
Cybersecurity Leadership
Powering the Modern Organization
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
$0.99/mo for the first 3 months

Buy for $19.95
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrated by:
-
Mansur Hasib
-
By:
-
Mansur Hasib
About this listen
This book enables newcomers, business professionals as well as seasoned cybersecurity practitioners and marketers to understand and to explain the discipline to anyone. This book is not about technology and no technical knowledge or prior background is required to understand this book.
Cybersecurity involves people, policy, and technology. Yet most books and academic programs cover only technology. Hence the implementation of cybersecurity as a people powered perpetual innovation and productivity engine is not done. People think they can buy cybersecurity as a product when in fact the discipline is the modern practice of digital business strategy. People also equate cybersecurity with information security or security alone. However, security is a state, while cybersecurity is a process. Too many people equate cybersecurity with computer science when in fact cybersecurity is a business discipline.
Written and narrated by Dr. Mansur Hasib a globally acclaimed scholar, practitioner, and author with a Doctor of Science in cybersecurity and over ten years experience designing and running award-winning cybersecurity education programs on a global scale. The author also served as Chief Information Officer and implemented profitable digital transformations and cybersecurity strategy in healthcare, biotechnology, education, and energy for more than 30 years.
This book is widely acclaimed by practitioners and scholars alike as the definitive book on cybersecurity leadership and governance. Dr. Hasib is a sought after speaker and has won multiple global awards such as: 2020 Cybersecurity Champion of the Year; 2020 People's Choice Award in Cybersecurity; 2019 Best Cybersecurity Higher Education Program in the USA; 2019 Outstanding Global Cybersecurity Leadership; 2018 Best Cybersecurity Higher Education Program in the USA; 2018 Hall of Fame; 2017 People's Choice Award in Cybersecurity; 2017 Information Governance Expert of the Year; 2017 (ISC)2 Americas ISLA Award.
©2015 Mansur Hasib (P)2021 Mansur HasibListeners also enjoyed...
-
90 Days: A CISO’s Journey to Impact
- Define Your Role
- By: SentinelOne Publication, Migo Kedem - introduction
- Narrated by: SentinelOne
- Length: 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
In our first publication, 90 Days: A CISO’s Journey to Impact, we profile some of the world’s leading enterprise cybersecurity leaders. They share their views on the role and advice to create rapid impact in a reasonable amount of time - 90 days. It is our hope that listeners, whether existing or future CISOs, gain insights to continuously improve and be their most effective selves.
-
-
Audio Book is only about 30 minutes long
- By Brad on 06-10-23
By: SentinelOne Publication, and others
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- By: George Finney, John Kindervag - foreword
- Narrated by: Daniel Thomas May
- Length: 7 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- By Jordan on 10-16-22
By: George Finney, and others
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- By: Matthew K. Sharp, Kyriakos Lambros
- Narrated by: Christopher Grove
- Length: 13 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Essential read for CISO’s and those in their professional orbit
- By Gilan on 01-31-25
By: Matthew K. Sharp, and others
-
A Leader’s Guide to Cybersecurity
- Why Boards Need to Lead - and How to Do It
- By: Thomas J. Parenty, Jack J. Domet
- Narrated by: Jonathan Todd Ross
- Length: 5 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who've spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition.
-
-
Must read for today’s corporate leaders
- By J. M. Wilson on 10-20-20
By: Thomas J. Parenty, and others
-
Bring Inner Greatness Out
- Personal Brand
- By: Dr. Mansur Hasib
- Narrated by: Dr. Mansur Hasib
- Length: 9 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
What is a personal brand? Can I build a personal brand? How does it help me? Why do movie actors, singers, TV anchors, and athletes earn millions of dollars? Could I be globally famous like them? Can I get better returns from my marketing? If any of these questions are swirling in your mind, this book has your answers. In one book, you get a completely new perspective to improve your life by building a valuable personal brand and gaining confidence, just as it has for countless others globally. Follow the easy step-by-step process and be amazed at the rapid results.
-
-
Must Listen for Personal Brand Development
- By Holly Hartman on 01-13-24
By: Dr. Mansur Hasib
-
The Phoenix Project
- A Novel about IT, DevOps, and Helping Your Business Win 5th Anniversary Edition
- By: Gene Kim, Kevin Behr, George Spafford
- Narrated by: Chris Ruen
- Length: 14 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Bill, an IT manager at Parts Unlimited, has been tasked with taking on a project critical to the future of the business, code named Phoenix Project. But the project is massively over budget and behind schedule. The CEO demands Bill must fix the mess in 90 days, or else Bill’s entire department will be outsourced. With the help of a prospective board member and his mysterious philosophy of the Three Ways, Bill starts to see that IT work has more in common with manufacturing plant work than he ever imagined.
