Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Building a Cyber Resilient Business
  • Table Of Contents Toc
Building a Cyber Resilient Business

Building a Cyber Resilient Business

By : Dr. Magda Lilia Chelly , Shamane Tan, Tran
5 (5)
close
close
Building a Cyber Resilient Business

Building a Cyber Resilient Business

5 (5)
By: Dr. Magda Lilia Chelly , Shamane Tan, Tran

Overview of this book

With cyberattacks on the rise, it has become essential for C-suite executives and board members to step up and collectively recognize cyber risk as a top priority business risk. However, non-cyber executives find it challenging to understand their role in increasing the business’s cyber resilience due to its complex nature and the lack of a clear return on investment. This book demystifies the perception that cybersecurity is a technical problem, drawing parallels between the key responsibilities of the C-suite roles to line up with the mission of the Chief Information Security Officer (CISO). The book equips you with all you need to know about cyber risks to run the business effectively. Each chapter provides a holistic overview of the dynamic priorities of the C-suite (from the CFO to the CIO, COO, CRO, and so on), and unpacks how cybersecurity must be embedded in every business function. The book also contains self-assessment questions, which are a helpful tool in evaluating any major cybersecurity initiatives and/or investment required. With this book, you’ll have a deeper appreciation of the various ways all executives can contribute to the organization’s cyber program, in close collaboration with the CISO and the security team, and achieve a cyber-resilient, profitable, and sustainable business.
Table of Contents (14 chapters)
close
close

The CTO and Security by Design

The Chief Technology Officer (CTO) is an executive who handles an organization’s technical requirements and research and development (R&D). The CTO often reports directly to the Chief Information Officer (CIO) but in some organizations may report to the Chief Executive Officer (CEO). The CTO is also responsible for overseeing technology development for the company’s customers, and may handle internal IT operations for smaller companies that have no CIO.

When working with your CTOs, it helps to understand their priorities, potential conflicts of interest with the Chief Information Security Officer (CISO), and the importance of security by design and secure coding for the CTO’s role in cybersecurity.

We will cover the following topics in this chapter:

  • The role of the CTO
  • Why the CTO should care about cybersecurity
  • How the CTO becomes a security ally
  • Secure coding and secure software development
  • Conflicts...
Visually different images
CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Building a Cyber Resilient Business
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon