Author: Dr. Jim Anderson
Narrator: Dr. Jim Anderson
Unabridged: 1 hr 2 min
Format: Digital Audiobook
Publisher: Findaway
Published: 01/01/2014
As though staying on top of changing technology trends wasn’t enough, today's CIOs also find themselves being held responsible for securing the IT department as well as the rest of the company. This is a job that few of us have ever been trained to do; however, the stakes have never been higher.
What You'll Find Inside:
VULNERABILITY MANAGEMENT: THE CIO’S OTHER JOB KEVIN MITNICK SPEAKS ABOUT IT SECURITY DATA PROTECTION SECRETS: CIOS KNOW THAT IT STARTS AT THE ENDPOINT THE INSIDER THREAT: WHAT CIOS NEED TO KNOWYour company's senior management knows even less about IT security than you do. However, they view you as being the person who can keep them safe. If you can accomplish this task, then you will have secured your relationship with the CEO and CFO, if not then they may be looking for a new CIO.
In order to successful secure your department and your company, you are going to have to start at the network's endpoints and work your way in. This will involve creating security policies that everyone can live with and performing routine vulnerability management studies.
The key to any successful securing of a corporate network is to make sure that only the right people and applications are allowed to be there. This means that you'll need to implement an effective identify management program. You'll have to do the same thing for the applications that run on the company's network by creating a whitelisting solution that ensures that you are only executing the code that should be run.
At times dealing with the wide variety of IT security threats that your company will be facing will seem to be overwhelming. However, by taking the time to listen to what reformed hackers have to tell us, you'll be able to prioritize the threats and focus your time and energy where they'll do the most good.
This book has been written in order to provide you with a great starting point for ensuring that you've done everything that you can to protect your company. We'll show you what you need to take care of and how the bad guys are going to try to break into your networks. Follow the suggestions in this book and you'll have successfully secured your company's IT resources.
For more information on what it takes to be a great CIO, check out my blog, The Accidental Successful CIO, at:
www.TheAccidentalSuccessfulCIO.com
The book will include separate chapters focused on CIO "case studies"-careful, detailed examinations of "All Star" IT leaders and their decision-making, with solid background on the business problem they were trying to solve and how they arrived at ...
The part of a negotiation that every negotiator wants to get to as quickly as possible is the closing. This is when your prize is insight: the deal that you want is so close that you could almost reach out and touch it. However, it turns out that th...
As the CIO of your company, it's your job to stay on top of all of the different forms of technology that the company uses to accomplish its business goals. This task is made even harder by all of the changes that are always occurring in the various...
In order for any IT manager to be a success, the team that you are managing has to learn how to work together. All too often what IT managers don't realize is that your team may not know how to work together and they are going to need you to show th...
Just becoming your company's CIO is not enough. Once you reach this lofty point, you are going to have to take on the responsibility of growing your career so that it can truly become the challenging opportunity that you've been seeking. The good ne...
An IT manager's budget controls what he or she and their team are going to be able to accomplish this year. No, creating a budget may not be the most enjoyable thing that you'll be called on to do, but it just might be the most important. The chall...
LEAN: 4 Books - Six Sigma, Lean Startup, Lean Analytics & Lean EnterpriseSIX SIGMASix Sigma is a method that provides organizations tools to improve the capability of their business processes. This increase in performance and decrease in proces...
The information in this ebook on various aspects of computers, peripherals and related subjects is organized into 21 chapters of about 500-600 words each.I hope that it will interest those who are interested in computers, the Internet, peripherals, ...
The challenges of operating in a digital ecosystem aren't going away. Customer Data and Privacy: The Insights You Need from Harvard Business Review will help you understand the tangled interdependencies and complexities and develop strategies that a...