Cargando…

Building an effective cybersecurity program: a security manager's handbook

You know by now that your company could not survive without the Internet. Not in today's market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the be...

Descripción completa

Detalles Bibliográficos
Autor principal: Schreider, Tari
Lenguaje:eng
Publicado: Rothstein Associates 2019
Materias:
Acceso en línea:http://cds.cern.ch/record/2705177
_version_ 1780964782802731008
author Schreider, Tari
author_facet Schreider, Tari
author_sort Schreider, Tari
collection CERN
description You know by now that your company could not survive without the Internet. Not in today's market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program?.
id cern-2705177
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2019
publisher Rothstein Associates
record_format invenio
spelling cern-27051772021-04-21T18:12:30Zhttp://cds.cern.ch/record/2705177engSchreider, TariBuilding an effective cybersecurity program: a security manager's handbookComputing and ComputersYou know by now that your company could not survive without the Internet. Not in today's market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program?.Rothstein Associatesoai:cds.cern.ch:27051772019
spellingShingle Computing and Computers
Schreider, Tari
Building an effective cybersecurity program: a security manager's handbook
title Building an effective cybersecurity program: a security manager's handbook
title_full Building an effective cybersecurity program: a security manager's handbook
title_fullStr Building an effective cybersecurity program: a security manager's handbook
title_full_unstemmed Building an effective cybersecurity program: a security manager's handbook
title_short Building an effective cybersecurity program: a security manager's handbook
title_sort building an effective cybersecurity program: a security manager's handbook
topic Computing and Computers
url http://cds.cern.ch/record/2705177
work_keys_str_mv AT schreidertari buildinganeffectivecybersecurityprogramasecuritymanagershandbook