معرفی کتاب Tribe Of Hackers Security Leaders: Tribal Knowledge From The Best In Cybersecurity Leadership
با سلام خدمت همراهان همیشگی فرکیان تک. با شما هستیم با کتاب Tribe Of Hackers Security . این کتاب بر مفاهیم Hackers Security تمرکز کرده است.
معرفي دوره :
اين کتاب آنچه را که CISSPها، CISOها و ديگر رهبران امنيتي بايد بدانند تا تيمهاي امنيت سايبري قوي بسازند و سازمانها را ايمن نگه دارند، به اشتراک ميگذارد . متخصص امنيت با نفوذ بهترين استراتژي هاي خود را براي ايجاد رهبري و مديريت امنيت اطلاعات در سازمان ها نشان مي دهند. Tribe of Hackers Security Leaders از همان قالب پرفروش قبيله اصلي هکرها پيروي مي کند، اما با تمرکز دقيق بر چگونگي تأثير رهبران امنيت اطلاعات بر امنيت سازمان .
امنيت اطلاعات هميشه مهمتر و ارزشمندتر مي شود . نقض امنيت مي تواند پرهزينه باشد حتي کسب و کارها و دولت ها را تعطيل مي کند . بنابراين رهبري امنيت يک بازي پرمخاطره است. رهبري تيم هاي هکرها هميشه آسان نيست، اما آينده سازمان شما ممکن است به آن بستگي داشته باشد.
اين کتاب مناسب چه افرادي مي باشد :
افرادي که در نقش رهبري امنيت اطلاعات است و يا مي خواهند در سطح تيمي و چه در سطح سازمان فعاليت داشته باشند ، بايد اين کتاب را بخواند. Tribe of Hackers Security Leaders توصيه هاي دنياي واقعي و راهنمايي هاي عملي را دارد که براي پيشبرد حرفه رهبري امنيت سايبري خود نياز داريد.
با ما همراه باشید.
Description
Tribal Knowledge from the Best in Cybersecurity Leadership, Tribe of Hackers Security Leaders: Tribal Knowledge from the best in Cybersecurity Leadership
The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies for building, leading, and managing information security within organizations. Tribe of Hackers Security Leaders follows the same bestselling format as the original Tribe of Hackers, but with a detailed focus on how information security leaders impact organizational security.
Information security is becoming more important and more valuable all the time. Security breaches can be costly, even shutting businessesand governments down, so security leadership is a high-stakes game. Leading teams of hackers is not always easy, but the future of your organization may depend on it. In this book, the world’s top security experts answer the questions that Chief Information Security Officers and other security leaders are asking, including:
What’s the most important decision you’ve made or action you’ve taken to enable a business risk?
How do you lead your team to execute and get results?
Do you have a workforce philosophy or unique approach to talent acquisition?
Have you created a cohesive strategy for your information security program or business unit?
Anyone in or aspiring to an information security leadership role, whether at a team level or organization-wide, needs to read this book. Tribe of Hackers Security Leaders has the real-world advice and practical guidance you need to advance your cybersecurity leadership career.
Table of contents
Acknowledgments vii
Introduction viii
01 Marcus J. Carey 1
02 Ian Anderson 6
03 James Arlen 14
04 Mark Arnold 25
05 Andrew Bagrin 31
06 Zate Berg 36
07 Tash Bettridge 46
08 Philip Beyer 50
09 Kyle Bubp 58
10 Joanna Burkey 64
11 Bill Burns 70
12 Lesley Carhart 78
13 Christopher Caruso 83
14 Mike Chapple 91
15 Steve Christey Coley 98
16 Jim Christy 102
17 Chris Cochran 110
18 Edward Contreras 114
19 Dan Cornell 117
20 Mary Ann Davidson 124
21 Kimber Dowsett 132
22 David Evenden 136
23 Martin Fisher 141
24 Chris Hadnagy 147
25 Andrew Hay 153
26 Mark Hillick 157
27 Terence Jackson 165
28 Tanya Janca 168
29 David Kennedy 174
30 Joe Krull 180
31 Robert M. Lee 188
32 Rafal Los 194
33 Tracy Z. Maleeff 199
34 Jeffrey Man 202
35 Angela Marafino 209
36 James Medlock 212
37 Kent Nabors 221
38 Charles Nwatu 228
39 Greg Ose 232
40 Edward Prevost 239
41 Ray [REDACTED] 244
42 Stephen A. Ridley 249
43 David Rook 255
44 Marina Segal 259
45 Khalil Sehnaoui 262
46 Jackie Singh 267
47 Dan Tentler 271
48 Eugene Teo 274
49 Dominique West 279
50 Jake Williams 283
51 Wirefall 288
Appendix: Recommended Reading 293