The Security Leader’s Communication Playbook

The Security Leader’s Communication Playbook PDF Author: Jeffrey W. Brown
Publisher: CRC Press
ISBN: 1000440273
Category : Business & Economics
Languages : en
Pages : 394

Get Book

Book Description
This book is for cybersecurity leaders across all industries and organizations. It is intended to bridge the gap between the data center and the board room. This book examines the multitude of communication challenges that CISOs are faced with every day and provides practical tools to identify your audience, tailor your message and master the art of communicating. Poor communication is one of the top reasons that CISOs fail in their roles. By taking the step to work on your communication and soft skills (the two go hand-in-hand), you will hopefully never join their ranks. This is not a “communication theory” book. It provides just enough practical skills and techniques for security leaders to get the job done. Learn fundamental communication skills and how to apply them to day-to-day challenges like communicating with your peers, your team, business leaders and the board of directors. Learn how to produce meaningful metrics and communicate before, during and after an incident. Regardless of your role in Tech, you will find something of value somewhere along the way in this book.

The Security Leader’s Communication Playbook

The Security Leader’s Communication Playbook PDF Author: Jeffrey W. Brown
Publisher: CRC Press
ISBN: 1000440273
Category : Business & Economics
Languages : en
Pages : 394

Get Book

Book Description
This book is for cybersecurity leaders across all industries and organizations. It is intended to bridge the gap between the data center and the board room. This book examines the multitude of communication challenges that CISOs are faced with every day and provides practical tools to identify your audience, tailor your message and master the art of communicating. Poor communication is one of the top reasons that CISOs fail in their roles. By taking the step to work on your communication and soft skills (the two go hand-in-hand), you will hopefully never join their ranks. This is not a “communication theory” book. It provides just enough practical skills and techniques for security leaders to get the job done. Learn fundamental communication skills and how to apply them to day-to-day challenges like communicating with your peers, your team, business leaders and the board of directors. Learn how to produce meaningful metrics and communicate before, during and after an incident. Regardless of your role in Tech, you will find something of value somewhere along the way in this book.

The Security Leader's Communication Playbook

The Security Leader's Communication Playbook PDF Author: Jeffrey W. Brown
Publisher: CRC Press
ISBN: 9781003100294
Category : Business & Economics
Languages : en
Pages : 0

Get Book

Book Description
This book is for cybersecurity leaders across all industries and organizations. It is intended to bridge the gap between the data center and the board room. This book examines the multitude of communication challenges that CISOs are faced with every day and provides practical tools to identify your audience, tailor your message and master the art of communicating. Poor communication is one of the top reasons that CISOs fail in their roles. By taking the step to work on your communication and soft skills (the two go hand-in-hand), you will hopefully never join their ranks. This is not a "communication theory" book. It provides just enough practical skills and techniques for security leaders to get the job done. Learn fundamental communication skills and how to apply them to day-to-day challenges like communicating with your peers, your team, business leaders and the board of directors. Learn how to produce meaningful metrics and communicate before, during and after an incident. Regardless of your role in Tech, you will find something of value somewhere along the way in this book.

The Security Hippie

The Security Hippie PDF Author: Barak Engel
Publisher: CRC Press
ISBN: 1000530310
Category : Computers
Languages : en
Pages : 177

Get Book

Book Description
The Security Hippie is Barak Engel’s second book. As the originator of the “Virtual CISO” (fractional security chief) concept, he has served as security leader in dozens of notable organizations, such as Mulesoft, Stubhub, Amplitude Analytics, and many others. The Security Hippie follows his previous book, Why CISOs Fail, which became a sleeper hit, earning a spot in the Cybercannon project as a leading text on the topic of information security management. In this new book, Barak looks at security purely through the lens of story-telling, sharing many and varied experiences from his long and accomplished career as organizational and thought leader, and visionary in the information security field. Instead of instructing, this book teaches by example, sharing many real situations in the field and actual events from real companies, as well as Barak’s related takes and thought processes. An out-of-the-mainstream, counterculture thinker – Hippie – in the world of information security, Barak’s rich background and unusual approach to the field come forth in this book in vivid color and detail, allowing the reader to sit back and enjoy these experiences, and perhaps gain insights when faced with similar issues themselves or within their organizations. The author works hard to avoid technical terms as much as possible, and instead focus on the human and behavioral side of security, finding the humor inherent in every anecdote and using it to demystify the field and connect with the reader. Importantly, these are not the stories that made the news; yet they are the ones that happen all the time. If you’ve ever wondered about the field of information security, but have been intimidated by it, or simply wished for more shared experiences, then The Security Hippie is the perfect way to open that window by accompanying Barak on some of his many travels into the land of security.

Radical Reporting

Radical Reporting PDF Author: Sara I. James
Publisher: CRC Press
ISBN: 1000578399
Category : Computers
Languages : en
Pages : 238

Get Book

Book Description
Most people dread writing reports; they also dread reading reports. What they don’t realize is that the techniques that make writing more readable make it more powerful. This is especially relevant for professionals in areas such as audit, risk, compliance, and information security. This small volume provides the tools and techniques needed to improve reports. It does so through addressing crucial concepts all too often overlooked in the familiar rush to perform tasks, complete projects, and meet deadlines. These concepts – the role of culture in communication; the link between logic and language; the importance of organizing thoughts before writing; and how to achieve clarity – may seem academic or theoretical. They’re not. Unless writers understand their own thoughts, actions, and objectives, they cannot hope to communicate them at all – let alone clearly.

