Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Cybersecurity Leadership Demystified
Cybersecurity Leadership Demystified

Cybersecurity Leadership Demystified: A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO

eBook
Can$12.99 Can$55.99
Paperback
Can$69.99
Audiobook
Can$12.99 Can$69.99
Subscription
Free Trial

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Product feature icon AI Assistant (beta) to help accelerate your learning
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Table of content icon View table of contents Preview book icon Preview Book

Cybersecurity Leadership Demystified

Chapter 2: End-to-End Security Operations

The chief information security officer (CISO) ensures the end-to-end (E2E) security operations of an organization. Together with their security team, they handle all security operations, enforce policies, and evaluate and address system vulnerabilities to ensure that a company's information assets are safe from both internal and external threats.

This chapter will cover a typical day of a CISO and their E2E security operations and present the CISO activities that make up this security strategy. By the end of the chapter, you should be able to understand the reasons behind all the CISO and team's security activities and why they need to address all sectors of an organization without neglecting any.

We will cover the following topics in this chapter, which also form a list of the main CISO roles in an organization:

  • Evaluating the information technology (IT) threat landscape
  • Devising policies and controls to reduce risk
  • Leading auditing and compliance initiatives
  • Managing information security initiatives
  • Establishing partnerships with vendors and security experts

Evaluating the IT threat landscape

A CISO is responsible for company security, and the entire process begins with an evaluation of the threat landscape before implementing any tangible solutions. Evaluating the IT landscape helps reveal the various vulnerabilities present in a system and the various attack surfaces present in information assets that can be exploited by attackers. Threats to a company's information assets may come from users who are authorized to use the system or from external attackers. The evaluation process needs to determine all the threats facing a company before it can determine avenues to address these vulnerabilities.

We have now addressed the need for CISOs to evaluate the threat landscape before they can brainstorm solutions to address identified issues. In the next section, we will look into the importance of CISOs gaining in-depth knowledge of company operations to create effective solutions.

Knowledge of company operations

An evaluation of the IT landscape of a company requires in-depth knowledge of the company's operations. With the evolving nature of modern businesses, the duties of a CISO are also evolving, requiring them to have unrestricted access to all departments of a company. Accessing all sections of a company allows a CISO to thoroughly understand all company operations and enables them to perform an effective evaluation of all internal processes. Attackers perform an exhaustive evaluation of a company's system to find vulnerabilities. For CISOs to effectively counter such efforts, they also need to have a full view of a company's systems and operations to determine all avenues and attack surfaces an attacker may use to infiltrate the company's system.

Assessment tools

A CISO also needs specialized tools to conduct a thorough evaluation of a company's systems. These specialized tools should be sourced from proven vendors who trade in network tools for system evaluation purposes. These tools aid a CISO in the assessment of a system including penetration testing and other ethical hacking processes. The result of penetration testing is a report that establishes all attack surfaces as well as revealing all possible vulnerabilities that can be exploited by attackers.

Internal evaluation of the threat landscape also encompasses an evaluation of a company's own internal control mechanisms in place to protect a company's information assets. A CISO needs to objectively evaluate a company's internal controls that are meant to safeguard the company's system from attacks. These controls apply to both external threats and internal threats. To ensure the effectiveness of the threat landscape evaluation, the internal processes should be evaluated with the standards of external vulnerability assessments. In many cases, companies tend to be complacent about internal systems where company employees are involved. However, reports continue to show that disgruntled employees are one of the leading causes of cyber threats to organizations.

Trends in cyber threats

Understanding trends in cyber threats is an important skill for all CISOs. The IT sector is ever evolving. New attack vectors keep coming up, and CISOs need to be updated about current trends in the IT sector as this will enable them to have an understanding of all the threats they are likely to face and take measures to mitigate such threats. An organization needs to be safeguarded from all common attack vectors as a minimum requirement. Since security mechanisms get outdated quickly, CISOs must keep abreast of changes in the threat landscape. Continuous improvement of skills and knowledge are key traits of an effective CISO in the current times.

This section has addressed the important role of evaluating the cyber threat landscape. The next section will address the role of devising policies and security controls as measures to keep a company safe from threats.

Devising policies and controls to reduce risk

To ensure E2E security in an organization, a CISO is tasked with devising policies and setting up security controls to help mitigate any threats facing a company. The CISO role is an executive role in the management sphere and should have the influence to create policies that safeguard a company's operations. These policies affect a company's internal operations and mainly focus on the company's staff members. A CISO also reviews all interactions of all users within a system and the threat level from all these users. These users also include vendors of all software used within an organization. Some vendors may not be trustworthy and may provide an organization with software that is insecure or that has unaddressed security patches unknown to buyers.

We now have an idea of how security leaders devise security policies and controls in the implementation of their security functions. The next section highlights some of the internal staff policies developed by the security team.

Internal staff policies

Internal staff can be supportive in helping a company address internal threats. Staff members should be subjected to security controls that ensure that they do not have unlimited access to information assets within an organization. Access to information should be on a need-to-know basis to allow them to perform their functions effectively. Database administrators, who are part of the team that works directly under the CISO in an organization, are tasked with assigning privileges in the accessing of information within a company. These restrictions should be strictly reinforced. If an employee is terminated from an organization, their access privileges should be revoked immediately. Disgruntled employees are a known source of internal threats to an organization and have the capability to do major damage to a company's information assets.

Internal policies should be printed and pinned on a board where all employees can access them for reference to remind them of all the security policies. This should include the consequences of failing to adhere to these security policies. Consequences should be in the form of termination, fines, suspension, or legal action against employees violating these policies. These policies should be reviewed regularly to ensure that they continue to effectively safeguard internal operations and ultimately safeguard the company's information assets. In addition, the security team should ensure that employees respect these security policies and thus develop a culture of security. Employee culture is an integral factor in the implementation of security policies. While internal policies should be meant to safeguard company operations, they should not make staff members' execution of their duties unnecessarily difficult.

Other company policies

Aside from internal staff policies, CISOs also create policies that affect customers and other people that interact with the company, such as vendors. The main security policies that safeguard a company's information assets from non-staff members come in the form of physical security controls. Organizations will restrict sections of the company from customers and other non-staff members as a form of basic security control to limit the access of unauthorized people to sensitive information assets or simple theft. These are usually implemented through the use of security cards to access some rooms meant for staff only. These security cards can also have privilege access controls to limit even junior staff members from accessing rooms meant for only senior or authorized personnel. The security team is tasked with devising these security policies and continually reviewing them to ensure that they are effective in enforcing security measures within a company's premises.

We have addressed how a CISO devises policies and security controls to keep a company safe. The next section handles the role of auditing a company and ensuring it is compliant with laws and regulations, as the security controls must be able to enforce compliance.

Leading auditing and compliance initiatives

A CISO and an organization's security team are tasked with leading auditing efforts of the company's security systems and ensuring that a company complies with all the security standards and regulations that govern its operations. Auditing efforts include a thorough review of a company's assets to ensure that they perform as they should. It also includes taking an inventory of all the company's infrastructure and information assets to determine all possible attack surfaces. Evaluation efforts also ensure that all software is up to date with the latest security patches to reduce a company's exposure to risk and exploitation of vulnerabilities.

We've touched on how CISOs lead in the auditing and compliance initiatives. The next section addresses examples of some of the IT components that CISOs seek to confirm whether they are functioning properly in enhancing a company's security posture.

Anti-malware and anti-spyware software

These series of software, in addition to firewalls, are critical components of securing a system from cyber-attacks. These series of software are not foolproof on their own but need additional security features. However, they are effective in helping protect an organization against simple and common attacks. Malware is among the most common attack vectors that attackers will use against a system to help gain access. Anti-malware programs and anti-spyware software help organizations in protecting their systems and information assets from many external threats. For internet-facing information assets, these types of software will help in the mitigation of risks and possible malware getting into the system.

An auditing process carried by the security team ensures that these anti-malware programs, as well as firewall programs, are working as intended and that they are up to date. Updating the software ensures that new malware definitions have been included in a database to help a system fight off newer forms of malicious programs that attackers may use.

After understanding the role of anti-malware in an IT system, the next section seeks to address how CISOs ensure compliance with international regulations.

Compliance with international regulations

Modern companies are regulated by many organizations that have been created to protect consumers, as well as firms, from malicious attacks. Many firms engage in the collection of data from their consumers that they use in the dissemination of their services, as well as to improve their products. However, without management, firms have been known to misuse this information. Therefore, governments have been forced to step in to ensure that firms engage in data-collection exercises in a regulated manner that ensures that the data collected is only used for the purposes it was collected and that users are aware of all the purposes. In addition, these users need to provide their consent to these firms before they can use their data. Most of the regulations involve the collection and use of consumer data.

Examples of regulations and regulatory bodies

Some of the bodies whose regulations affect many operations include GDPR and HIPAA. GDPR is an acronym standing for General Data Protection Regulation. These are statutes created by the European Union (EU) to protect European citizens from exploitation by companies that engage in the collection, use, and storage of their data. Any company, regardless of whether they operate within the EU or not that collects information from an EU citizen, is required to adhere to these rules. HIPAA, on the other hand, is an acronym that stands for the Health Insurance Portability and Accountability Act. This is a statute that was created to ensure that health and insurance information was protected within the United States (US), and its laws and regulations affect all companies that directly or indirectly through business association deal with such information. These two are some of the many regulations that affect company operations globally, and modern firms need to ensure that they comply with these laws, which the CISO and their team are tasked with.

Consequences of non-compliance

A failure to comply with these laws and regulations jeopardizes a company's existence, and it may be suspended or fined heavily. For instance, all federal firms that deal in health information are governed by the HIPAA statute, and a failure to comply will deny them subsequent federal funding. For other firms, such as those governed by GDPR laws, a failure to comply may lead to heavy fines that could lead to millions of US dollars' (USDs') loss to the company. Adherence to some of the laws is possible through the implementation of various security measures, such as the secure storage of data to keep it safe from possible breaches. While ensuring compliance, a firm also benefits from such actions by protecting itself from successful attacks that could threaten the continuity of operations.

We have now addressed the role of a CISO in terms of auditing the company to ensure safety and compliance with laws and regulations. The following section handles their role in managing various information security initiatives.

Managing information security initiatives

A CISO and their security team are tasked with managing a company's security initiatives to ensure that the firm is safe from threats and that attackers fail in their endeavors to infiltrate the company's systems. Security initiatives come in the form of an evaluation of the threat landscape, taking the necessary measures to address identified vulnerabilities and implementing policies and security controls to ensure information assets are fully protected.

This section has introduced a major CISO role in managing information security initiatives in an organization. The next section will show how CISOs manage these initiatives.

Strategic security planning

A company has a strategic plan that addresses its long-term plans of continuity and business direction. A company's information assets and system infrastructure are critical components to the success of a company's operations. Therefore, planning for information assets and the infrastructure that safeguards these assets is part and parcel of the long-term planning of any company. The CISO is an integral component in the management of a company due to their critical role in the management of information assets and any plans relating to these assets. Both long-term information asset planning and long-term strategic business planning have to go hand in hand. While strategizing for long-term business operations, the CISO is tasked with determining how long-term plans will affect information assets and any changes to security requirements resulting from those plans. These determinations will then be included in the discussion to decide on the direction of the business.

While engaging in strategic planning for security operations within a company, the CISO needs to ensure that security plans fit the business's strategic plans, both in the short term and the long term. If a business wants to perform a full overhaul of its IT or introduce a new system as a means of improving its business operations, it needs the CISO's input in the strategic planning. This shows that the CISO, in this day and age, plays a critical role in business operations and is poised to play core roles in most businesses' long-term strategic planning.

After learning how CISOs manage information security initiatives through strategic security planning, we will next address the hiring of security team members and how this affects information security initiatives.

The hiring of a security team

The hiring of a security team is a direct responsibility of the CISO. The critical nature of the responsibilities of the CISO and the impact of the security team's work on the business risk calls for direct involvement of the CISO in hiring their team members. The CISO often has to delegate responsibilities to various team members to handle various facets of security operations. The security team members need to be individuals with both the integrity to perform this sensitive job without compromise and the technical skills to implement various security responsibilities within the company.

We have addressed the CISO's role in handling various security initiatives within a company by showing how the hiring of security team members is an important security initiative. The next section will provide more insight into their relationships with vendors and the importance of this relationship.

