Cybertax: Managing the Risks and Results

·
· CRC Press
Rafbók
138
Síður
Gjaldgeng
Einkunnir og umsagnir eru ekki staðfestar  Nánar

Um þessa rafbók

Cybersecurity risk is a top-of-the-house issue for all organizations. Cybertax—Managing the Risks and Results is a must read for every current or aspiring executive seeking the best way to manage and mitigate cybersecurity risk. It examines cybersecurity as a tax on the organization and charts the best ways leadership can be cybertax efficient. Viewing cybersecurity through the cybertax lens provides an effective way for non–cybersecurity experts in leadership to manage and govern cybersecurity in their organizations

The book outlines questions and leadership techniques to gain the relevant information to manage cybersecurity threats and risk. The book enables executives to:

  • Understand cybersecurity risk from a business perspective
  • Understand cybersecurity risk as a tax (cybertax)
  • Understand the cybersecurity threat landscape
  • Drive business-driven questions and metrics for managing cybersecurity risk
  • Understand the Seven C’s for managing cybersecurity risk

Governing the cybersecurity function is as important as governing finance, sales, human resources, and other key leadership responsibilities Executive leadership needs to manage cybersecurity risk like they manage other critical risks, such as sales, finances, resources, and competition. This book puts managing cybersecurity risk on an even plane with these other significant risks that demand leaderships’ attention. The authors strive to demystify cybersecurity to bridge the chasm from the top-of-the-house to the cybersecurity function. This book delivers actionable advice and metrics to measure and evaluate cybersecurity effectiveness across your organization.

Um höfundinn

George Tsantes has been a partner in two leading consulting firms and the CTO of an identity management company. He has over 30 years of experience delivering innovative technology and cybersecurity solutions, including five patents in identity management.

Dr. James Ransome, PhD, CISSP, CISM is a veteran chief information security officer (CISO), chief security officer (CSO), and chief product security officer (CPSO) roles as well as an author and co-author of numerous cyber security books. He has a Ph.D. in information systems specializing in information security and is a Ponemon Institute Distinguished Fellow.

Gefa þessari rafbók einkunn.

Segðu okkur hvað þér finnst.

Upplýsingar um lestur

Snjallsímar og spjaldtölvur
Settu upp forritið Google Play Books fyrir Android og iPad/iPhone. Það samstillist sjálfkrafa við reikninginn þinn og gerir þér kleift að lesa með eða án nettengingar hvar sem þú ert.
Fartölvur og tölvur
Hægt er að hlusta á hljóðbækur sem keyptar eru í Google Play í vafranum í tölvunni.
Lesbretti og önnur tæki
Til að lesa af lesbrettum eins og Kobo-lesbrettum þarftu að hlaða niður skrá og flytja hana yfir í tækið þitt. Fylgdu nákvæmum leiðbeiningum hjálparmiðstöðvar til að flytja skrár yfir í studd lesbretti.