
90 Days: A CISO’s Journey to Impact
Define Your Role
No se pudo agregar al carrito
Add to Cart failed.
Error al Agregar a Lista de Deseos.
Error al eliminar de la lista de deseos.
Error al añadir a tu biblioteca
Error al seguir el podcast
Error al dejar de seguir el podcast
$0.99/mes por los primeros 3 meses

Compra ahora por $3.95
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrado por:
-
SentinelOne
Acerca de esta escucha
In the course of delivering provocative endpoint technology to thousands of customers over the past two-and-a-half years, we’ve seen a variety of styles, challenges, successes, and failures across the global CISO population. No doubt the role and responsibility of the CISO is one of the most unique charges in the enterprise of today. Rather than keep these observations and interactions internal to SentinelOne, our team decided to serve as a platform for allowing CISOs to share perspectives, experiences, and lessons learned with the broader community.
Our series was born. While certainly near and dear to us, the topic of endpoint protection, detection, and response is but an essential part of the CISO and cybersecurity leader experience - this publication is not an endpoint bible or propaganda piece. It’s not an “Idiot’s Guide” to being a CISO. Rather, our design principle of this piece is simple: a laconic guide to provide practical advice for CISOs to make instant and lasting impact in their organizations.
In our first publication, 90 Days: A CISO’s Journey to Impact, we profile some of the world’s leading enterprise cybersecurity leaders. They share their views on the role and advice to create rapid impact in a reasonable amount of time - 90 days. It is our hope that listeners, whether existing or future CISOs, gain insights to continuously improve and be their most effective selves.
©2018 SentinelOne (P)2018 SentinelOneLos oyentes también disfrutaron...
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- De: Matthew K. Sharp, Kyriakos Lambros
- Narrado por: Christopher Grove
- Duración: 13 h y 7 m
- Versión completa
-
General
-
Narración:
-
Historia
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Essential read for CISO’s and those in their professional orbit
- De Gilan en 01-31-25
De: Matthew K. Sharp, y otros
-
Cybersecurity Leadership
- Powering the Modern Organization
- De: Mansur Hasib
- Narrado por: Mansur Hasib
- Duración: 7 h y 3 m
- Versión completa
-
General
-
Narración:
-
Historia
Cybersecurity involves people, policy, and technology. Yet most books and academic programs cover only technology. Hence the implementation of cybersecurity as a people powered perpetual innovation and productivity engine is not done. People think they can buy cybersecurity as a product when in fact the discipline is the modern practice of digital business strategy. People also equate cybersecurity with information security or security alone. However, security is a state, while cybersecurity is a process.
-
-
CIOs and CISOs should read this book...
- De Chad L Fulgham en 08-12-15
De: Mansur Hasib
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- De: George Finney, John Kindervag - foreword
- Narrado por: Daniel Thomas May
- Duración: 7 h y 51 m
- Versión completa
-
General
-
Narración:
-
Historia
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- De Jordan en 10-16-22
De: George Finney, y otros
-
A Leader’s Guide to Cybersecurity
- Why Boards Need to Lead - and How to Do It
- De: Thomas J. Parenty, Jack J. Domet
- Narrado por: Jonathan Todd Ross
- Duración: 5 h y 47 m
- Versión completa
-
General
-
Narración:
-
Historia
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who've spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition.
-
-
Must read for today’s corporate leaders
- De J. M. Wilson en 10-20-20
De: Thomas J. Parenty, y otros
-
Cybersecurity Program Development for Business
- The Essential Planning Guide
- De: Chris Moschovitis
- Narrado por: Sean Pratt
- Duración: 9 h y 9 m
- Versión completa
-
General
-
Narración:
-
Historia
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles, and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. If you're a business manager or executive who needs to make sense of cybersecurity, this audiobook demystifies it for you.
-
-
Best Reference for Cyber Program Development
- De Roger Swanson en 07-19-18
-
1% Leadership
- Master the Small, Daily Improvements That Set Great Leaders Apart
- De: Andy Ellis
- Narrado por: Andy Ellis
- Duración: 5 h y 17 m
- Versión completa
-
General
-
Narración:
-
Historia
Leadership development speaker & consultant Andy Ellis is the former CSO of Akamai, where he contributed to the creation of Akamai's billion‑dollar cybersecurity business. He now brings his speaking, consulting, and business knowledge to listeners with 1% Leadership—based on the reality that real-world leadership is messy and complicated; it rarely fits into an acronym or a dogmatic overarching philosophy. Ellis says that there are no “irrefutable laws” of leadership or power; there is no secret.
-
-
Actionable Advice!
- De Matt Meis en 09-18-24
De: Andy Ellis
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- De: Matthew K. Sharp, Kyriakos Lambros
- Narrado por: Christopher Grove
- Duración: 13 h y 7 m
- Versión completa
-
General
-
Narración:
-
Historia
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Essential read for CISO’s and those in their professional orbit
- De Gilan en 01-31-25
De: Matthew K. Sharp, y otros
-
Cybersecurity Leadership
- Powering the Modern Organization
- De: Mansur Hasib
- Narrado por: Mansur Hasib
- Duración: 7 h y 3 m
- Versión completa
-
General
-
Narración:
-
Historia
Cybersecurity involves people, policy, and technology. Yet most books and academic programs cover only technology. Hence the implementation of cybersecurity as a people powered perpetual innovation and productivity engine is not done. People think they can buy cybersecurity as a product when in fact the discipline is the modern practice of digital business strategy. People also equate cybersecurity with information security or security alone. However, security is a state, while cybersecurity is a process.
