<p/><br></br><p><b> Book Synopsis </b></p></br></br>Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business <ul> <li>Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues</li> <li>Covers 'What to Do When You Get Hacked?' including Business Continuity and Disaster Recovery planning, Public Relations, Legal and Regulatory issues, and Notifications and Disclosures</li> <li>Provides steps for integrating cybersecurity into Strategy; Policy and Guidelines; Change Management and Personnel Management</li> <li>Identifies cybersecurity best practices that executives can and should use both in the office and at home to protect their vital information</li> </ul><p/><br></br><p><b> From the Back Cover </b></p></br></br><p>This book is the essential cybersecurity text for executives in every corporate level and sector. Equally applicable to board members, CEOs and other C-suite officers, and others with leadership and managerial responsibilities, it gives practical advice that equips executives with the knowledge they need to make the right cybersecurity decisions.</p> <p>Written as a Practical Guide, the book explains in plain language how to recognize and act upon cybersecurity threats to protect yourself and your business, how to manage risk, and how to recover when a cyber incident occurs. It gives executives vital information needed to understand cybersecurity best practices and how to integrate them into their business to manage risk. Those who read this book will be better prepared to train their personnel, use cybersecurity metrics to protect their bottom line, and act decisively to mitigate and recover from cyber incidents.</p> <p>Through discussions of risk, strategy, policies, change and personnel management, and performance measures, the book provides relevant and timely information to help readers make better decisions regarding cybersecurity. An ideal book for business executives, it also is an important textbook for any computer science, engineering, or business curriculum at both the undergraduate and graduate levels.</p><p/><br></br><p><b> About the Author </b></p></br></br><p><b>Gregory J. Touhill</b>, CISSP, is a Cybersecurity and Information Technology consultant, academic and author with nearly 30 years of experience creating, sustaining, and defending information technology solutions that are effective, efficient, and secure. An experienced CIO and certified professional director, his team was awarded the 2012 Rowlett Award by the National Security Agency. An adjunct professor at Washington University in St. Louis' College of Engineering and Applied Science graduate programs in Cybersecurity and Information Management, he is engaged in several research projects with industry and academic partners, focusing on Cybersecurity issues. </p> <b>C. Joseph Touhill</b> is a successful CEO, board member, and senior executive. He is highly experienced in creating and managing companies, both large and small. He has been a corporate officer for 41 years, 29 years of which he has been a CEO. Additionally, he has had extensive board and high-level committee experience.
Cheapest price in the interval: 74.99 on November 8, 2021
Most expensive price in the interval: 74.99 on December 20, 2021
Price Archive shows prices from various stores, lets you see history and find the cheapest. There is no actual sale on the website. For all support, inquiry and suggestion messagescommunication@pricearchive.us