-
-
Theory and Practice merged
- By Peter on 11-23-15
By: Gene Kim, and others
-
90 Days: A CISO’s Journey to Impact
- Define Your Role
- By: SentinelOne Publication, Migo Kedem - introduction
- Narrated by: SentinelOne
- Length: 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
In our first publication, 90 Days: A CISO’s Journey to Impact, we profile some of the world’s leading enterprise cybersecurity leaders. They share their views on the role and advice to create rapid impact in a reasonable amount of time - 90 days. It is our hope that listeners, whether existing or future CISOs, gain insights to continuously improve and be their most effective selves.
-
-
Audio Book is only about 30 minutes long
- By Brad on 06-10-23
By: SentinelOne Publication, and others
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- By: George Finney, John Kindervag - foreword
- Narrated by: Daniel Thomas May
- Length: 7 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- By Jordan on 10-16-22
By: George Finney, and others
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- By: Matthew K. Sharp, Kyriakos Lambros
- Narrated by: Christopher Grove
- Length: 13 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Essential read for CISO’s and those in their professional orbit
- By Gilan on 01-31-25
By: Matthew K. Sharp, and others
-
A Leader’s Guide to Cybersecurity
- Why Boards Need to Lead - and How to Do It
- By: Thomas J. Parenty, Jack J. Domet
- Narrated by: Jonathan Todd Ross
- Length: 5 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who've spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition.
-
-
Must read for today’s corporate leaders
- By J. M. Wilson on 10-20-20
By: Thomas J. Parenty, and others
-
Bring Inner Greatness Out
- Personal Brand
- By: Dr. Mansur Hasib
- Narrated by: Dr. Mansur Hasib
- Length: 9 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
What is a personal brand? Can I build a personal brand? How does it help me? Why do movie actors, singers, TV anchors, and athletes earn millions of dollars? Could I be globally famous like them? Can I get better returns from my marketing? If any of these questions are swirling in your mind, this book has your answers. In one book, you get a completely new perspective to improve your life by building a valuable personal brand and gaining confidence, just as it has for countless others globally. Follow the easy step-by-step process and be amazed at the rapid results.
-
-
Must Listen for Personal Brand Development
- By Holly Hartman on 01-13-24
By: Dr. Mansur Hasib
-
The Phoenix Project
- A Novel about IT, DevOps, and Helping Your Business Win 5th Anniversary Edition
- By: Gene Kim, Kevin Behr, George Spafford
- Narrated by: Chris Ruen
- Length: 14 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Bill, an IT manager at Parts Unlimited, has been tasked with taking on a project critical to the future of the business, code named Phoenix Project. But the project is massively over budget and behind schedule. The CEO demands Bill must fix the mess in 90 days, or else Bill’s entire department will be outsourced. With the help of a prospective board member and his mysterious philosophy of the Three Ways, Bill starts to see that IT work has more in common with manufacturing plant work than he ever imagined.
-
-
Theory and Practice merged
- By Peter on 11-23-15
By: Gene Kim, and others
-
Measure What Matters
- How Google, Bono, and the Gates Foundation Rock the World with OKRs
- By: John Doerr, Larry Page - foreword
- Narrated by: John Doerr, full cast, Julia Collins, and others
- Length: 7 hrs and 56 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Measure What Matters, Doerr shares a broad range of first-person, behind-the-scenes case studies, with narrators including Bono and Bill Gates, to demonstrate the focus, agility, and explosive growth that the Objectives and Key Results system has spurred at so many great organizations. This book will help a new generation of leaders capture the same magic.
-
-
Last chapter covers what matters most
- By Dan Richards on 06-08-18
By: John Doerr, and others
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- By: Cliff Stoll
- Narrated by: Will Damron
- Length: 12 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
A story that stands the test of time
- By Todd on 08-11-20
By: Cliff Stoll
-
Prepare for the ISACA Certified Information Security Manager Exam
- CISM Review Manual
- By: Gwen Bettwy, Mark Williams, Mike Beevers
- Narrated by: Gwen Bettwy
- Length: 5 hrs and 55 mins
- Unabridged
-
Overall
-
Performance
-
Story
A straightforward look at the four domains of the ISACA Certified Information Security Manager exam. This book will help you get a firm grasp on the key topics needed for success with the exam. Included are over 120 practice questions covering the four domains of ISACA's CISM.
