Have one to sell?
Winning As a Ciso Paperback – 1 Jun 2005
See all formats and editions Hide other formats and editions
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
No customer reviews
|5 star (0%)|
|4 star (0%)|
|3 star (0%)|
|2 star (0%)|
|1 star (0%)|
Review this product
Most helpful customer reviews on Amazon.com
Amazon.com: 3 reviews
3 March 2016 - Published on Amazon.com
David W. Rooker
A must read!
18 August 2013 - Published on Amazon.com
Easy read with a great message and thought provoking. I recommend this for every security professional. Writing from someone that has been their and done that...
He has looked at how the CISO role has evolved over the years and makes a pretty good case for where it needs to go next
17 January 2015 - Published on Amazon.com
One person found this helpful.
The roles of the chief information officer (CIO), the chief security officer (CSO), and the chief information security officer (CISO) in the modern enterprise have been constantly changing since we invented the need for such roles in the 1980s and 1990s. By the mid-2000s, the industry had settled on tucking the security function for an organization under the IT function of an organization. In other words, the CISO works for the CIO. But Baich is an innovative thinker. He has looked at how the CISO role has evolved over the years and makes a pretty good case for where it needs to go next. By asking questions about the appropriate supervisor for a CISO, a CISO’s needed skill set, and ways to approach the CISO job function, Baich breaks new ground on how the industry should views these topics. Our industry will be slow to adopt these new ideas, but with the rash of highly publicized and impactful data breaches to the retail sector in 2014, perhaps the industry is ready to start making a change. Reviewing Baich’s book is a good place to start. It is cyber-security-canon worthy, and you should have read it by now. See the full review at the Cybersecurity Canon Website.