How CIOs Can Solve the Security Puzzle: Tips And Techniques For CIOs To Use In Order To Secure Both Their IT Department And Their Company

As though staying on top of changing technology trends wasn’t enough, today's CIOs also find themselves being held responsible for securing the IT department as well as the rest of the company. This is a job that few of us have ever been trained to do; however, the stakes have never been higher.

What You'll Find Inside:

* VULNERABILITY MANAGEMENT: THE CIO’S OTHER JOB

* KEVIN MITNICK SPEAKS ABOUT IT SECURITY

* DATA PROTECTION SECRETS: CIOS KNOW THAT IT STARTS AT THE ENDPOINT

* THE INSIDER THREAT: WHAT CIOS NEED TO KNOW

Your company's senior management knows even less about IT security than you do. However, they view you as being the person who can keep them safe. If you can accomplish this task, then you will have secured your relationship with the CEO and CFO, if not then they may be looking for a new CIO.

In order to successful secure your department and your company, you are going to have to start at the network's endpoints and work your way in. This will involve creating security policies that everyone can live with and performing routine vulnerability management studies.

The key to any successful securing of a corporate network is to make sure that only the right people and applications are allowed to be there. This means that you'll need to implement an effective identify management program. You'll have to do the same thing for the applications that run on the company's network by creating a whitelisting solution that ensures that you are only executing the code that should be run.

At times dealing with the wide variety of IT security threats that your company will be facing will seem to be overwhelming. However, by taking the time to listen to what reformed hackers have to tell us, you'll be able to prioritize the threats and focus your time and energy where they'll do the most good.

This book has been written in order to provide you with a great starting point for ensuring that you've done everything that you can to protect your company. We'll show you what you need to take care of and how the bad guys are going to try to break into your networks. Follow the suggestions in this book and you'll have successfully secured your company's IT resources.

1120371594
How CIOs Can Solve the Security Puzzle: Tips And Techniques For CIOs To Use In Order To Secure Both Their IT Department And Their Company

As though staying on top of changing technology trends wasn’t enough, today's CIOs also find themselves being held responsible for securing the IT department as well as the rest of the company. This is a job that few of us have ever been trained to do; however, the stakes have never been higher.

What You'll Find Inside:

* VULNERABILITY MANAGEMENT: THE CIO’S OTHER JOB

* KEVIN MITNICK SPEAKS ABOUT IT SECURITY

* DATA PROTECTION SECRETS: CIOS KNOW THAT IT STARTS AT THE ENDPOINT

* THE INSIDER THREAT: WHAT CIOS NEED TO KNOW

Your company's senior management knows even less about IT security than you do. However, they view you as being the person who can keep them safe. If you can accomplish this task, then you will have secured your relationship with the CEO and CFO, if not then they may be looking for a new CIO.

In order to successful secure your department and your company, you are going to have to start at the network's endpoints and work your way in. This will involve creating security policies that everyone can live with and performing routine vulnerability management studies.

The key to any successful securing of a corporate network is to make sure that only the right people and applications are allowed to be there. This means that you'll need to implement an effective identify management program. You'll have to do the same thing for the applications that run on the company's network by creating a whitelisting solution that ensures that you are only executing the code that should be run.

At times dealing with the wide variety of IT security threats that your company will be facing will seem to be overwhelming. However, by taking the time to listen to what reformed hackers have to tell us, you'll be able to prioritize the threats and focus your time and energy where they'll do the most good.

This book has been written in order to provide you with a great starting point for ensuring that you've done everything that you can to protect your company. We'll show you what you need to take care of and how the bad guys are going to try to break into your networks. Follow the suggestions in this book and you'll have successfully secured your company's IT resources.

9.97 In Stock
How CIOs Can Solve the Security Puzzle: Tips And Techniques For CIOs To Use In Order To Secure Both Their IT Department And Their Company

How CIOs Can Solve the Security Puzzle: Tips And Techniques For CIOs To Use In Order To Secure Both Their IT Department And Their Company

by Jim Anderson
How CIOs Can Solve the Security Puzzle: Tips And Techniques For CIOs To Use In Order To Secure Both Their IT Department And Their Company

How CIOs Can Solve the Security Puzzle: Tips And Techniques For CIOs To Use In Order To Secure Both Their IT Department And Their Company

by Jim Anderson

eBook

$9.97 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers

LEND ME® See Details

Overview

As though staying on top of changing technology trends wasn’t enough, today's CIOs also find themselves being held responsible for securing the IT department as well as the rest of the company. This is a job that few of us have ever been trained to do; however, the stakes have never been higher.

What You'll Find Inside:

* VULNERABILITY MANAGEMENT: THE CIO’S OTHER JOB

* KEVIN MITNICK SPEAKS ABOUT IT SECURITY

* DATA PROTECTION SECRETS: CIOS KNOW THAT IT STARTS AT THE ENDPOINT

* THE INSIDER THREAT: WHAT CIOS NEED TO KNOW

Your company's senior management knows even less about IT security than you do. However, they view you as being the person who can keep them safe. If you can accomplish this task, then you will have secured your relationship with the CEO and CFO, if not then they may be looking for a new CIO.

In order to successful secure your department and your company, you are going to have to start at the network's endpoints and work your way in. This will involve creating security policies that everyone can live with and performing routine vulnerability management studies.

The key to any successful securing of a corporate network is to make sure that only the right people and applications are allowed to be there. This means that you'll need to implement an effective identify management program. You'll have to do the same thing for the applications that run on the company's network by creating a whitelisting solution that ensures that you are only executing the code that should be run.

At times dealing with the wide variety of IT security threats that your company will be facing will seem to be overwhelming. However, by taking the time to listen to what reformed hackers have to tell us, you'll be able to prioritize the threats and focus your time and energy where they'll do the most good.

This book has been written in order to provide you with a great starting point for ensuring that you've done everything that you can to protect your company. We'll show you what you need to take care of and how the bad guys are going to try to break into your networks. Follow the suggestions in this book and you'll have successfully secured your company's IT resources.


Product Details

BN ID: 2940046176278
Publisher: Jim Anderson
Publication date: 09/14/2014
Sold by: Smashwords
Format: eBook
File size: 5 MB

About the Author

Dr. Jim Anderson is a talented engineer, teacher, and marketing professional. Born in Iowa City, Iowa his family moved many times during his childhood eventually settling just outside of St. Louis Missouri in Edwardsville, Illinois. Dr. Anderson went on to earn four college degrees: three in Computer Science including a doctoral degree and an MBA in marketing. He has worked in the IT industry for over 25 years for both large companies (Boeing, Siemens, Alcatel, and Verizon) as well as at some start-ups during that whole "dot com" thing. Dr. Anderson is now the founder and President of Blue Elephant Consulting. Blue Elephant Consulting shows technical professionals and groups how to use their business communication skills to change the world. By using its Clear Blue Knowledge Systems Blue Elephant Consulting shows them how to become successful communicators and set their ideas free thereby changing the world. Dr. Anderson provides consulting, coaching, speaking and training products and services to help in 5 key areas of business communications: public speaking, product management, IT team management, IT department leadership, and negotiating. Based on his experiences with many different customers, Dr. Anderson has taken the lessons that he's learned in the real world and has documented both the issues and their solutions in the books that he has written. Each book is filled with a unique set of real world challenges that product managers, CIOs, negotiators, IT managers, and public speakers encounter on an almost daily basis. In clear, easy to understand language, Dr. Anderson lays out exactly what the challenge is and then how to go about easily solving it. In addition to running his company, Dr. Anderson has had the opportunity to teach college courses at multiple universities. While doing this Dr. Anderson discovered that his students had a real need for information on how to get their first job after they graduated. His after class one-on-one discussions about the tips and techniques that today's college students could use to simplify their job search lead to speaking engagements and eventually to the book "Making The Jump: How To Land Your First Job After College!"

From the B&N Reads Blog

Customer Reviews