Get Free Shipping on orders over $79
The Cybersecurity Manager's Guide - Todd  Barnum

The Cybersecurity Manager's Guide

By: Todd Barnum

eText | 18 March 2021 | Edition Number 1

At a Glance

eText


$42.89

or 4 interest-free payments of $10.72 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

If you're a cybersecurity professional, then you know how it often seems that no one cares about (or understands) information security. InfoSec professionals frequently struggle to integrate security into their companies' processes. Many are at odds with their organizations. Most are under-resourced. There must be a better way. This essential manager's guide offers a new approach to building and maintaining an information security program that's both effective and easy to follow.

Author and longtime chief information security officer (CISO) Todd Barnum upends the assumptions security professionals take for granted. CISOs, chief security officers, chief information officers, and IT security professionals will learn a simple seven-step process for building a new program or improving a current one.

  • Build better relationships across the organization
  • Align your role with your company's values, culture, and tolerance for information loss
  • Lay the groundwork for your security program
  • Create a communications program to share your team's contributions and educate your coworkers
  • Transition security functions and responsibilities to other teams
  • Organize and build an effective InfoSec team
  • Measure your company's ability to recognize and report security policy violations and phishing emails
on
Desktop
Tablet
Mobile

More in Data Encryption