How CIOs Can Solve the Security Puzzle Tips And Techniques For CIOs To Use In Order To Secure Both Their IT Department And Their Company

Afbeeldingen

Inkijkexemplaar

Artikel vergelijken

  • Engels
  • Paperback
  • 9781502369574
  • 17 september 2014
  • 72 pagina's
  • -6144
Alle productspecificaties

Samenvatting

As though staying on top of changing technology trends wasn’t enough, today's CIOs also find themselves being held responsible for securing the IT department as well as the rest of the company. This is a job that few of us have ever been trained to do; however, the stakes have never been higher.

What You'll Find Inside:

* VULNERABILITY MANAGEMENT: THE CIO’S OTHER JOB

* KEVIN MITNICK SPEAKS ABOUT IT SECURITY

* DATA PROTECTION SECRETS: CIOS KNOW THAT IT STARTS AT THE ENDPOINT

* THE INSIDER THREAT: WHAT CIOS NEED TO KNOW

Your company's senior management knows even less about IT security than you do. However, they view you as being the person who can keep them safe. If you can accomplish this task, then you will have secured your relationship with the CEO and CFO, if not then they may be looking for a new CIO.

In order to successful secure your department and your company, you are going to have to start at the network's endpoints and work your way in. This will involve creating security policies that everyone can live with and performing routine vulnerability management studies.

The key to any successful securing of a corporate network is to make sure that only the right people and applications are allowed to be there. This means that you'll need to implement an effective identify management program. You'll have to do the same thing for the applications that run on the company's network by creating a whitelisting solution that ensures that you are only executing the code that should be run.

At times dealing with the wide variety of IT security threats that your company will be facing will seem to be overwhelming. However, by taking the time to listen to what reformed hackers have to tell us, you'll be able to prioritize the threats and focus your time and energy where they'll do the most good.

This book has been written in order to provide you with a great starting point for ensuring that you've done everything that you can to protect your company. We'll show you what you need to take care of and how the bad guys are going to try to break into your networks. Follow the suggestions in this book and you'll have successfully secured your company's IT resources.

Productspecificaties

Inhoud

Taal
en
Bindwijze
Paperback
Oorspronkelijke releasedatum
17 september 2014
Aantal pagina's
72
Ebook Formaat
-6144
Illustraties
Nee

Betrokkenen

Hoofdauteur
Jim Anderson

Lees mogelijkheden

Lees dit ebook op
Android (smartphone en tablet) | Kobo e-reader | Desktop (Mac en Windows) | iOS (smartphone en tablet) | Windows (smartphone en tablet)

Overige kenmerken

Extra groot lettertype
Nee
Product breedte
152 mm
Product hoogte
4 mm
Product lengte
229 mm
Studieboek
Nee
Verpakking breedte
152 mm
Verpakking hoogte
4 mm
Verpakking lengte
229 mm
Verpakkingsgewicht
109 g

EAN

EAN
9781502369574

Je vindt dit artikel in

Taal
Engels
Boek, ebook of luisterboek?
Boek
Studieboek of algemeen
Algemene boeken
Nog geen reviews

Kies gewenste uitvoering

Bindwijze : Paperback

Prijsinformatie en bestellen

Niet leverbaar

Ontvang eenmalig een mail of notificatie via de bol app zodra dit artikel weer leverbaar is.

Houd er rekening mee dat het artikel niet altijd weer terug op voorraad komt.

Lijst met gekozen artikelen om te vergelijken

Vergelijk artikelen