Keeping the Barbarians Out: How CIOs Can Secure Their Department and Company: Tips and Techniques for CIOs to Use in Order to Secure Both Their IT Department and Their Company
Written by Dr. Jim Anderson
Narrated by Dr. Jim Anderson
()
About this audiobook
There are a lot of bad guys out there. For some odd reason, a lot of them seem to want to break into your company's networks and applications. As the CIO, it's your job to make sure that this does not happen. Got any thoughts on how to go about doing that?
What You'll Find Inside:
- CIO’S NEED TO LEARN HOW TO DEFEND AGAINST THE INSIDER THREAT
- WHY BYOD SPELLS DOOM FOR CIOS
- DO WE REALLY NEED TO ENCRYPT OUR CUSTOMER DATA? 3 WAYS TO GET YOUR COMPANY TO TAKE DIGITAL SECURITY SERIOUSLY
As much as we like to spend our time looking outwards in order to detect the next threat that our company may be facing, perhaps we're looking in the wrong direction. Just as big of a deal may be the insider threat that lurks within the company. No matter where it comes from, cybercrime is your problem to deal with.
CIOs have to deal with trends as they come and go. Right now the Bring Your Own Device To Work (BYOD) phase is in full swing and if you aren't careful could cause a lot of problems for the IT department. At the same time, it's the code that your teams create that will secure your applications. Do you know if they are writing secure code or are they leaving doors wide open?
In order to measure where the threats are coming from and how big of deal they are, CIOs need to become comfortable with measuring the level of risk that they are dealing with. A big part of measuring risk is getting information about threats from other CIOs. This can be difficult to do because CIOs really don't like to share information like this.
Since we can't always be certain that we can keep the bad guys out, we need to make sure that we've taken the needed steps to secure our networks. Should they happen to get inside of the company, we need to take extra steps to make sure that they can't get what they came for. This brings up the interesting question of whether or not we should go to the effort and expense of encrypting our customer data.
No matter what our final decision on encrypting the company's digital assets is, we still have a responsibly as CIO to make sure that the company understands the threats that it is facing and that it starts to take digital security seriously.
More audiobooks from Dr. Jim Anderson
How to Become a Better Speaker By Changing How You Speak: Change Techniques that Will Transform a Speech into a Memorable Event Rating: 4 out of 5 stars4/5Solving the Technology Challenge for IT Managers: Technologies that IT Managers Can Use in Order to Make Their Teams More Productive Rating: 0 out of 5 stars0 ratingsCritical CIO Management Skills: Decision Making Skills That Every CIO Needs To Have In Order To Be Able To Make The Right Choice Rating: 0 out of 5 stars0 ratingsMaking the Jump: How to Land Your Dream Job When You Get Out of College! Rating: 0 out of 5 stars0 ratingsManaging Your Product Manager Career: How Product Managers Can Find and Succeed in the Right Job Rating: 0 out of 5 stars0 ratingsThe Business of Being a CIO: How CIOs Can Use Their Technical Skills to Help Their Company Solve Real-World Business Problems Rating: 0 out of 5 stars0 ratingsCIO Business Skills: How CIOs Can Work Effectively with the Rest of the Company! Rating: 0 out of 5 stars0 ratingsHow to Show What You Mean During a Presentation: How to use Visual Techniques to Transform a Speech into a Memorable Event Rating: 0 out of 5 stars0 ratingsSecrets to Planning the Perfect Speech for Curators: How to Plan to Give the Best Speech of Your Life! Rating: 0 out of 5 stars0 ratings
Related to Keeping the Barbarians Out
Related audiobooks
Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit Rating: 0 out of 5 stars0 ratingsHackable: How to Do Application Security Right Rating: 0 out of 5 stars0 ratingsWhat CIOs Need to Know About Working With Partners Rating: 0 out of 5 stars0 ratingsZero Trust and Third-Party Risk: Reduce the Blast Radius Rating: 0 out of 5 stars0 ratingsCybersecurity for Beginners: Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide Rating: 0 out of 5 stars0 ratingsHow CIOs Can Make Innovation Happen: Tips and Techniques for CIOs to Use in Order to Make Innovation Happen in Their IT Department Rating: 0 out of 5 stars0 ratingsHow to Build High Performance IT Teams: Tips and Techniques that IT Managers Can Use in Order to Develop Productive Teams Rating: 0 out of 5 stars0 