Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000uam a2200385 a 4500 
003    CaSebORM 
005    20210421210022.5 
006    m     o  d         
007    cr cn          
008    161020s2021    xx      o           eng   
020    |z9781492076216 
020    |z9781492076216 
024 8  9781492076209 
035    (CaSebORM)9781492076209 
041 0  eng 
100 1  Barnum, Todd,|eauthor. 
245 14 The Cybersecurity Manager's Guide|h[O'Reilly electronic 
       resource] /|cBarnum, Todd. 
250    1st edition 
264  1 |bO'Reilly Media, Inc.,|c2021. 
300    1 online resource (176 pages) 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
347    text file 
365    |b39.99 
520    If you're a cybersecurity professional, then you know how 
       it often seems that no one cares about (or understands) 
       information security. InfoSec professionals frequently 
       struggle to integrate security into their companies' 
       processes. Many are at odds with their organizations. Most
       are under-resourced. There must be a better way. This 
       essential manager's guide offers a new approach to 
       building and maintaining an information security program 
       that's both effective and easy to follow. Author and 
       longtime chief information security officer (CISO) Todd 
       Barnum upends the assumptions security professionals take 
       for granted. CISOs, chief security officers, chief 
       information officers, and IT security professionals will 
       learn a simple seven-step process for building a new 
       program or improving a current one. Build better 
       relationships across the organization Align your role with
       your company's values, culture, and tolerance for 
       information loss Lay the groundwork for your security 
       program Create a communications program to share your 
       team's contributions and educate your coworkers Transition
       security functions and responsibilities to other teams 
       Organize and build an effective InfoSec team Measure your 
       company's ability to recognize and report security policy 
       violations and phishing emails 
533    Electronic reproduction.|bBoston, MA :|cSafari,|nAvailable
       via World Wide Web. 
538    Mode of access: World Wide Web. 
542    |fCopyright © 2021 Todd Barnum 
550    Made available through: Safari, an O’Reilly Media Company.
588 00 Online resource; Title from title page (viewed March 18, 
       2021) 
655  7 Electronic books.|2local 
710 2  Safari, an O’Reilly Media Company. 
856 40 |zConnect to this resource online|uhttps://
       ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/library/view/-/9781492076209/?ar