001440452 000__ 04876cam\a2200529\a\4500 001440452 001__ 1440452 001440452 003__ OCoLC 001440452 005__ 20230309004604.0 001440452 006__ m\\\\\o\\d\\\\\\\\ 001440452 007__ cr\un\nnnunnun 001440452 008__ 211022s2021\\\\sz\\\\\\ob\\\\001\0\eng\d 001440452 019__ $$a1280196408$$a1280276865$$a1287778055$$a1292517771 001440452 020__ $$a9783030814120$$q(electronic bk.) 001440452 020__ $$a3030814122$$q(electronic bk.) 001440452 020__ $$z3030814114 001440452 020__ $$z9783030814113 001440452 0247_ $$a10.1007/978-3-030-81412-0$$2doi 001440452 035__ $$aSP(OCoLC)1280104693 001440452 040__ $$aYDX$$beng$$epn$$cYDX$$dGW5XE$$dEBLCP$$dDCT$$dOCLCF$$dDKU$$dOCLCO$$dOCLCQ$$dCOM$$dOCLCO$$dUKAHL$$dOCLCQ 001440452 049__ $$aISEA 001440452 050_4 $$aQA76.9.A25 001440452 08204 $$a658.4/78$$223 001440452 1001_ $$aBadhwar, Raj. 001440452 24514 $$aThe CISO's transformation :$$bsecurity leadership in a high threat landscape /$$cRaj Badhwar. 001440452 260__ $$aCham, Switzerland :$$bSpringer,$$c2021. 001440452 300__ $$a1 online resource 001440452 336__ $$atext$$btxt$$2rdacontent 001440452 337__ $$acomputer$$bc$$2rdamedia 001440452 338__ $$aonline resource$$bcr$$2rdacarrier 001440452 347__ $$atext file 001440452 347__ $$bPDF 001440452 504__ $$aIncludes bibliographical references and index. 001440452 5050_ $$aCISOs : Leading from the front! -- More CISOs on Corporate Boards -- Cyber program turnaround by a new CISO -- CISOs -- the next step! -- CISO Maturity Model -- CISO guidance on some Emerging and Disruptive Technologies -- See Something, Do Something -- My journey as a writer -- Defensive measures in the wake of the SolarWinds fallout -- Cyber Exceptionalism -- Special Needs, Disability, and Cybersecurity: often, a great fit -- Bias-free lexicon -- The grass is not always greener on the other side -- Let not any outage go to waste -- If you can't hire them, then develop them -- Should you accept Counteroffers? -- Importance of 1:1 Conversations -- The Cyber Hygiene Mantra -- Cybersecurity lessons from the breach of physical security at US Capitol building -- Protect society, the commonwealth, and the infrastructure -- post COVID-19 -- Self-Service Recovery Options for Bricked Windows Devices -- Certification and Accreditation -- Hack back or not -- CISOs need Liability Protection -- Enable Secure work-from-home. 001440452 506__ $$aAccess limited to authorized users. 001440452 520__ $$aThe first section of this book addresses the evolution of CISO (chief information security officer) leadership, with the most mature CISOs combining strong business and technical leadership skills. CISOs can now add significant value when they possess an advanced understanding of cutting-edge security technologies to address the risks from the nearly universal operational dependence of enterprises on the cloud, the Internet, hybrid networks, and third-party technologies demonstrated in this book. In our new cyber threat-saturated world, CISOs have begun to show their market value. Wall Street is more likely to reward companies with good cybersecurity track records with higher stock valuations. To ensure that security is always a foremost concern in business decisions, CISOs should have a seat on corporate boards, and CISOs should be involved from beginning to end in the process of adopting enterprise technologies. The second and third sections of this book focus on building strong security teams, and exercising prudence in cybersecurity. CISOs can foster cultures of respect through careful consideration of the biases inherent in the socio-linguistic frameworks shaping our workplace language and through the cultivation of cyber exceptionalism. CISOs should leave no stone unturned in seeking out people with unique abilities, skills, and experience, and encourage career planning and development, in order to build and retain a strong talent pool. The lessons of the breach of physical security at the US Capitol, the hack back trend, and CISO legal liability stemming from network and data breaches all reveal the importance of good judgment and the necessity of taking proactive stances on preventative measures. This book will target security and IT engineers, administrators and developers, CIOs, CTOs, CISOs, and CFOs. Risk personnel, CROs, IT, security auditors and security researchers will also find this book useful. 001440452 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed November 2, 2021). 001440452 650_0 $$aComputer security$$xManagement. 001440452 650_0 $$aExecutives. 001440452 650_6 $$aSécurité informatique$$xGestion. 001440452 655_0 $$aElectronic books. 001440452 77608 $$iPrint version:$$aBadhwar, Raj.$$tCISO's transformation.$$dCham, Switzerland : Springer, 2021$$z3030814114$$z9783030814113$$w(OCoLC)1257402318 001440452 852__ $$bebk 001440452 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-81412-0$$zOnline Access$$91397441.1 001440452 909CO $$ooai:library.usi.edu:1440452$$pGLOBAL_SET 001440452 980__ $$aBIB 001440452 980__ $$aEBOOK 001440452 982__ $$aEbook 001440452 983__ $$aOnline 001440452 994__ $$a92$$bISE