appetite How to Engage in Governance and Oversight of Cyber Risk Thinking Strategically About Potential Risks Reducing Risk by Sharing Information Reducing Risk Through Cyber Insurance In Closing Chapter 7 Blending NOC and SOC The Vision The Danger of Blending Superficially or Too Quickly NOC and SOC Focus on Different Issues Approaches to Blending NOC and SOC Breaking Down Silos to Build Teams Working with Executive Leadership Processes for Integrating the NOC and SOC Technology for Improved Incident Response A Smooth but Slow Transition Chapter 8 Security by Design What Is Secure Development? What Does It Encompass? Skipping Ahead to Process and Technology—Wait, What? People Conclusion Chapter 9 From Enforcer to Strategic Partner Information Governance Council: Oversight That Works Automating Compliance Delivering Value in a Changing Environment Evolve Your Use of Maturity Frameworks Conclude with a Culture of Compliance Chapter 10 Don’t Let Cyber Supply Chain Security Be Your Weakest Link What Does C-SCRM Encompass? The Ultimate Moving Target The Expansion of Software-Based Functionality People: It Takes a Village Process: It Takes a Framework Technology: It Takes Automation Features to Look for in a Modern C-SCRM Solution Change Management: It Comes Back to the Village Conclusion Part 3 Technology Chapter 11 Cybersecurity in the Cloud Complexity, Meet Vulnerability More (Vendors & Connectivity) But Not Merrier More Risk, Same Budget Who Is Ultimately Responsible? Chapter 12 The Convergence of Cyber and Physical Expanding IoT Leads to Expanding Risks Moving Toward Solutions: Taking Stock Conclusion Chapter 13 Security-Driven Networking The Cloud Has Changed Everything About Security Last-Generation Security Solutions Are Inadequate How Security Products Should Adapt Future-Proofing: How CISOs Should Adapt Protecting Data: What, Where, Who, and How Steps to Security-Driven Networking What Does the Best Security-Driven Network Look Like? Chapter 14 Achieving End-to-End Security Yesterday’s Solutions Don’t Solve Today’s Problems Unified Threat Intelligence Integrated Security Platforms Enable and Protect Digital Innovation AI-Driven Security Operations Adaptive Cloud Security Conclusion Glossary Resources We Rely On Index EULA
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.