LEADER 00000cam a2200541Mi 4500 003 OCoLC 005 20240129213017.0 006 m o d 007 cr cnu---unuuu 008 201110s2021 xx o 000 0 eng d 020 9781492076162|q(electronic book) 020 1492076163|q(electronic book) 020 9781492076186|q(electronic bk.) 020 149207618X|q(electronic bk.) 020 9781492076216 020 149207621X 029 1 AU@|b000068857310 035 (OCoLC)1224946074 037 0EE6A87C-8517-4906-9880-A3CDCC2FD620|bOverDrive, Inc. |nhttp://www.overdrive.com 040 VT2|beng|erda|epn|cVT2|dTOH|dEBLCP|dN$T|dOCLCO|dYDX|dOCLCF |dOCLCQ|dTEFOD|dOCLCO|dOCLCQ|dOCLCO|dOCLCL 049 INap 082 04 005.8068 082 04 005.8068|223 099 eBook O'Reilly for Public Librairies 100 1 Barnum, Todd. 245 10 Cybersecurity Manager's Guide /|cTodd Barnum.|h[O'Reilly electronic resource] 264 1 [Place of publication not identified] :|bO'Reilly Media, Inc.,|c2021. 300 1 online resource 336 text|btxt|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 500 Title from content provider. 520 If you're a leader in Cybersecurity, then you know it often seems like no one cares about--or understands-- information security. Infosec professionals struggle to integrate security into their companies. Most are under resourced. Most are at odds with their organizations. There must be a better way. This essential manager's guide offers a new approach to building and maintaining an information security program that's both effective and easy to follow. Author and longtime infosec leader Todd Barnum upends the assumptions security professionals take for granted. CISOs, CSOs, CIOs, and IT security professionals will learn a simple seven-step process that will help you build a new program or improve your current program. Build better relationships with IT and other teams within your organization Align your role with your company's values, culture, and tolerance for information loss Lay the groundwork for your security program Create a communications program to share your team's contributions and educate your coworkers Transition security functions and responsibilities to other teams Organize and build an effective infosec team Measure your progress with two key metrics: your staff's ability to recognize and report security policy violations and phishing emails. 588 0 Print version record. 590 O'Reilly|bO'Reilly Online Learning: Academic/Public Library Edition 650 0 Computer security. 650 0 Computer security|xManagement. 650 6 Sécurité informatique. 650 6 Sécurité informatique|xGestion. 650 7 Computer security|2fast 650 7 Computer security|xManagement|2fast 856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https:// learning.oreilly.com/library/view/~/9781492076209/?ar |zAvailable on O'Reilly for Public Libraries 938 ProQuest Ebook Central|bEBLB|nEBL6526782 938 EBSCOhost|bEBSC|n2895812 938 YBP Library Services|bYANK|n302016019 938 YBP Library Services|bYANK|n16667303 994 92|bJFN