ratingsThe Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Rating: 0 out of 5 stars0 ratingsManaging Your CIO Career: Steps that CIOs Have to Take in Order to Have a Long and Successful Career Rating: 0 out of 5 stars0 ratingsSolving the Technology Challenge for IT Managers: Technologies that IT Managers Can Use in Order to Make Their Teams More Productive Rating: 0 out of 5 stars0 ratingsDigital Resilience: Is Your Company Ready for the Next Cyber Threat? Rating: 4 out of 5 stars4/5The Business of Being a CIO: How CIOs Can Use Their Technical Skills to Help Their Company Solve Real-World Business Problems Rating: 0 out of 5 stars0 ratingsCybercrime Investigators Handbook Rating: 0 out of 5 stars0 ratings8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Rating: 4 out of 5 stars4/5Hack Your Way to Security Bundle, 2 in 1 Bundle Rating: 0 out of 5 stars0 ratingsYou CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions Rating: 0 out of 5 stars0 ratingsCIO Secrets for Growing Innovation: Tips and Techniques for CIOs to Use in Order to Make Innovation Happen in Their IT Department Rating: 0 out of 5 stars0 ratingsA Leader's Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Rating: 0 out of 5 stars0 ratingsCyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Rating: 4 out of 5 stars4/5The Personal Cybersecurity Manual: How Anyone Can Protect Themselves from Fraud, Identity Theft, and Other Cybercrimes Rating: 0 out of 5 stars0 ratingsPhishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails Rating: 4 out of 5 stars4/5Unleashing the Power of IT: Bringing People, Business, and Technology Together Rating: 4 out of 5 stars4/5HACKING: Denial of Service Attacks Rating: 4 out of 5 stars4/5The Smartest Person in the Room Rating: 5 out of 5 stars5/5Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Rating: 5 out of 5 stars5/5
Management For You
The 7 Habits of Highly Effective People: 30th Anniversary Edition Rating: 5 out of 5 stars5/5Radical Candor: Fully Revised & Updated Edition: Be a Kick-Ass Boss Without Losing Your Humanity Rating: 4 out of 5 stars4/5The 7 Habits of Highly Effective People Rating: 4 out of 5 stars4/5Company Rules: Or Everything I Know About Business I Learned from the CIA Rating: 4 out of 5 stars4/5The 12 Week Year: Get More Done in 12 Weeks than Others Do in 12 Months Rating: 4 out of 5 stars4/5The 6 Types of Working Genius: A Better Way to Understand Your Gifts, Your Frustrations, and Your Team Rating: 5 out of 5 stars5/5The Introverted Leader: Building on Your Quiet Strength Rating: 4 out of 5 stars4/5The Authentic Leader: Five Essential Traits of Effective, Inspiring Leaders Rating: 4 out of 5 stars4/5Good to Great Rating: 5 out of 5 stars5/5The E-Myth Revisited: Why Most Small Businesses Don't Work and Rating: 5 out of 5 stars5/5Radical Candor: Be a Kick-Ass Boss Without Losing Your Humanity Rating: 4 out of 5 stars4/5The Hard Thing About Hard Things: Building a Business When There Are No Easy Answers Rating: 5 out of 5 stars5/5The Coaching Habit: Say Less, Ask More & Change the Way You Lead Forever Rating: 5 out of 5 stars5/5Thinking in Systems: A Primer Rating: 5 out of 5 stars5/5Spark: How to Lead Yourself and Others to Greater Success Rating: 5 out of 5 stars5/5Principle-Centered Leadership Rating: 4 out of 5 stars4/5The New One Minute Manager Rating: 5 out of 5 stars5/5Multipliers, Revised and Updated: How the Best Leaders Make Everyone Smarter Rating: 5 out of 5 stars5/5How to Talk to Anyone at Work: 72 Little Tricks for Big Success Communicating on the Job Rating: 5 out of 5 stars5/5Developing the Leader Within You 2.0 Rating: 5 out of 5 stars5/5Boundaries for Leaders: Results, Relationships, and Being Ridiculously In Charge Rating: 5 out of 5 stars5/5Primal Leadership: Realizing the Power of Emotional Intelligence Rating: 5 out of 5 stars5/5The Anxious Achiever: Turn Your Biggest Fears into Your Leadership Superpower Rating: 4 out of 5 stars4/5The Effective Executive: The Definitive Guide to Getting the Right Things Done Rating: 4 out of 5 stars4/525 Ways to Win with People: How to Make Others Feel Like a Million Bucks Rating: 5 out of 5 stars5/5Only the Paranoid Survive: How to Exploit the Crisis Points That Challenge Every Company Rating: 4 out of 5 stars4/5The Power Code: More Joy. Less Ego. Maximum Impact for Women (and Everyone). Rating: 4 out of 5 stars4/5Finance Secrets of Billion-Dollar Entrepreneurs: Venture Finance Without Venture Capital Rating: 4 out of 5 stars4/5The First Minute: How to start conversations that get results Rating: 5 out of 5 stars5/5
Reviews for Keeping the Barbarians Out
0 ratings0 reviews