-
-
Good content could be organized better
- By SMB on 09-21-21
By: Gwen Bettwy, and others
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- By: Eric Conrad, Seth Misenar, Joshua Feldman
- Narrated by: Matthew E. Kelly
- Length: 10 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Eleventh Hour CISSP®: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. This new edition is aligned to cover all material in the most current version of the exam’s Common Body of Knowledge.
-
-
pretty good but need pdf file for charts
- By Amazon Customer on 08-24-21
By: Eric Conrad, and others
-
Cybersecurity Program Development for Business
- The Essential Planning Guide
- By: Chris Moschovitis
- Narrated by: Sean Pratt
- Length: 9 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles, and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. If you're a business manager or executive who needs to make sense of cybersecurity, this audiobook demystifies it for you.
-
-
Best Reference for Cyber Program Development
- By Roger Swanson on 07-19-18
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- By: Rick Howard
- Narrated by: Rick Howard
- Length: 9 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles.
-
-
Just What I was looking for
- By Roman on 11-17-24
By: Rick Howard
-
The Culture Code
- The Secrets of Highly Successful Groups
- By: Daniel Coyle
- Narrated by: Will Damron
- Length: 7 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Culture Code, Daniel Coyle goes inside some of the world's most successful organizations - including Pixar, the San Antonio Spurs, and the US Navy's SEAL Team Six - and reveals what makes them tick. He demystifies the culture-building process by identifying three key skills that generate cohesion and cooperation and explains how diverse groups learn to function with a single mind.
-
-
Anyone in a leadership position should read this
- By Kimberly on 03-04-18
By: Daniel Coyle
-
The Art of Attack
- Attacker Mindset for Security Professionals
- By: Maxie Reynolds
- Narrated by: Stephanie Dillard
- Length: 9 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- By Anonymous User on 10-19-22
By: Maxie Reynolds
-
The Smartest Person in the Room
- The Root Cause and New Solution for Cybersecurity
- By: Christian Espinosa
- Narrated by: Kaleo Griffith
- Length: 6 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
With cyberattacks resulting in often devastating results, it’s no wonder executives hire the best and brightest of the IT world for protection. But are you doing enough? Do you understand your risks? What if the brightest aren’t always the best choice for your company? In The Smartest Person in the Room, Christian Espinosa shows you how to leverage your company’s smartest minds to your benefit and theirs. Learn from Christian’s own journey from cybersecurity engineer to company CEO.
-
-
Bland
- By Jonathan on 09-01-21
-
The Five Dysfunctions of a Team
- A Leadership Fable
- By: Patrick Lencioni
- Narrated by: Charles Stransky; introduction by Patrick Lencioni
- Length: 3 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
In keeping with the parable style, Patrick Lencioni begins by telling the fable of a woman who, as CEO of a struggling Silicon Valley firm, took control of a dysfunctional executive committee and helped its members succeed as a team. Story time over, Lencioni offers explicit instructions for overcoming the human behavioral tendencies that he says corrupt teams. Succinct yet sympathetic, this guide will be a boon for those struggling with the inherent difficulties of leading a group.
-
-
Clear Headed Guidance on Building Teams
- By Mark on 01-18-03
By: Patrick Lencioni
-
The Fifth Domain
- Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats
- By: Richard A. Clarke, Robert K. Knake
- Narrated by: Marc Cashman
- Length: 12 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Clarke and Knake take us inside quantum-computing labs racing to develop cyber superweapons; bring us into the boardrooms of the many firms that have been hacked and the few that have not; and walk us through the corridors of the US intelligence community with officials working to defend America's elections from foreign malice. With a focus on solutions over scaremongering, they make a compelling case for "cyber resilience" - building systems that can resist most attacks, raising the costs on cyber criminals and the autocrats who often lurk behind them, and avoiding...overreaction.
-
-
The Author Lacks Critical Thinking
- By Thomas Rose on 08-08-20
By: Richard A. Clarke, and others
-
Good to Great
- Why Some Companies Make the Leap...And Others Don't
- By: Jim Collins
- Narrated by: Jim Collins
- Length: 10 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
Built To Last, the defining management study of the 90s, showed how great companies triumph over time and how long-term sustained performance can be engineered into the DNA of an enterprise from the very beginning. But what about companies that are not born with great DNA? How can good companies, mediocre companies, even bad companies achieve enduring greatness?
