Author - Michael S. Oberlaender

C(I)SO - And Now What? How to Successfully Build Security by Design Have you ever wondered why so many companies and their security leaders fail in today's cyber challenges? Regardless if you are new in this role and look for guidance, or you are considering yourself an expert and just wish to verify that you haven't forgotten anything - this book will help you to tackle the subject right - by building "security by design". The content covers your initial phases in the job such as setting expectations, base lining, gap analysis, capabilities building, and org chart variances. It then leads you to define security architecture, addressing a secure development process, application security and also security policy levels. Further items such as awareness programs, asset management, teaming up with audit, risk management, and finally the strategy development are covered. Then we dive into ROIs, trust relationships, KPIs, incident response, forensics, before we run into crises management by looking at some specific examples of personal experience of the author - himself a C(I)SO for many years. The book is ending by providing advice how to deal with other executive management, and what kind of education, certifications, and networking you need to focus on. If you consistently apply the content and advice provided in this book, you should be all set to succeed in your role as C(I)SO. Michael Oberlaender, Chief Security Officer (CSO) Michael Oberlaender, Chief Information Security Officer (CISO)

Read more

Reach decision makers at Author - Michael S. Oberlaender

Lusha Magic

Free credit every month!

C(I)SO - And Now What? How to Successfully Build Security by Design Have you ever wondered why so many companies and their security leaders fail in today's cyber challenges? Regardless if you are new in this role and look for guidance, or you are considering yourself an expert and just wish to verify that you haven't forgotten anything - this book will help you to tackle the subject right - by building "security by design". The content covers your initial phases in the job such as setting expectations, base lining, gap analysis, capabilities building, and org chart variances. It then leads you to define security architecture, addressing a secure development process, application security and also security policy levels. Further items such as awareness programs, asset management, teaming up with audit, risk management, and finally the strategy development are covered. Then we dive into ROIs, trust relationships, KPIs, incident response, forensics, before we run into crises management by looking at some specific examples of personal experience of the author - himself a C(I)SO for many years. The book is ending by providing advice how to deal with other executive management, and what kind of education, certifications, and networking you need to focus on. If you consistently apply the content and advice provided in this book, you should be all set to succeed in your role as C(I)SO. Michael Oberlaender, Chief Security Officer (CSO) Michael Oberlaender, Chief Information Security Officer (CISO)

Read more
icon

Country

icon

State

Texas

icon

City (Headquarters)

Spring

icon

Employees

1-10

icon

Founded

2009

icon

Social

  • icon

Employees statistics

View all employees

Potential Decision Makers

  • Chief Security Officer , Ciso , Book Author and Publisher

    Email ****** @****.com
    Phone (***) ****-****

Reach decision makers at Author - Michael S. Oberlaender

Free credits every month!

My account

Sign up now to uncover all the contact details