Cargando…
Building effective cybersecurity programs: a security manager's handbook
You know by now that your company could not survive without the Internet. Not in today's market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the be...
Autores principales: | , |
---|---|
Lenguaje: | eng |
Publicado: |
Rothstein Publishing
2017
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/2300952 |
_version_ | 1780957171284967424 |
---|---|
author | Schreider, Tari Noakes-Fry, Kristen |
author_facet | Schreider, Tari Noakes-Fry, Kristen |
author_sort | Schreider, Tari |
collection | CERN |
description | You know by now that your company could not survive without the Internet. Not in today's market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program? Tari Schreider, in Building Effective Cybersecurity Programs: A Security Manager's Handbook, lays out the step-by-step roadmap to follow as you build or enhance your cybersecurity program. |
id | cern-2300952 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2017 |
publisher | Rothstein Publishing |
record_format | invenio |
spelling | cern-23009522021-04-21T18:55:59Zhttp://cds.cern.ch/record/2300952engSchreider, TariNoakes-Fry, KristenBuilding effective cybersecurity programs: a security manager's handbookOther SubjectsYou know by now that your company could not survive without the Internet. Not in today's market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program? Tari Schreider, in Building Effective Cybersecurity Programs: A Security Manager's Handbook, lays out the step-by-step roadmap to follow as you build or enhance your cybersecurity program.Rothstein Publishingoai:cds.cern.ch:23009522017 |
spellingShingle | Other Subjects Schreider, Tari Noakes-Fry, Kristen Building effective cybersecurity programs: a security manager's handbook |
title | Building effective cybersecurity programs: a security manager's handbook |
title_full | Building effective cybersecurity programs: a security manager's handbook |
title_fullStr | Building effective cybersecurity programs: a security manager's handbook |
title_full_unstemmed | Building effective cybersecurity programs: a security manager's handbook |
title_short | Building effective cybersecurity programs: a security manager's handbook |
title_sort | building effective cybersecurity programs: a security manager's handbook |
topic | Other Subjects |
url | http://cds.cern.ch/record/2300952 |
work_keys_str_mv | AT schreidertari buildingeffectivecybersecurityprogramsasecuritymanagershandbook AT noakesfrykristen buildingeffectivecybersecurityprogramsasecuritymanagershandbook |