-
-
Good info, over-the-top narration
- By Anaxamaxan on 08-31-10
By: Jim Collins
What listeners say about Cybersecurity Leadership
Highly rated for:
Reviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- Krystle Duncan
- 08-02-16
Good foundation for any business not just cyber security.
Good overview of IT and not just security. I wasn't sure at first but ended up really liking this book.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
2 people found this helpful
-
Overall
-
Performance
-
Story
- Amazon Customer
- 06-26-18
A Book That Explains it All
Dr. Mansur Hasib addresses every issue that IT/InfoSec professionals and non-IT/InfoSec professionals should know about. Dr. Hasib goes into great detail to explain compensation, reporting structure and the why behind hiring certain positions. Boards and senior management should use this book as a guide to help propel their organizations towards sustainability during this time of exponential growth in technological advancement.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
2 people found this helpful
-
Overall
-
Performance
-
Story
- Mark S. Griffith
- 07-22-16
Happily surprised, many great takeaways
Would you recommend this audiobook to a friend? If so, why?
I would recommend this to colleagues involved with Cybersecurity. It was well written and organized. Often practical/technical books don't work well as audiobooks, but this one did. I also appreciated the academic manner in which he cited references. This was extremely helpful as it allowed deeper reading on the subject matter.
What other book might you compare Cybersecurity Leadership to and why?
It had the feel of non-fiction works by academics like Peter Drucker.
Was there a moment in the book that particularly moved you?
One of my best takeaways was Dr. Hasib's definition of Cybersecurity. It does a great job of blending business and security in a manner that does not strike fear in executive management, but rather makes Cybersecurity a strategic partner in reducing risks to the business.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
2 people found this helpful
-
Overall
-
Performance
-
Story
- Collin Smith
- 05-30-15
A fresh look at leadership for a changing world.
This is not simply a book advising on cyber security tactics or choosing technology controls. Dr. Hasib takes us deeper into what it means to be a leader and clears away many misconceptions between leadership and management. Additionally, as ethics and integrity directly impact an organization's level of risk these traits are a common theme throughout his book. I highly recommend Cybersecurity Leadership for anyone functioning in a leadership role.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
5 people found this helpful
-
Overall
-
Performance
-
Story
- a. g.
- 08-16-18
A quick listen with top level thinking in clear speech
Mr. Hasib has written a very approachable text. He speaks it clearly and concisely. Herein are the building blocks for the top business organizations of the future.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
2 people found this helpful
-
Overall
-
Performance
-
Story
- Amazon Customer
- 05-03-17
Great
Awesome!! Recommended for any cyber professional, business leaders and academia. very essential in today's world
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
2 people found this helpful
-
Overall
-
Performance
-
Story
- Vick G.
- 12-10-19
Cybersecurity Leadership
I have listened and read many books on this topic. And without a doubt a fantastic guide to Cybersecurity leadership.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful
-
Overall
-
Performance
-
Story
- GG
- 09-18-18
Great Mentor, great book on Cybersecurity
I bought the audio version and at such a good price. Listened to it and the narration was done by my Mentor himself. Well written book with special citation for those that have citation challenges. Think about this: don't plan to be a leader without this book. Beyond the cyber ecosystem, its a must have for all.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
2 people found this helpful
-
Overall
-
Performance
-
Story
- gamingland
- 08-12-19
Great guide for anyone into cybersecurity
This is a great guide for anyone having an interest in cybersecurity. What makes this guide stand out from other cybersecurity books is the fact that this book actually presents cybersecurity concepts, practical insights and what to do from a leadership perspective. Not only will you gain knowledge for yourself, but this guide will also teach you how to educate others and become a leader in cybersecurity. In short, this is an essential guide for virtually everyone. The version reviewed here is the audiobook version.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful
-
Overall
-
Performance
-
Story
- Kingsley, Okoli
- 08-12-19
A Paragon!
Dr. Mansur’s Cybersecurity Leadership has done a great deal incorporating cybersecurity into organizational leadership, and business management. This book has solved the puzzle of many who are trying to understand how cyber security fits into business purposes by explaining the three parts of cybersecurity that are critical for business success ( technology, policy, and people). Other key qualities extensively discussed include: the importance of personnel integrity, accurately defining job roles (understanding the difference between technical and non-technical security executives for effective business management), and creating an enterprise security dogma that makes everyone responsible for security in their organization. This book will be of great help for leaders trying to build a formidable security that fits into their organization’s business purposes.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful