CISO Redefined

CISO Redefined

CISO Redefined

Martin Gomberg / TBD

33,48 €
IVA incluido
Disponible
Editorial:
Cyberite LLC
Año de edición:
2018
Materia
Privacidad y protección de datos
ISBN:
9780998775104
33,48 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Last year the New York State Department of Finance enacted cyber-security regulations touted to be among the most stringent cyber-security law to date. These rules apply not only to New York financial entities, but those with whom they do business wherever located. The NYDFS cyber-security rules hold corporate boards and company executives accountable for enacting a comprehensive cyber-security program. Only months ago, the European Union began enforcement of the General Data Protection Regulation. This privacy law applies to companies globally, not just in the EU, and imposes enormous penalties for failures to adhere, again putting responsibility on corporate boards and leadership to assure compliance. Changing business, digital transformation, new markets, and new consumers, have produced a voracious demand for the collection, aggregation, and consumption of data. Executives and operating boards recognize that disruption and innovation will be the incubators of new ideas and market success but are challenged as to how to move forward and achieve a path to disruption without damage, and without excessive risk. They recognize that the opportunities to participate in new markets and transform, or to be ‘disruptive’, is not possible without a secure operating environment, and without a risk management strategy that enables new opportunity. The CISO increasingly is the executive called upon not just to protect, but to provide confidence, interpretation of risk, and measured response to threat. The CISO is also the executive called to provide the understanding, guidance, and leadership that enables the execution of complex business strategy within a context of risk. The growing importance of the CISO in leadership is a recognition of the new realities of business. Privacy and security are in focus everywhere. The message is clear and is embodied in law. Corporate leadership is now accountable. Their success is tied to the effectiveness of their security programs. And the success of security programs to the appointment of a competent Chief Information Security Officer, redefined for executive leadership, communication and business success. The sub-title of this book is Leadership, Business Protection and the Chief Information Security Officer. It is exactly the ability to assume leadership and an overarching role of protection in all aspects of business and business change that has redefined the CISO. Martin Gomberg, CIO, CISO, CISSP, CIPP/E, executive adviser and privacy specialist, brings a unique professional history and perspective to interpreting the changing role of the CISO and the emergence of the CISO Redefined.

Artículos relacionados

  • Handbook of Research on Emerging Developments in Data Privacy
    Manish Gupta
    Data collection allows today’s businesses to cater to each customer’s individual needs and provides a necessary edge in a competitive market. However, any breach in confidentiality can cause serious consequences for both the consumer and the company. The Handbook of Research on Emerging Developments in Data Privacy brings together new ideas on how to deal with potential leaks o...
  • The GnuTLS 3.6.1 Manual
    Nikos Mavrogiannopoulos / Simon Josefsson
    GnuTLS is a portable ANSI C based library which implements the protocols ranging from SSL 3.0 to TLS 1.2, accompanied with the required framework for authentication and public key infrastructure. Important features of the GnuTLS library include: Support for TLS 1.2, TLS 1.1, TLS 1.0 and SSL 3.0 protocols. Support for Datagram TLS 1.0 and 1.2. Support for handling and verifi...
    Disponible

    20,92 €

  • Information Assurance and Security Technologies for Risk Assessment and Threat Management
    Te-Shun Chou
    The rapid growth of Internet-based technology has led to the widespread use of computer networks such as Web search and email service. With this increased use, computer systems have inevitably become targets for attack. Once these attacks successfully explore the vulnerabilities of an information system, the confidential information in the system can be accessed and used by tho...
  • El derecho al olvido
    Lowry Pressly
    Cada día disminuye la parte de nuestra vida que no está bajo vigilancia y que no se convierte en datos. Podemos configurar los parámetros de privacidad en nuestros dispositivos y redes sociales, pero sabemos que nuestros esfuerzos son insignificantes ante el capitalismo de vigilancia y la manipulación algorítmica. En nuestra era hiperconectada, muchos han comenzado a preguntars...
    Disponible

    25,95 €

  • Windows Server 2016 Security, Certificates, and Remote Access Cookbook
    Jordan Krause
    ...
    Disponible

    47,31 €

  • The Abilene Net
    Gregg Powers
    ...
    Disponible

    20,31 €