Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Building a Cyber Resilient Business

You're reading from   Building a Cyber Resilient Business A cyber handbook for executives and boards

Arrow left icon
Product type Paperback
Published in Nov 2022
Publisher Packt
ISBN-13 9781803246482
Length 232 pages
Edition 1st Edition
Arrow right icon
Authors (3):
Arrow left icon
Dr. Magda Lilia Chelly Dr. Magda Lilia Chelly
Author Profile Icon Dr. Magda Lilia Chelly
Dr. Magda Lilia Chelly
Hai Tran Hai Tran
Author Profile Icon Hai Tran
Hai Tran
Shamane Tan Shamane Tan
Author Profile Icon Shamane Tan
Shamane Tan
Arrow right icon
View More author details
Toc

Table of Contents (14) Chapters Close

Preface 1. Chapter 1: The CEO Cyber Manual 2. Chapter 2: A Modern Cyber-Responsible CFO FREE CHAPTER 3. Chapter 3: The Role of the CRO in Cyber Resilience 4. Chapter 4: Your CIO—Your Cyber Enabler 5. Chapter 5: Working with Your CISO 6. Chapter 6: The Role of the CHRO in Reducing Cyber Risk 7. Chapter 7: The COO and Their Critical Role in Cyber Resilience 8. Chapter 8: The CTO and Security by Design 9. Chapter 9: The CMO and CPO—Convergence Between Privacy and Security 10. Chapter 10: The World of the Board 11. Chapter 11: The Recipe for Building a Strong Security Culture—Bringing It All Together 12. Index 13. Other Books You May Enjoy

Questions to ask your CHRO

  • Are you aware of the types of PII and taxation and financial information that the HR department holds?
  • What HR tool do we use that safeguards our data’s privacy and security?
  • How do we manage our sourcing, hiring, and onboarding process in regard to privacy and security? Do our employment contracts include security and privacy clauses?
  • How does the HR department ensure employees are aware of information security policies and that they comply with them?
  • What activities does the HR department undertake to ensure their HR team is aware of legal requirements, such as the Australian Privacy Principles or General Data Protection Regulation (GDPR)?
  • What activities does the HR department undertake to protect employees from cyberthreats, including cyber-awareness training?
  • How do current HR processes ensure insider threats are taken care of if a disgruntled employee is leaving the organization?

A sizable number of cyberattacks...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime