Fr. 77.00

Securing the Enterprise - A Practical Guide for CISOs, CXOs, and IT Security Professionals

Englisch · Taschenbuch

Versand in der Regel in 6 bis 7 Wochen

Beschreibung

Mehr lesen

Cybersecurity is no longer just an IT issue; it is a business-critical function requiring executive oversight and strategic implementation. This book offers a practical approach to cybersecurity leadership, risk management, and frameworks such as NIST, MITRE ATT&CK, and Zero Trust.
The book blends executive strategy with hands-on cybersecurity methodologies, providing a holistic understanding for CXOs, CISOs, and IT security professionals.
By exploring real-world case studies and breaches, such as SolarWinds and Colonial Pipeline, this book equips you with proactive defense strategies, governance insights, and the technical knowledge required to secure enterprise infrastructures effectively.
 
What You Will Learn

  • Align cybersecurity with business strategy and executive decision making
  • Cover practical implementation of frameworks such as NIST CSF, ISO 27001, and Zero Trust
  • Respond to cyber incidents and build a resilient security culture
  • Understand key cybersecurity principles, including threat intelligence and risk management
  • Study advanced cybersecurity topics, including AI-driven threats, ransomware, and cloud security
 
Who This Book Is For
Cybersecurity professionals, CISOs, CIOs, IT security architects, and risk managers; plus business executives, Chief Experience Officers (CXOs), board members, compliance officers, graduate students in cybersecurity

Inhaltsverzeichnis

Part 1: Foundations of Cybersecurity.- Chapter 1: Introduction to Cybersecurity.- Chapter 2: Core Cybersecurity Concepts.- Chapter 3: The Threat Landscape.- Part 2: The Role of Leaders in Cybersecurity.- Chapter 4: The Role of CXOs & Executive Leaders.- Chapter 5: The Role of the Board of Directors.- Chapter 6: The CISO Role & Responsibilities.- Chapter 7: Leadership & Communication.- Chapter 8: CISO Skills & Competencies.- Part 3: Cybersecurity Frameworks & Regulations.- Chapter 9: Key Cybersecurity Frameworks.- Chapter 10: Compliance & Regulations.- Chapter 11: Implementing a Security Program.- Part 4: Advanced Topics in Cybersecurity.- Chapter 12: Cloud Security.- Chapter 13: Security Information & Event Management (SIEM).- Chapter 14: AI & Machine Learning in Cybersecurity.- Chapter 15: IoT Security.- Chapter 16: Blockchain & Cryptocurrency Security.- Chapter 17: Zero Trust Architecture (ZTA).- Part 5: Cybersecurity Tabletop Exercises (TTXs) & Case Studies.- Chapter 18: Cybersecurity Tabletop Exercises (TTXs).- Chapter 19: Notable Cybersecurity Incidents & Lessons Learned.- Chapter 20: Future of Cybersecurity.- Chapter 21: Tabletop Exercise - A Critical Tool for Incident Preparedness.- Chapter 22: David vs. Goliath: Cybersecurity's Constant Struggle.

Über den Autor / die Autorin










GS Jha is a seasoned IT and cybersecurity leader with ore than 25 years of experience driving transformational initiatives across global organizations. He has held CIO and CISO roles at CareDx, Accuray, Bio-Techne, and ThermoFisher Scientific, leading cybersecurity transformations, regulatory compliance (SOX, HIPAA, GDPR), and cost-saving IT initiatives exceeding $50M.

He holds a BS in Computer Engineering, an MS in Computer Science, and an MBA from Northwestern University (Kellogg), and is currently pursuing an MS in Cybersecurity from Georgia Institute of Technology.

A finalist for the 2024 Bay Area CIO ORBIE Award and recognized among the Top 10 Indian CIOs of the Year, Jha is known for his leadership in IT security, risk management, and digital transformation.

Zusammenfassung

Cybersecurity is no longer just an IT issue; it is a business-critical function requiring executive oversight and strategic implementation. This book offers a practical approach to cybersecurity leadership, risk management, and frameworks such as NIST, MITRE ATT&CK, and Zero Trust.
The book blends executive strategy with hands-on cybersecurity methodologies, providing a holistic understanding for CXOs, CISOs, and IT security professionals.
By exploring real-world case studies and breaches, such as SolarWinds and Colonial Pipeline, this book equips you with proactive defense strategies, governance insights, and the technical knowledge required to secure enterprise infrastructures effectively.
 
What You Will Learn

  • Align cybersecurity with business strategy and executive decision making
  • Cover practical implementation of frameworks such as NIST CSF, ISO 27001, and Zero Trust
  • Respond to cyber incidents and build a resilient security culture
  • Understand key cybersecurity principles, including threat intelligence and risk management
  • Study advanced cybersecurity topics, including AI-driven threats, ransomware, and cloud security
 
Who This Book Is For
Cybersecurity professionals, CISOs, CIOs, IT security architects, and risk managers; plus business executives, Chief Experience Officers (CXOs), board members, compliance officers, graduate students in cybersecurity

Produktdetails

Autoren GS Jha
Verlag Springer, Berlin
 
Sprache Englisch
Produktform Taschenbuch
Erschienen 10.11.2025
 
EAN 9798868816536
ISBN 9798868816536
Seiten 322
Abmessung 178 mm x 19 mm x 254 mm
Gewicht 649 g
Illustration XIX, 322 p. 49 illus.
Themen Naturwissenschaften, Medizin, Informatik, Technik > Informatik, EDV > Informatik

Governance, Netzwerksicherheit, Cybersecurity, Data Privacy, Incident Response, risk management, Data and Information Security, cloud security, Zero Trust, SOC Operations, NIST Framework, AI in Cybersecurity, MITRE ATT&CK, CISO

Kundenrezensionen

Zu diesem Artikel wurden noch keine Rezensionen verfasst. Schreibe die erste Bewertung und sei anderen Benutzern bei der Kaufentscheidung behilflich.

Schreibe eine Rezension

Top oder Flop? Schreibe deine eigene Rezension.

Für Mitteilungen an CeDe.ch kannst du das Kontaktformular benutzen.

Die mit * markierten Eingabefelder müssen zwingend ausgefüllt werden.

Mit dem Absenden dieses Formulars erklärst du dich mit unseren Datenschutzbestimmungen einverstanden.