We are currently making improvements to the Audible site. In an effort to enhance the accessibility experience for our customers, we have created a page to more easily navigate the new experience, available at the web address www.audible.com/access .
 >   > 
How CIOs Can Solve the Security Puzzle Audiobook

How CIOs Can Solve the Security Puzzle: Tips and Techniques for CIOs to Use in Order to Secure Both Their IT Department and Their Company

Regular Price:$3.95
  • Membership Details:
    • First book free with 30-day trial
    • $14.95/month thereafter for your choice of 1 new book each month
    • Cancel easily anytime
    • Exchange books you don't like
    • All selected books are yours to keep, even if you cancel
  • - or -

Publisher's Summary

As though staying on top of changing technology trends wasn’t enough, today's CIOs also find themselves being held responsible for securing the IT department as well as the rest of the company. This is a job that few of us have ever been trained to do; however, the stakes have never been higher.

What you'll find inside:

  • Vulnerability Management: The Cio’s Other Job
  • Kevin Mitnick Speaks About IT Security
  • Data Protection Secrets: Cios Know That It Starts at the Endpoint
  • The Insider Threat: What Cios Need to Know

Your company's senior management knows even less about IT security than you do. However, they view you as being the person who can keep them safe. If you can accomplish this task, then you will have secured your relationship with the CEO and CFO, if not then they may be looking for a new CIO.

In order to successful secure your department and your company, you are going to have to start at the network's endpoints and work your way in. This will involve creating security policies that everyone can live with and performing routine vulnerability management studies.

The key to any successful securing of a corporate network is to make sure that only the right people and applications are allowed to be there. This means that you'll need to implement an effective identify management program. You'll have to do the same thing for the applications that run on the company's network by creating a whitelisting solution that ensures that you are only executing the code that should be run.

At times dealing with the wide variety of IT security threats that your company will be facing will seem to be overwhelming. However, by taking the time to listen to what reformed hackers have to tell us, you'll be able to prioritize the threats and focus your time and energy where they'll do the most good.

This audiobook has been created in order to provide you with a great start.

©2014 Jim Anderson (P)2014 Jim Anderson

What Members Say

Average Customer Rating

2.8 (9 )
5 star
 (1)
4 star
 (2)
3 star
 (2)
2 star
 (2)
1 star
 (2)
Overall
2.6 (8 )
5 star
 (1)
4 star
 (2)
3 star
 (1)
2 star
 (1)
1 star
 (3)
Story
2.6 (8 )
5 star
 (1)
4 star
 (1)
3 star
 (2)
2 star
 (2)
1 star
 (2)
Performance
Sort by:
  •  
    Flavio F. Burgos brazil 05-10-16
    Flavio F. Burgos brazil 05-10-16 Member Since 2016

    flavio burgos

    ratings
    REVIEWS
    2
    1
    Overall
    Performance
    Story
    "Bad tittle"

    Just a short view of IT security. Doesn't make big difference tome, even been a beginning at security IT field.

    0 of 0 people found this review helpful

Report Inappropriate Content

If you find this review inappropriate and think it should be removed from our site, let us know. This report will be reviewed by Audible and we will take appropriate action.

Cancel

Thank you.

Your report has been received. It will be reviewed by Audible and we will take appropriate action.