-
-
CIOs and CISOs should read this book...
- De Chad L Fulgham en 08-12-15
De: Mansur Hasib
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- De: George Finney, John Kindervag - foreword
- Narrado por: Daniel Thomas May
- Duración: 7 h y 51 m
- Versión completa
-
General
-
Narración:
-
Historia
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- De Jordan en 10-16-22
De: George Finney, y otros
-
A Leader’s Guide to Cybersecurity
- Why Boards Need to Lead - and How to Do It
- De: Thomas J. Parenty, Jack J. Domet
- Narrado por: Jonathan Todd Ross
- Duración: 5 h y 47 m
- Versión completa
-
General
-
Narración:
-
Historia
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who've spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition.
-
-
Must read for today’s corporate leaders
- De J. M. Wilson en 10-20-20
De: Thomas J. Parenty, y otros
-
Cybersecurity Program Development for Business
- The Essential Planning Guide
- De: Chris Moschovitis
- Narrado por: Sean Pratt
- Duración: 9 h y 9 m
- Versión completa
-
General
-
Narración:
-
Historia
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles, and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. If you're a business manager or executive who needs to make sense of cybersecurity, this audiobook demystifies it for you.
-
-
Best Reference for Cyber Program Development
- De Roger Swanson en 07-19-18
-
1% Leadership
- Master the Small, Daily Improvements That Set Great Leaders Apart
- De: Andy Ellis
- Narrado por: Andy Ellis
- Duración: 5 h y 17 m
- Versión completa
-
General
-
Narración:
-
Historia
Leadership development speaker & consultant Andy Ellis is the former CSO of Akamai, where he contributed to the creation of Akamai's billion‑dollar cybersecurity business. He now brings his speaking, consulting, and business knowledge to listeners with 1% Leadership—based on the reality that real-world leadership is messy and complicated; it rarely fits into an acronym or a dogmatic overarching philosophy. Ellis says that there are no “irrefutable laws” of leadership or power; there is no secret.
-
-
Actionable Advice!
- De Matt Meis en 09-18-24
De: Andy Ellis
-
The First 90 Days, Updated and Expanded
- Proven Strategies for Getting Up to Speed Faster and Smarter
- De: Michael Watkins
- Narrado por: Grover Gardner
- Duración: 6 h y 58 m
- Versión completa
-
General
-
Narración:
-
Historia
The world’s most trusted guide for leaders in transition. Transitions are a critical time for leaders. In fact, most agree that moving into a new role is the biggest challenge a manager will face. While transitions offer a chance to start fresh and make needed changes in an organization, they also place leaders in a position of acute vulnerability. Missteps made during the crucial first three months in a new role can jeopardize or even derail your success.
-
-
Missing access to tables and charts
- De Vipul Gautam en 03-25-16
De: Michael Watkins
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- De: Eric Conrad, Seth Misenar, Joshua Feldman
- Narrado por: Matthew E. Kelly
- Duración: 10 h y 4 m
- Versión completa
-
General
-
Narración:
-
Historia
Eleventh Hour CISSP®: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. This new edition is aligned to cover all material in the most current version of the exam’s Common Body of Knowledge.
-
-
pretty good but need pdf file for charts
- De Amazon Customer en 08-24-21
De: Eric Conrad, y otros
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- De: Rick Howard
- Narrado por: Rick Howard
- Duración: 9 h y 15 m
- Versión completa
-
General
-
Narración:
-
Historia
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles.
-
-
Just What I was looking for
- De Roman en 11-17-24
De: Rick Howard
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- De: Kevin Mitnick, William L. Simon
- Narrado por: Ray Porter
- Duración: 13 h y 59 m
- Versión completa
-
General
-
Narración:
-
Historia
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- De Joshua en 09-17-14
De: Kevin Mitnick, y otros
-
The Smartest Person in the Room
- The Root Cause and New Solution for Cybersecurity
- De: Christian Espinosa
- Narrado por: Kaleo Griffith
- Duración: 6 h y 54 m
- Versión completa
-
General
-
Narración:
-
Historia
With cyberattacks resulting in often devastating results, it’s no wonder executives hire the best and brightest of the IT world for protection. But are you doing enough? Do you understand your risks? What if the brightest aren’t always the best choice for your company? In The Smartest Person in the Room, Christian Espinosa shows you how to leverage your company’s smartest minds to your benefit and theirs. Learn from Christian’s own journey from cybersecurity engineer to company CEO.
