Cargando…

Building effective cybersecurity programs: a security manager's handbook

You know by now that your company could not survive without the Internet. Not in today's market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the be...

Descripción completa

Detalles Bibliográficos
Autores principales: Schreider, Tari, Noakes-Fry, Kristen
Lenguaje:eng
Publicado: Rothstein Publishing 2017
Materias:
Acceso en línea:http://cds.cern.ch/record/2300952
_version_ 1780957171284967424
author Schreider, Tari
Noakes-Fry, Kristen
author_facet Schreider, Tari
Noakes-Fry, Kristen
author_sort Schreider, Tari
collection CERN
description You know by now that your company could not survive without the Internet. Not in today's market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program? Tari Schreider, in Building Effective Cybersecurity Programs: A Security Manager's Handbook, lays out the step-by-step roadmap to follow as you build or enhance your cybersecurity program.
id cern-2300952
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2017
publisher Rothstein Publishing
record_format invenio
spelling cern-23009522021-04-21T18:55:59Zhttp://cds.cern.ch/record/2300952engSchreider, TariNoakes-Fry, KristenBuilding effective cybersecurity programs: a security manager's handbookOther SubjectsYou know by now that your company could not survive without the Internet. Not in today's market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program? Tari Schreider, in Building Effective Cybersecurity Programs: A Security Manager's Handbook, lays out the step-by-step roadmap to follow as you build or enhance your cybersecurity program.Rothstein Publishingoai:cds.cern.ch:23009522017
spellingShingle Other Subjects
Schreider, Tari
Noakes-Fry, Kristen
Building effective cybersecurity programs: a security manager's handbook
title Building effective cybersecurity programs: a security manager's handbook
title_full Building effective cybersecurity programs: a security manager's handbook
title_fullStr Building effective cybersecurity programs: a security manager's handbook
title_full_unstemmed Building effective cybersecurity programs: a security manager's handbook
title_short Building effective cybersecurity programs: a security manager's handbook
title_sort building effective cybersecurity programs: a security manager's handbook
topic Other Subjects
url http://cds.cern.ch/record/2300952
work_keys_str_mv AT schreidertari buildingeffectivecybersecurityprogramsasecuritymanagershandbook
AT noakesfrykristen buildingeffectivecybersecurityprogramsasecuritymanagershandbook