9781945255267-1945255269-Wolves, Sheep and Sheepdogs: A Leader's Guide to Information Security

Wolves, Sheep and Sheepdogs: A Leader's Guide to Information Security

ISBN-13: 9781945255267
ISBN-10: 1945255269
Author: John Cunningham, Jim Shaeffer
Publication date: 2017
Publisher: Throne Publishing Group
Format: Paperback 144 pages
FREE US shipping

Book details

ISBN-13: 9781945255267
ISBN-10: 1945255269
Author: John Cunningham, Jim Shaeffer
Publication date: 2017
Publisher: Throne Publishing Group
Format: Paperback 144 pages

Summary

Wolves, Sheep and Sheepdogs: A Leader's Guide to Information Security (ISBN-13: 9781945255267 and ISBN-10: 1945255269), written by authors John Cunningham, Jim Shaeffer, was published by Throne Publishing Group in 2017. With an overall rating of 4.4 stars, it's a notable title among other books. You can easily purchase or rent Wolves, Sheep and Sheepdogs: A Leader's Guide to Information Security (Paperback) from BooksRun, along with many other new and used books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

The angles of attack in today’s cyber security landscape evolve every moment. But even more ominous, there is no organization too small to escape being a target. However, there is an answer to these threats: a good sheepdog, alert to every danger and breach. In Wolves, Sheep and Sheepdogs: A Leader’s Guide to Information Security, authors Jim Shaeffer and John Cunningham use a powerful analogy to paint a vivid picture of both sides of the firewall. Whether you are a Board Member, investor, CEO or CISO you will gain a deeper understanding of the roles, characteristics, and motivations of both security professionals and the wolves they guard against. Shaeffer and Cunningham have worked with scores of organizations and share some of their keenest insight to achieving an adaptive security mindset. In doing so, they create a common language for those in both information security and non-technical leadership positions. No matter your role, this book will help give your organization a cyber-security edge against the threats of today and tomorrow.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book