9781420089103-1420089102-CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives

CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives

ISBN-13: 9781420089103
ISBN-10: 1420089102
Edition: 1
Author: Michael Gentile, Ron Collette, Skye Gentile
Publication date: 2008
Publisher: Auerbach Publications
Format: Hardcover 314 pages
FREE US shipping
Buy

From $52.23

Book details

ISBN-13: 9781420089103
ISBN-10: 1420089102
Edition: 1
Author: Michael Gentile, Ron Collette, Skye Gentile
Publication date: 2008
Publisher: Auerbach Publications
Format: Hardcover 314 pages

Summary

CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives (ISBN-13: 9781420089103 and ISBN-10: 1420089102), written by authors Michael Gentile, Ron Collette, Skye Gentile, was published by Auerbach Publications in 2008. With an overall rating of 3.7 stars, it's a notable title among other Commerce (Economics) books. You can easily purchase or rent CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives (Hardcover) from BooksRun, along with many other new and used Commerce books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

As organizations struggle to implement effective security measures, all too often they focus solely on the tangible elements, such as developing security policies or risk management implementations. While these items are very important, they are only half of the equation necessary to ensure security success. CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives presents tools that empower security practitioners to identify the intangible negative influencers of security that plague most organizations, and provides techniques to identify, minimize, and overcome these pitfalls.

The book begins by explaining how using the wrong criteria to measure security can result in a claim of adequate security when objective assessment demonstrates this not to be the case. The authors instead recommend that organizations measure the success of their efforts using a practical approach that illustrates both the tangible and intangible requirements needed by a healthy security effort.

The middle section discusses the root causes that negatively influence both a CISO and an organization’s ability to truly secure itself. These root causes include:

  • Employee apathy
  • Employee myopia or tunnel vision
  • Employee primacy, often exhibited as office politics
  • The infancy of the information security discipline

These chapters explain what a CISO can do about these security constraints, providing numerous practical and actionable exercises, tools, and techniques to identify, limit, and compensate for the influence of security constraints in any type of organization.

The final chapters discuss some proactive techniques that CISOs can utilize to effectively secure challenging work environments. Reflecting the experience and solutions of those that are in the trenches of modern organizations, this volume provides practical ideas that can make a difference in the daily lives of security practitioners.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book