Establishing partnerships with vendors and security experts

CISOs need to establish partnerships with vendors and security experts. A CISO is the overall head of the IT security docket in any organization and is tasked with creating a network with possible vendors and security experts that can help in situations where security expertise and implementation are required.

The following sections will show how to establish these partnerships and how beneficial these partnerships are from a security perspective.

Establishing partnerships

Creating partnerships with vendors of software tools is a critical component that helps a CISO in offering effective security to their organization. With good partnerships, the CISO can purchase tools and software from vendors at friendly prices. These friendly prices enable an organization to make cost savings on issues such as purchasing antivirus programs that are necessary for safeguarding the networks in an organization. Other tools that come in handy in CISO security operations are the testing tools and software that an ethical hacker needs to attempt to gain access into a firm. Ethical hackers are hired by the CISO to attempt hacking into the system. The tools used for such exercises may legally be available on the market. Access to these tools is a basic requirement for CISO executives' work, so getting access to these tools is crucial. Partnerships with such vendors ensure that CISO executives have access to such tools so that they can use them to conduct tests on the internal system to identify any system vulnerabilities.

Security experts as a knowledge resource

Security experts are an important resource for CISO executives who need to update their knowledge of the latest trends in the market. Partnerships with security experts will benefit an organization immensely, ensuring that any updates to the current systems will easily be communicated to the CISO, who can then subsequently make the required changes to update their systems. Security experts can also help in informing a company of the weaknesses of using a specific system and possible solutions to a problem. Security experts are informed people who are normally tasked with providing the security field with research and information regarding changes to the security market, and possible ways of adopting changes to the security requirements of any business. Partnerships with such a team can only help an organization in its quest for better security initiatives. These experts can also help a CISO in educating the team of experts working under them on the best way to complete their work in that current environment.

One way for experts to help the CISO is for the CISO to organize refresher courses with security experts, helping give the security team guidance on matters to do with security. Security experts are likely to know more about security aspects in the market and can offer guidance to the CISO on trends in the market, how an organization can benefit from various resources, and where to get these resources. A partnership with security experts is therefore important and ensures that CISO executives can continue to carry out their role effectively amidst a challenging environment that is filled with hackers and malicious individuals.

System security evaluation tools

CISO executives need software tools that are critical in the offering of their services. Vendors develop and sell tools that CISO executives need to carry out their normal routines. Penetration testing is an important exercise for CISO executives. With penetration testing, CISO executives hack into their systems as a means of determining weaknesses inherent in the systems. This exercise is normally done by ethical hackers who perform hacking voluntarily under the permission of the security team as a means of identifying vulnerabilities in the system and subsequently tweaking the system to correct any errors that the system has.

To perform effective penetration testing, a CISO and their team rely on specialized tools that are not readily available on the market. Partnering with such vendors and experts in the market offers a CISO a chance to access these tools easily and at affordable prices. This helps security departments keep their budgets low. Renting or subscribing to some of these tools offers cost advantages to CISO executives. However, pricing is favorable for firms that develop partnerships with these vendors. Budgeting is an important aspect of any business, and the opportunity to get tools that are necessary for business functions at competitive prices helps lower the costs of managing the business and increases profitability levels.

Creating long-term working relationships with vendors

Selecting vendors to work with is a critical part of vendor choice. In general terms, choosing a popular vendor and a market leader is often the best way to go about choosing vendors. Market leaders ensure CISOs will have proven tools that can help them in effectively carrying out their duties. On the other hand, choosing vendors based on marketing gimmicks is likely to backfire. A CISO needs to choose a vendor that can assure them that their tools can meet the demands of the organization. In this case, it is advisable for the CISO team to meet with the actual vendors and not with the sales team, who are more interested in making a sale for the commission than the actual work of the product in question. Meeting the actual team also helps the CISO to explain their organizational needs. Explaining these needs helps get the best response from vendors on whether their tools can meet the demands of the organization. It is also important to factor in the growth potential of the company in question. If an organization is expected to grow soon, a CISO must choose a vendor that has tools that can also meet its increasing demands. Consistently using the same vendors helps a CISO establish trust with vendors and establish a long-term working relationship and partnership that is mutually beneficial.

