Skip to Main Content
Learn for Less – Enhance your auditing expertise today. Certify with confidence and save 25%. Find out more
ISO27001, iso 27001, iso27001, ISO/IEC 27001, ISO IEC 27001, 27001, ISO/IEC 27001 2022, Cyber Security, Data Protection, Cyber Strategy, CISO, Chief Information Security Officer, Chief Information Officer, Cyber Crime

The CISO Perspective – Understand the importance of the CISO in the cyber threat landscape

SKU: 6011
Authors: Barry Kouns, Jake Kouns
Publishers: IT Governance Publishing
Format: PDF
ISBN13: 9781787784451
Pages: 78
Published: 17 Oct 2023
Availability: Available now
Format: ePub
ISBN13: 9781787784468
Pages: 78
Published: 17 Oct 2023
Availability: Available now

Read this book to understand how:

  • The CISO’s role can improve an organisation’s cyber strategy;
  • An organisation’s view of information security, business continuity, compliance, safety and physical security is crucial for the success of its cyber security defence;
  • Soft skills are crucial for the CISO to communicate effectively with the board and other departments in the organisation;
  • Standards such as ISO 27001:2022 can help your organisation implement a suitable ISMS (information security management system); and
  • Risk management is imperative to identify, analyse, evaluate and protect the organisation’s assets.

 

Buy this book today to understand how to maximise the benefits of the CISO’s role in your organisation!

Buy now, pay later! Enjoy the benefits of paying by purchase order with an IT Governance corporate account. Apply online today or call our sales team on +44 (0)333 800 7000.

Paperback formats are available for all IT Governance Publishing titles on request.
Please contact us for further information:

team@itgovernancepublishing.co.uk +44 (0)333 666 9000

Options:
Price: £15.95
Overview

The CISO Perspective – Understand the importance of the CISO in the cyber threat landscape

The CISO (chief information security officer) has overall responsibility for corporate security strategy, but today’s CISO also needs to be in the business of managing information, not just securing it.

In its first edition, this book challenged security professionals to recognise that the serious and ever-changing nature of the security threats in 2011 demanded an organisation-wide strategic response, not just an automated reaction. It proposed that it was time for CISOs to transition from security coordinators to evangelists for risk management, while being technology innovators and trusted advisers to senior management.

In this updated edition, the security threat landscape has widened and the broadening of the CISO role has become a mandate for organisational survival. This book challenges and guides information security professionals to think about information security and risk management from the enterprise level, not just from the IT perspective.

Buy this book today to understand how to maximise the benefits of the CISO’s role in your organisation!

About the author

Barry Kouns

Barry Kouns is a security and risk management expert with more than 25 years’ experience in information security consulting, risk assessment and quality management. He formed and operates SQM Advisors, LLC, an information security, risk assessment and IT service management firm that has led numerous organisations to ISO/IEC 27001:2013 certification. Barry co-founded Risk Based Security, Inc., a vulnerability intelligence and data breach analytics organisation that was acquired by Flashpoint in 2022.

Jake Kouns

Jake Kouns holds a Master of Business Administration with a concentration in information security from James Madison University. He holds a number of certifications including CISSP®, CISM®, CISA®, and CGEIT®. Jake co-founded Risk Based Security, Inc., and is currently the Chief Innovation Officer at Flashpoint. He is well known from his presentations at security conferences including RSA, CISO Executive Summit, EntNet IEEE GLOBECOM, CanSecWest, and SyScan. Jake is also the co-founder of RVAsec, a Richmond, Virginia information security conference that has grown to host more than 500 attendees. He is the co-author of Information Technology Risk Management in Enterprise Environments and has also been interviewed numerous times as an expert in the security industry.

Customer Reviews

LEARN
FOR LESS
SAVE 25%
Loading...