-
-
Bland
- De Jonathan en 09-01-21
-
The DevOps Handbook, Second Edition
- How to Create World-Class Agility, Reliability, & Security in Technology Organizations
- De: Gene Kim, Jez Humble, Patrick Debois, y otros
- Narrado por: Ron Butler
- Duración: 15 h y 51 m
- Versión completa
-
General
-
Narración:
-
Historia
This award-winning and best-selling business handbook for digital transformation is now fully updated and expanded with the latest research and new case studies! Over the last five years, The DevOps Handbook has been the definitive guide for taking the successes laid out in the best-selling The Phoenix Project and applying them in any organization. Now, with this fully updated and expanded edition, it’s time to take DevOps out of the IT department and apply it across the full business.
-
-
Atrocious
- De Anonymous User en 05-25-22
De: Gene Kim, y otros
-
The Fifth Domain
- Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats
- De: Richard A. Clarke, Robert K. Knake
- Narrado por: Marc Cashman
- Duración: 12 h y 8 m
- Versión completa
-
General
-
Narración:
-
Historia
Clarke and Knake take us inside quantum-computing labs racing to develop cyber superweapons; bring us into the boardrooms of the many firms that have been hacked and the few that have not; and walk us through the corridors of the US intelligence community with officials working to defend America's elections from foreign malice. With a focus on solutions over scaremongering, they make a compelling case for "cyber resilience" - building systems that can resist most attacks, raising the costs on cyber criminals and the autocrats who often lurk behind them, and avoiding...overreaction.
-
-
The Author Lacks Critical Thinking
- De Thomas Rose en 08-08-20
De: Richard A. Clarke, y otros
-
RMF ISSO: Foundations (Guide)
- NIST 800 Risk Management Framework for Cybersecurity Professionals
- De: Bruce Brown
- Narrado por: Frank Block
- Duración: 1 h y 32 m
- Versión completa
-
General
-
Narración:
-
Historia
This is a breakdown of the NIST risk management framework process for cybersecurity professionals getting into security compliance. It is written in layman's terms, without the convoluted way it is described in the NIST SP 800-37 revision 2. It goes into what the information system security officer does at each step in the process and where their attention should be focused. Although the main focus is on implementation of the NIST 800 RMF process, this book covers many of the main concepts on certifications, such as the ISC2 CAP.
-
-
Great supplement to the physical book
- De Andrea Christine en 06-08-24
De: Bruce Brown
-
The Art of Attack
- Attacker Mindset for Security Professionals
- De: Maxie Reynolds
- Narrado por: Stephanie Dillard
- Duración: 9 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- De Anonymous User en 10-19-22
De: Maxie Reynolds
-
CISSP All-in-One Exam Guide, Ninth Edition
- De: Fernando Maymi, Shon Harris
- Narrado por: Teri Schnaubelt
- Duración: 51 h y 34 m
- Versión completa
-
General
-
Narración:
-
Historia
Thoroughly updated for the latest release of the Certified Information Systems Security Professional exam, this comprehensive resource covers all objectives in the 2021 CISSP exam developed by the International Information Systems Security Certification Consortium (ISC)2®. CISSP All-in-One Exam Guide, Ninth Edition features learning objectives at the beginning of each chapter, exam tips, practice questions, and in-depth explanations.
-
-
Comprehensive Knowledge
- De Anonymous User en 05-09-24
De: Fernando Maymi, y otros
-
Empowered
- Ordinary People, Extraordinary Products
- De: Marty Cagan, Chris Jones
- Narrado por: Marty Cagan
- Duración: 11 h y 9 m
- Versión completa
-
General
-
Narración:
-
Historia
What is it about the top tech product companies such as Amazon, Apple, Google, Netflix, and Tesla that enables their record of consistent innovation? Most people think it's because these companies are somehow able to find and attract a level of talent that makes this innovation possible. But the real advantage these companies have is not so much who they hire, but rather how they enable their people to work together to solve hard problems and create extraordinary products.
-
-
Where’s the meat?
- De Scott en 01-14-22
De: Marty Cagan, y otros
-
Cyber Crisis
- Protecting Your Business from Real Threats in the Virtual World
- De: Eric Cole
- Narrado por: Michael Butler Murray
- Duración: 6 h y 28 m
- Versión completa
-
General
-
Narración:
-
Historia
Based on news reports, you might think there's a major cybersecurity threat every four to five months. In reality, there's a cybersecurity attack happening every minute of every day. In Cyber Crisis, Eric Cole gives listeners a clear-eyed picture of the information war raging in cyberspace. Drawing on 30 years of experience, Cole offers practical, actionable advice that even those with little technical background can implement, including steps to take on a daily, weekly, and monthly basis to protect their businesses and themselves.
-
-
Industry Best Practices
- De netusera en 02-18-25
De: Eric Cole
Lo que los oyentes dicen sobre 90 Days: A CISO’s Journey to Impact
Calificaciones medias de los clientesReseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.
-
Total
-
Ejecución
-
Historia
- MvD (the Netherlands)
- 05-13-19
A nice starting point for new CISO's
This would be a good starting point to get some ideas and points to put to paper on your plan as a newbie CISO. Get the 12 points suggested in a plan and it will allow you to focus on some quick wins.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Brad
- 06-10-23
Audio Book is only about 30 minutes long
Total waste of my credit, as the book is about as long as a sitcom.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña