A Leader's Guide to Cybersecurity

A Leader's Guide to Cybersecurity
Author :
Publisher : Harvard Business Press
Total Pages : 162
Release :
ISBN-10 : 9781633698000
ISBN-13 : 1633698009
Rating : 4/5 (009 Downloads)

Book Synopsis A Leader's Guide to Cybersecurity by : Thomas J. Parenty

Download or read book A Leader's Guide to Cybersecurity written by Thomas J. Parenty and published by Harvard Business Press. This book was released on 2019-12-03 with total page 162 pages. Available in PDF, EPUB and Kindle. Book excerpt: Cybersecurity threats are on the rise. As a leader, you need to be prepared to keep your organization safe. Companies are investing an unprecedented amount of money to keep their data and assets safe, yet cyberattacks are on the rise--and the problem is worsening. No amount of technology, resources, or policies will reverse this trend. Only sound governance, originating with the board, can turn the tide. Protection against cyberattacks can't be treated as a problem solely belonging to an IT or cybersecurity department. It needs to cast a wide and impenetrable net that covers everything an organization does--from its business operations, models, and strategies to its products and intellectual property. And boards are in the best position to oversee the needed changes to strategy and hold their companies accountable. Not surprisingly, many boards aren't prepared to assume this responsibility. In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who have spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. This includes: Understanding cyber risks and how best to control them Planning and preparing for a crisis--and leading in its aftermath Making cybersecurity a companywide initiative and responsibility Drawing attention to the nontechnical dynamics that influence the effectiveness of cybersecurity measures Aligning the board, executive leadership, and cybersecurity teams on priorities Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition.


A Leader's Guide to Cybersecurity Related Books

Information Security Management Metrics
Language: en
Pages: 246
Authors: CISM, W. Krag Brotby
Categories: Business & Economics
Type: BOOK - Published: 2009-03-30 - Publisher: CRC Press

DOWNLOAD EBOOK

Spectacular security failures continue to dominate the headlines despite huge increases in security budgets and ever-more draconian regulations. The 20/20 hinds
A Leader's Guide to Cybersecurity
Language: en
Pages: 162
Authors: Thomas J. Parenty
Categories: Business & Economics
Type: BOOK - Published: 2019-12-03 - Publisher: Harvard Business Press

DOWNLOAD EBOOK

Cybersecurity threats are on the rise. As a leader, you need to be prepared to keep your organization safe. Companies are investing an unprecedented amount of m
Practical Information Security Management
Language: en
Pages: 253
Authors: Tony Campbell
Categories: Computers
Type: BOOK - Published: 2016-11-29 - Publisher: Apress

DOWNLOAD EBOOK

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an
Cybersecurity for Business
Language: en
Pages: 265
Authors: Larry Clinton
Categories: Business & Economics
Type: BOOK - Published: 2022-04-03 - Publisher: Kogan Page Publishers

DOWNLOAD EBOOK

Balance the benefits of digital transformation with the associated risks with this guide to effectively managing cybersecurity as a strategic business issue. Im
A Business Guide to Information Security
Language: en
Pages: 198
Authors: Alan Calder
Categories: Business & Economics
Type: BOOK - Published: 2005 - Publisher: Kogan Page Publishers

DOWNLOAD EBOOK

Nontechnical, simple, and straightforward, this handbook offers valuable advice to help managers protect their companies from malicious and criminal IT activity