Establishing clear communication channels

The establishment of clear communication channels is an essential part of building an effective vendor relationship for CISOs. A CISO should anticipate situations where they need to urgently get hold of vendors in case of emergencies. In such cases, the CISO must have a clear system of communication with the vendor. This is not the point where the CISO is supposed to figure out how to get in touch with the vendor and stress about whether the vendor will be reachable or respond in time. Good and effective vendors have customer liaisons on their payroll that are tasked with solving emergency problems quickly. These staff members are also tasked with developing customer rapport, hence increasing customer success and loyalty. In most cases, these customer liaisons are responsible for creating strategic partnerships with clients to boost sales and retain customers in the long term. One way of obtaining customer loyalty is the ability to quickly fix a customer's problem. A CISO develops long-term strategic partnerships with vendors through these customer liaisons. The goals of the company should be clearly and transparently communicated by the CISO to the vendors. This clarity ensures that the customer liaison can make the best decisions and give the best fixes for problems that may arise during their mutual partnership.

This section explained the importance of creating a clear communication channel with vendors and other security experts. The next section will address the importance of CISOs joining customer advisory groups.

Customer advisory groups

Customer advisory groups are a great way to build long-term partnerships and relationships with vendors. Vendors often develop these customer advisory groups as a means to acquire feedback from their trusted customers on features and system updates. These groups offer vendors feedback on features they have already developed and also allow vendors to solicit suggestions from customers. These groups are an important route for a CISO to develop a long-term partnership with a vendor. The CISO can use these advisory groups to gain valuable information regarding the use of the tools from their vendor. They can also learn about challenges facing other customers and use that information to avoid those challenges or be better prepared to face them.

Cybersecurity challenges are risks that need all the information a CISO can gather from the security industry, and arming themselves with this information can only help in improving the perspectives of the CISO. Investing time in creating effective partnerships with the right vendor and having the right resources is worthwhile as this can immensely benefit an organization, in terms of both the short-term and long-term strategic plans.

This section provided insights into the important roles of CISOs that is rarely given much thought, and into how they help enhance the security initiatives in an organization. Creating partnerships with vendors and other security experts helps improve CISOs' knowledge of current trends as well as helping them get the best out of their vendors' software, hence improving the security posture of an organization.

Summary

This chapter has addressed five important roles of a CISO executive. Firstly, we evaluated the IT threat landscape, which entails assessing both the internal and external aspects of the company to identify potential risks and take measures to mitigate them. Secondly, we looked at devising various policies and controls, such as granting various security privileges to users to reduce risk. Thirdly, we considered leading auditing and compliance initiatives whereby the CISO assesses all security aspects of an organization and ensures they comply with regulations and international standards. Then, we touched on how CISOs manage an organization's information security initiatives, such as securing servers and purchasing up-to-date anti-malware programs; and lastly, we explored establishing partnerships with vendors and security experts to enable a CISO to obtain effective software tools for threat identification and mitigation of threats, as well as keeping abreast of current threats in the IT threat landscape.

The next chapter will address various regulations and laws that govern the IT industry that CISOs need to comply with to enable the effective dissemination of their duties. The focus will be on international standards that govern the security of stored data, the transmission of data, and ensuring the privacy of user data.

Further reading

Here are some resources that can be used to gain more knowledge about the topics discussed in this chapter:

Left arrow icon Right arrow icon

Key benefits

  • Discover tips and expert advice from the leading CISO and author of many cybersecurity books
  • Become well-versed with a CISO's day-to-day responsibilities and learn how to perform them with ease
  • Understand real-world challenges faced by a CISO and find out the best way to solve them

Description

The chief information security officer (CISO) is responsible for an organization's information and data security. The CISO's role is challenging as it demands a solid technical foundation as well as effective communication skills. This book is for busy cybersecurity leaders and executives looking to gain deep insights into the domains important for becoming a competent cybersecurity leader. The book begins by introducing you to the CISO's role, where you'll learn key definitions, explore the responsibilities involved, and understand how you can become an efficient CISO. You'll then be taken through end-to-end security operations and compliance standards to help you get to grips with the security landscape. In order to be a good leader, you'll need a good team. This book guides you in building your dream team by familiarizing you with HR management, documentation, and stakeholder onboarding. Despite taking all that care, you might still fall prey to cyber attacks; this book will show you how to quickly respond to an incident to help your organization minimize losses, decrease vulnerabilities, and rebuild services and processes. Finally, you'll explore other key CISO skills that'll help you communicate at both senior and operational levels. By the end of this book, you'll have gained a complete understanding of the CISO's role and be ready to advance your career.

