Who this book is for
Chief Information Security Officers (CISOs) and aspiring CISOs, Chief Security Officers (CSOs), Chief Technology Officers (CTOs), Chief Information Officers (CIOs), cybersecurity professionals, compliance and audit professionals, senior IT management with cybersecurity responsibilities, vendors’ cybersecurity professional services consultants and salespeople, computer hobbyists with an interest in cybersecurity, and university level students aspiring to become cybersecurity professionals would all benefit from reading this book.
Readers should have basic knowledge of Information Technology (IT), with some insight into IT challenges in large-scale, complex enterprise IT environments. Intermediate knowledge of networking (TCP/IP networks) and software development principles, people management experience and insights into how enterprise scale organizations generally operate, and knowledge of basic cybersecurity concepts would all be useful as well.