𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Why CISOs Fail (Internal Audit and IT Audit)

✍ Scribed by Barak Engel


Publisher
CRC Press
Year
2024
Tongue
English
Leaves
193
Edition
2
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Table of Contents


Cover
Endorsement
Half Title
Series Information
Title Page
Copyright Page
Table of Contents
Foreword
Preface
0 Why?
1 The Dismal Discipline
1.2 A Case Study
2 The Business of Being CISO
2.2 Incidents, Schmincidents
3 Let It Rain
3.2 Fear Mongering
4 Don’t Call Me Sue
4.2 Orange Coverall Blues
First Question: Is It a Breach?
Second Question: Should You Ever Override Counsel’s Decision?
Third Question: At $100,000, Was It an Unusually Large Bounty and Didn’t That Indicate Some Shady Intentions to Illegally Hide Stuff?
Fourth Question. Does this Change the Role of the CISO Itself as a Company Officer?
5 Comply Oh My
5.2 Voluntary Self-Immolation
6 Techs-Mechs
6.2 Follywood
7 The CISO, Reimagined
7.2 A New Paradigm


πŸ“œ SIMILAR VOLUMES


Modern Management and Leadership: Best P
✍ Mark Tarallo πŸ“‚ Library πŸ“… 2021 πŸ› CRC Press 🌐 English

<p><span>In one modest-sized volume, this book offers three valuable sets of knowledge. First, it provides best practice guidance on virtually every large-scale task a modern manager may be involved in―from recruiting and hiring to onboarding and leading teams, and from employee engagement and reten

Eauditing fundamentals: virtual communic
✍ Russell, James P.;Wilson, Shauna πŸ“‚ Library πŸ“… 2013 πŸ› ASQ Quality Press 🌐 English

Introduction to the eauditing process -- Virtual communications:; theory and practice -- Technology : interview and record review -- Technology : visual tools -- Audit models to consider -- Validation challenges and eaudit risk.

Eauditing fundamentals : virtual communi
✍ Russell, James P.; Wilson, Shauna πŸ“‚ Library πŸ“… 2013 πŸ› ASQ Quality Press 🌐 English

The purpose of this book is to provide hands-on guidelines for using electronic communication tools as part of the auditing process. The pros and cons of conducting e-audits and their consequences will be reviewed. There are situations when e-auditing techniques are more efficient, and other times t

Blockchain for Cybersecurity and Privacy
✍ Yassine Maleh (editor) πŸ“‚ Library πŸ“… 2020 πŸ› CRC Press 🌐 English

<p>Blockchain technology is defined as a decentralized system of distributed registers that are used to record data transactions on multiple computers. The reason this technology has gained popularity is that you can put any digital asset or transaction in the blocking chain, the industry does not m

Next-Generation Enterprise Security and
✍ Mohiuddin Ahmed (editor), Nour Moustafa (editor), Abu Barkat (editor), Paul Hask πŸ“‚ Library πŸ“… 2022 πŸ› CRC Press 🌐 English

<p><span>The Internet is making our daily lives as digital as possible, and this new era is called the Internet of Everything (IoE). The key force behind the rapid growth of the Internet is the technological advancement of enterprises. The digital world we live in is facilitated by these enterprises

CyRM: Mastering the Management of Cybers
✍ David X Martin πŸ“‚ Library πŸ“… 2021 πŸ› CRC Press 🌐 English

<p>Is your enterprise’s strategy for cybersecurity just crossing its fingers and hoping nothing bad ever happens? If so…you’re not alone. Getting cybersecurity right is all too often an afterthought for Fortune 500 firms, bolted on and hopefully creating a secure environment. We all know this approa