Common section

The CISO Evolution: Business Knowledge for Cybersecurity Executives

The CISO Evolution: Business Knowledge for Cybersecurity Executives

Learn to effectively deliver business aligned cybersecurity outcomes.

In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos “Rock” Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.

The authors use illustrative stories to show professionals how to establish an executive presence and avoid the most common pitfalls experienced by technology experts when speaking and presenting to executives. The book will show you how to:

  • Inspire trust in senior business leaders by properly aligning and setting expectations around risk appetite and capital allocation.
  • Properly characterize the indispensable role of cybersecurity in your company’s overall strategic plan.
  • Acquire the necessary funding and resources for your company’s cybersecurity program and avoid the stress and anxiety that comes with underfunding.

Perfect for security and risk professionals, IT auditors, and risk managers looking for effective strategies to communicate cybersecurity concepts and ideas to business professionals without a background in technology. The CISO Evolution is also a must-read resource for business executives, managers, and leaders hoping to improve the quality of dialogue with their cybersecurity leaders.

Introduction

Part I: Foundational Business Knowledge

Chapter 1. Financial Principles

Chapter 2. Business Strategy Tools

Chapter 3. Business Decisions

Chapter 4. Value Creation

Chapter 5. Articulating the Business Case

Part I: Communication and Education

Chapter 6. Cybersecurity: A Concern of the Business, Not Just IT

Chapter 7. Translating Cyber Risk into Business Risk

Chapter 8. Communication – You Do It Every Day (or Do You?)

Part III: Cybersecurity Leadership

Chapter 9. Relationship Management

Chapter 10. Recruiting and Leading High Performing Teams

Chapter 11. Managing Human Capital

Chapter 12. Negotiation

Conclusion

If you find an error or have any questions, please email us at admin@erenow.net. Thank you!