Who is this book for?

This book is for aspiring as well as existing CISOs. This book will also help cybersecurity leaders and security professionals understand leadership in this domain and motivate them to become leaders. A clear understanding of cybersecurity posture and a few years of experience as a cybersecurity professional will help you to get the most out of this book.

What you will learn

  • Understand the key requirements to become a successful CISO
  • Explore the cybersecurity landscape and get to grips with end-to-end security operations
  • Assimilate compliance standards, governance, and security frameworks
  • Find out how to hire the right talent and manage hiring procedures and budget
  • Document the approaches and processes for HR, compliance, and related domains
  • Familiarize yourself with incident response, disaster recovery, and business continuity
  • Get the hang of tasks and skills other than hardcore security operations

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Jan 07, 2022
Length: 274 pages
Edition : 1st
Language : English
ISBN-13 : 9781801819596
Vendor :
Google
Tools :

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Product feature icon AI Assistant (beta) to help accelerate your learning
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Product Details

Publication date : Jan 07, 2022
Length: 274 pages
Edition : 1st
Language : English
ISBN-13 : 9781801819596
Vendor :
Google
Tools :

Packt Subscriptions

See our plans and pricing
Modal Close icon
$19.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
$199.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just Can$6 each
Feature tick icon Exclusive print discounts
$279.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just Can$6 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total Can$ 179.97
Cybersecurity Leadership Demystified
Can$69.99
The Cybersecurity Playbook for Modern Enterprises
Can$55.99
Cybersecurity – Attack and Defense Strategies, 3rd edition
Can$53.99
Total Can$ 179.97 Stars icon
Banner background image

Table of Contents

13 Chapters
Chapter 1: A CISO's Role in Security Leadership Chevron down icon Chevron up icon
Chapter 2: End-to-End Security Operations Chevron down icon Chevron up icon
Chapter 3: Compliance and Regulations Chevron down icon Chevron up icon
Chapter 4: Role of HR in Security Chevron down icon Chevron up icon
Chapter 5: How Documentation Contributes to Security Chevron down icon Chevron up icon
Chapter 6: Disaster Recovery and Business Continuity Chevron down icon Chevron up icon
Chapter 7: Bringing Stakeholders On Board Chevron down icon Chevron up icon
Chapter 8: Other CISO Tasks Chevron down icon Chevron up icon
Chapter 9: Congratulations! You Are Hired Chevron down icon Chevron up icon
Chapter 10: Security Leadership Chevron down icon Chevron up icon
Chapter 11: Conclusion Chevron down icon Chevron up icon
Chapter 12: Ask the Experts Chevron down icon Chevron up icon
Another Book You May Enjoy Chevron down icon Chevron up icon

