Further reading
Here are some resources that can be used to gain more knowledge about the topics discussed in this chapter:
- The Overlooked Key to CISO Success: Maximizing Effective Security Partnerships: https://www.tenable.com/blog/the-overlooked-key-to-ciso-success-maximizing-effective-security-partnerships
- What CISOs really want from security vendors: https://www.csoonline.com/article/3617809/what-cisos-really-want-from-security-vendors.html
- The Chief Information Security (CISO) Role Explained: https://www.bmc.com/blogs/ciso-chief-information-security-officer/
- Three Cyber Security Issues Organizations Face: https://online.maryville.edu/blog/three-cyber-security-issues-organizations-face/
- 10 Common IT Security Risks in the Workplace: https://www.ccsinet.com/blog/common-security-risks-workplace/
- GDPR Compliance: Should CISO serve as DPO?: https://www.bankinfosecurity.com/gdpr-compliance-should-ciso-serve-as-dpo-a-13722
- The CISO's resource: https://www.youtube.com/c/erdalozkaya