Business executives consider what is necessary to protect the company. It comes down to people, process and technology, organized within an information security program. Everything has its place within the program, including business processes, assets and the right blend of controls to protect them.
Business executives consider what is necessary to protect the company. It comes down to people, process and technology, organized within an information security program. Everything has its place within the program, including business processes, assets and the right blend of controls to protect them.
Gideon T. Rasmussen is a cybersecurity leader with over 20 years of experience in corporate and military organizations. Gideon has designed and led programs including Information Security (CISO), PCI - Payment Card Security, Third Party Risk Management, Application Security and Information Risk Management. He has diverse cybersecurity industry experience within banking, startups, insurance, pharmaceuticals, DoD/USAF, aerospace and defense, state government, advertising and talent management. Gideon is a sought-after speaker, addressing audiences at conferences, universities and coporate events. He has authored the book Program Architecture: Fight the Good Fight. A veteran of the United States Air Force, Gideon has completed the Bataan Memorial Death March four times. Gideon T. Rasmussen Cybersecurity Executive Program Architect CISSP, CRISC, CISA, CISM, CIPP
Inhaltsangabe
Author Biography Table of Figures Introduction Chapter 1: Prove Yourself Ready Now Chapter 2: Team Development and Retention Chapter 3: Program Maturity Chapter 4: Influence Support and Funding Chapter 5: Cyber Threat Intelligence Chapter 6: Third Party Risk Management Chapter 7: Metrics and Reporting Chapter 8: Insider Risk Monitoring and Response Chapter 9: Threat Landscape and Controls Analysis Chapter 10: Conduct an Assessment Chapter 11: Crisis Communications Chapter 12: Control by Governance Appendix Index References
Author Biography Table of Figures Introduction Chapter 1: Prove Yourself Ready Now Chapter 2: Team Development and Retention Chapter 3: Program Maturity Chapter 4: Influence Support and Funding Chapter 5: Cyber Threat Intelligence Chapter 6: Third Party Risk Management Chapter 7: Metrics and Reporting Chapter 8: Insider Risk Monitoring and Response Chapter 9: Threat Landscape and Controls Analysis Chapter 10: Conduct an Assessment Chapter 11: Crisis Communications Chapter 12: Control by Governance Appendix Index References
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826