Customer reviews

Rating distribution
Full star icon Full star icon Full star icon Full star icon Half star icon 4.3
(4 Ratings)
5 star 75%
4 star 0%
3 star 0%
2 star 25%
1 star 0%
Nivag May 05, 2022
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Excellent.
Amazon Verified review Amazon
CL Feb 25, 2022
Full star icon Full star icon Full star icon Full star icon Full star icon 5
If you want to be a leader in cybersecurity, I think this book can set you up to be one of the best in the industry.Dr Ozkaya sets things up beautifully in this book, which is also just a pleasure to read. It begins by explaining the general role of a CISO, compares the role to the CIO and CTO, and describes a bit of the day to day, Then the book dives into regulations and frameworks, focusing on the important aspects like impact and applicability.Then he takes readers through handling stakeholders, being the lead on incident handling and crisis, and setting the security culture and awareness for the company. There is strategy for building, fostering, and repairing security programs of all sizes and maturity. Ozkaya even spends a great chapter devoted to hiring, training, and leading people. I'd say he covers all the things I, Neal Bridges, Naomi Buckwalter, Christian Espinosa, Robert M. Lee, James J Azar, 👉🏼 Gerald Auger, Ph.D., and other great leaders in this space espouse about the right way to hire and invest in people.The book closes out with some great insights from other CISOs on topics that are very important but don't necessarily need their own chapter. Though, some of those topics actually can be expounded into whole works of their own.It is a valuable read for anyone wanting to lead the cybersecurity team at an organization.
Amazon Verified review Amazon
CISO Aug 09, 2022
Full star icon Full star icon Full star icon Full star icon Full star icon 5
As a CISO with so many years experience I found the book very useful , it covers a every aspect of a CISO, from day to day tasks to regulations, the importance of teams , documentation, DR, tools, communication skills, , cybersecurity leadership and a classic of Dr Ozkaya's books, the ask the expert section where many other CISO's share their recommendations for you to be more successful.If you want to be a CISO, or are a new CISO or are a CISO who wants to improve , believe or not you will find the book very valuable
Amazon Verified review Amazon
JBowl0101 Sep 11, 2023
Full star icon Full star icon Empty star icon Empty star icon Empty star icon 2
I was disappointed. If you have prepped for the CISSP or similar test, you have already seen the material. There is very little depth, just a general rehashing of standard security practices. It is repetitive with tons of blank space on the pages. The language is wordy but the actual information conveyed is not very high. It reads like an unedited first draft - it desperately needs a good editor. One chapter was lifted from his previous book, and another was just a collection of essays written by others. It felt thrown together. It is not at all what I had hoped.
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

How do I buy and download an eBook? Chevron down icon Chevron up icon

Where there is an eBook version of a title available, you can buy it from the book details for that title. Add either the standalone eBook or the eBook and print book bundle to your shopping cart. Your eBook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalised PDF download file. This link will remain active for 30 days. You can download backup copies of the file by logging in to your account at any time.

If you already have Adobe reader installed, then clicking on the link will download and open the PDF file directly. If you don't, then save the PDF file on your machine and download the Reader to view it.

Please Note: Packt eBooks are non-returnable and non-refundable.

Packt eBook and Licensing When you buy an eBook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it we have tried to balance the need for the ebook to be usable for you the reader with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:

  • You may make copies of your eBook for your own use onto any machine
  • You may not pass copies of the eBook on to anyone else
How can I make a purchase on your website? Chevron down icon Chevron up icon

If you want to purchase a video course, eBook or Bundle (Print+eBook) please follow below steps:

  1. Register on our website using your email address and the password.
  2. Search for the title by name or ISBN using the search option.
  3. Select the title you want to purchase.
  4. Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title. 
  5. Proceed with the checkout process (payment to be made using Credit Card, Debit Cart, or PayPal)
Where can I access support around an eBook? Chevron down icon Chevron up icon
  • If you experience a problem with using or installing Adobe Reader, the contact Adobe directly.
  • To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
  • To view your account details or to download a new copy of the book go to www.packtpub.com/account
  • To contact us directly if a problem is not resolved, use www.packtpub.com/contact-us
What eBook formats do Packt support? Chevron down icon Chevron up icon

Our eBooks are currently available in a variety of formats such as PDF and ePubs. In the future, this may well change with trends and development in technology, but please note that our PDFs are not Adobe eBook Reader format, which has greater restrictions on security.

You will need to use Adobe Reader v9 or later in order to read Packt's PDF eBooks.

What are the benefits of eBooks? Chevron down icon Chevron up icon
  • You can get the information you need immediately
  • You can easily take them with you on a laptop
  • You can download them an unlimited number of times
  • You can print them out
  • They are copy-paste enabled
  • They are searchable
  • There is no password protection
  • They are lower price than print
  • They save resources and space
What is an eBook? Chevron down icon Chevron up icon

Packt eBooks are a complete electronic version of the print edition, available in PDF and ePub formats. Every piece of content down to the page numbering is the same. Because we save the costs of printing and shipping the book to you, we are able to offer eBooks at a lower cost than print editions.

When you have purchased an eBook, simply login to your account and click on the link in Your Download Area. We recommend you saving the file to your hard drive before opening it.

For optimal viewing of our eBooks, we recommend you download and install the free Adobe Reader version 9.