The Auditor’s Guide to Blockchain Technology

The Auditor’s Guide to Blockchain Technology PDF Author: Shaun Aghili
Publisher: CRC Press
ISBN: 1000776972
Category : Business & Economics
Languages : en
Pages : 294

Get Book

Book Description
The 21st century has been host to a number of information systems technologies in the areas of science, automotive, aviation and supply chain, among others. But perhaps one of its most disruptive is blockchain technology whose origin dates to only 2008, when an individual (or perhaps a group of individuals) using the pseudonym Satoshi Nakamoto published a white paper entitled Bitcoin: A peer-to-peer electronic cash system in an attempt to address the threat of “double- spending” in digital currency. Today, many top-notch global organizations are already using or planning to use blockchain technology as a secure, robust and cutting-edge technology to better serve customers. The list includes such well-known corporate entities as JP Morgan, Royal Bank of Canada, Bank of America, IBM and Walmart. The tamper-proof attributes of blockchain, leading to immutable sets of transaction records, represent a higher quality of evidence for internal and external auditors. Blockchain technology will impact the performance of the audit engagement due to its attributes, as the technology can seamlessly complement traditional auditing techniques. Furthermore, various fraud schemes related to financial reporting, such as the recording of fictitious revenues, could be avoided or at least greatly mitigated. Frauds related to missing, duplicated and identical invoices can also be greatly curtailed. As a result, the advent of blockchain will enable auditors to reduce substantive testing as inherent and control audit risks will be reduced thereby greatly improving an audit’s detection risk. As such, the continuing use and popularity of blockchain will mean that auditors and information systems security professionals will need to deepen their knowledge of this disruptive technology. If you are looking for a comprehensive study and reference source on blockchain technology, look no further than The Auditor’s Guide to Blockchain Technology: Architecture, Use Cases, Security and Assurance. This title is a must read for all security and assurance professionals and students looking to become more proficient at auditing this new and disruptive technology.

Controlling Privacy and the Use of Data Assets - Volume 1

Controlling Privacy and the Use of Data Assets - Volume 1 PDF Author: Ulf Mattsson
Publisher: CRC Press
ISBN: 1000599981
Category : Computers
Languages : en
Pages : 353

Get Book

Book Description
"Ulf Mattsson leverages his decades of experience as a CTO and security expert to show how companies can achieve data compliance without sacrificing operability." Jim Ambrosini, CISSP, CRISC, Cybersecurity Consultant and Virtual CISO "Ulf Mattsson lays out not just the rationale for accountable data governance, he provides clear strategies and tactics that every business leader should know and put into practice. As individuals, citizens and employees, we should all take heart that following his sound thinking can provide us all with a better future." Richard Purcell, CEO Corporate Privacy Group and former Microsoft Chief Privacy Officer Many security experts excel at working with traditional technologies but fall apart in utilizing newer data privacy techniques to balance compliance requirements and the business utility of data. This book will help readers grow out of a siloed mentality and into an enterprise risk management approach to regulatory compliance and technical roles, including technical data privacy and security issues. The book uses practical lessons learned in applying real-life concepts and tools to help security leaders and their teams craft and implement strategies. These projects deal with a variety of use cases and data types. A common goal is to find the right balance between compliance, privacy requirements, and the business utility of data. This book reviews how new and old privacy-preserving techniques can provide practical protection for data in transit, use, and rest. It positions techniques like pseudonymization, anonymization, tokenization, homomorphic encryption, dynamic masking, and more. Topics include Trends and Evolution Best Practices, Roadmap, and Vision Zero Trust Architecture Applications, Privacy by Design, and APIs Machine Learning and Analytics Secure Multiparty Computing Blockchain and Data Lineage Hybrid Cloud, CASB, and SASE HSM, TPM, and Trusted Execution Environments Internet of Things Quantum Computing And much more!

Agile Audit Transformation and Beyond

Agile Audit Transformation and Beyond PDF Author: Toby DeRoche
Publisher: CRC Press
ISBN: 1000604160
Category : Business & Economics
Languages : en
Pages : 115

Get Book

Book Description
Auditing at the speed of risk requires internal auditors to rethink the way we work. Agile auditing provides a path forward that blends the best elements from agile project management and internal audit best practices. Leaders in internal audit are ready to incorporate an agile audit mindset in their departments, but most of the available resources provide theoretical ideas. Even when outside consultants lead an agile transition, the consultants primarily focus on adding agile ceremonies without addressing the fundamental mindset change required for an agile audit transformation. This book provides a practical guide for audit leaders to follow as a playbook for implementing agile across their department, impacting every facet of the audit lifecycle, and addressing the mental shift required for making a lasting change. Every chapter includes discussion questions to facilitate discourse or just to help you analyze your own department. Next, we look at a typical internal audit department as they attempt the transition from a traditional audit methodology to agile auditing so we can learn from their missteps and successes. The guidance in Agile Audit Transformation and Beyond includes the basics of agile auditing, practical directions for shifting each phase of the audit life cycle, common hurdles faced during the transition, and forward-looking thought leadership on expanding beyond internal audit into agile assurance.

