48.95 In Stock
The CISO Desk Reference Guide, Volume 1, 2nd Edition is the greatly-anticipated update to the iconic first volume of the highly-respected two-volume set written by experienced practitioners and intended for recently-hired or promoted Chief Information Security Officers (CISOs). These easy-to-use guides are also perfect for individuals aspiring to become CISOs, as well as business and technical professionals interested in the topic of cybersecurity. Those with the titles Chief Technology Officer (CTOs), Chief Information Officer (CIOs), and Chief Privacy Officer will gain critical insights, and members of the board of directors and other executives responsible for information protection will find them invaluable. As a desk reference guide written specifically for CISOs, we hope this book and its companion CISO Desk Reference Guide, Volume 2 become trusted resources for you, your teams, and your colleagues in the C-suite. The different perspectives offered by the authors can be used as standalone refreshers, and the five immediate next steps for each chapter give the reader a robust set of actions based on roughly 100 years of relevant experience that will help you strengthen your cybersecurity programs. We hope you like the CISO Desk Reference Guide.
About the Author
Bill Bonney, Matt Stamper, and Gary Hayslip met in the summer of 2014 as members of the very inclusive and collaborative cybersecurity community of San Diego, California. Besides being the eighth largest city in the U.S. and a very welcoming community, San Diego is home to several pockets of technological innovation. These include very successful biotechnology, life sciences, and mobile technology industries; a plethora of defense contractors and aerospace research companies; a blossoming startup community in the Internet of Things (IoT) and Cybersecurity; and a thriving academic environment. San Diego is also home to the fewest number of "Fortune 500" company headquarters, per capita, in the U. S. Each of the authors has enjoyed over 30 years of success in the Information Technology field, but they have very different backgrounds. It became obvious as they got to know each other by participating on panels and speaking at industry events that these different backgrounds brought diverse and complementary perspectives to the problems the cybersecurity community currently faces. What started as a panel discussion on the role of the modern CISO sparked such a lively audience discussion that the authors began to consider turning into a book for new CISOs and CISOs at mid-size firms in particular.