Riding the Wave

Riding the Wave PDF Author: Andrew Boyarsky
Publisher: CRC Press
ISBN: 104000167X
Category : Technology & Engineering
Languages : en
Pages : 343

Get Book

Book Description
Emergency managers and public safety professionals are more frequently being called on to address increasingly challenging and complex critical incidents, with a wider variety and intensity of hazards, threats, and community vulnerabilities. Much of the work that falls into the scope of emergency managers – prevention, preparedness, mitigation – is “blue sky planning” and can be contained and effectively managed within projects. This book provides a foundational project management methodology relevant to emergency management practice, and explains and demonstrates how project management can be applied in the context of emergency and public safety organizations. Special features include: an initial focus on risk assessment and identification of mitigation and response planning measures; a clear set of better practices, using a diverse set of examples relevant to today’s emergency environment, from projects to develop emergency response exercises to application development to hazard mitigation; a framework for managing projects at a strategic level and how to incorporate this into an organization’s program, and presents how to develop and manage an emergency program and project portfolio; and suitability as both a hands-on training guide for emergency management programs and a textbook for academic emergency management programs. This book is intended for emergency managers and public safety professionals who are responsible for developing emergency programs and plans, including training courses, job aids, computer applications and new technology, developing exercises, and for implementing these plans and components in response to an emergency event. This audience includes managers in emergency and first response functions such as fire protection, law enforcement and public safety, emergency medical services, public health and healthcare, sanitation, public works, business continuity managers, crisis managers, and all managers in emergency support functions as described by FEMA. This would include those who have responsibility for emergency management functions, even without the related title.

University Auditing in the Digital Era

University Auditing in the Digital Era PDF Author: Sezer Bozkus Kahyaoglu
Publisher: CRC Press
ISBN: 1000563006
Category : Business & Economics
Languages : en
Pages : 190

Get Book

Book Description
This book explores how digital transformation is reshaping the manner in which higher education sectors emerge, work, and evolve and how auditors should respond to this challenging and risky digital audit universe in transforming the higher education system. It serves to help professionals to understand the reality of performing the Chief Audit Executive (CAE) role in today’s evolving business economy, specifically in the higher education sector. It compares and contrasts the stated IIA standards with the challenges and realities auditors may face and provides alternative scenarios to gaining a "seat at the table." This book also provides insight into critical lessons learned when executing the CAE role relevant for digitally transforming universities. The main purpose of this study is to rethink the audit culture in the digital era and reveal the key characteristics that are open for improvement so that digitally transforming universities can be audited according to the higher education standards with a digitally supported value-added audit approach. Based on this approach, the audit culture is reassessed considering the digital university conceptual framework and business model. There are two main points to consider for the digital university work environment: traceability and auditability. In this respect, policy recommendations are made for best practices to achieve value-added digital audits in transforming universities. The book has been written from both the reality and academic perspectives of two experienced authors. Sezer is a past CAE, CEO, and long-term senior internal auditor who has worked in the internal audit role for various listed companies, financial institutions, and government entities. Erman has extensive information technology and university accreditation knowledge in the global higher education sector. This brings a blend of value-added approaches to the readers and speaks to issues about understanding and dealing with audit culture and business evolution in digitally transforming organizations along with the requirements for upholding IIA standards. Geared toward the experienced or new CAE, University Auditing in the Digital Era: Challenges and Lessons for Higher Education Professionals and CAEs can be a tool for all auditors to understand some of the challenges, issues, and potential alternative solutions when executing the role of university auditing. In addition, it can be a valuable reference for university administrators and CIOs, as well as academics and all stakeholders related to the higher education sector.

Information System Audit

Information System Audit PDF Author: Philippe Peret
Publisher: CRC Press
ISBN: 100061039X
Category : Business & Economics
Languages : en
Pages : 271

Get Book

Book Description
The digitalization of companies is a recurrent topic of conversation for managers. Companies are forced to evolve at least as fast as their competitors. They have to review their organization, their processes, and their way of working. This also concerns auditors in terms of their audit strategy and working methods. Digitalization is the tip of the iceberg that represents the increasing reliance on information technology of the company’s information system. Companies have seen new competitors succeed with a digital approach, competitors that have opened new markets or new ways of interacting with their customers, and all business processes can be digitalized. In this new paradigm, auditors have to renew themselves too. Long gone are the days of auditors specializing in one technique, like financial auditors or IT auditors. This makes it a phenomenal opportunity for auditing to renew itself, embracing the vision of the company’s information system: long live the information system auditors! This book proposes you to go step by step from a common understanding of our history of auditing to gradually defining and justifying the impacts of digitalization on the audit strategy and the preparation of audits.