
The CISO Evolution
Business Knowledge for Cybersecurity Executives
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
Buy for $21.49
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrated by:
-
Christopher Grove
About this listen
Learn to effectively deliver business aligned cybersecurity outcomes.
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
The authors use illustrative stories to show professionals how to establish an executive presence and avoid the most common pitfalls experienced by technology experts when speaking and presenting to executives. The book will show you how to:
- Inspire trust in senior business leaders by properly aligning and setting expectations around risk appetite and capital allocation
- Properly characterize the indispensable role of cybersecurity in your company's overall strategic plan
- Acquire the necessary funding and resources for your company's cybersecurity program and avoid the stress and anxiety that comes with underfunding
Listeners also enjoyed...
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- By: Rick Howard
- Narrated by: Rick Howard
- Length: 9 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles.
-
-
Just What I was looking for
- By Roman on 11-17-24
By: Rick Howard
-
The Smartest Person in the Room
- The Root Cause and New Solution for Cybersecurity
- By: Christian Espinosa
- Narrated by: Kaleo Griffith
- Length: 6 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
With cyberattacks resulting in often devastating results, it’s no wonder executives hire the best and brightest of the IT world for protection. But are you doing enough? Do you understand your risks? What if the brightest aren’t always the best choice for your company? In The Smartest Person in the Room, Christian Espinosa shows you how to leverage your company’s smartest minds to your benefit and theirs. Learn from Christian’s own journey from cybersecurity engineer to company CEO.
-
-
Bland
- By Jonathan on 09-01-21
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- By: George Finney, John Kindervag - foreword
- Narrated by: Daniel Thomas May
- Length: 7 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- By Jordan on 10-16-22
By: George Finney, and others
-
90 Days: A CISO’s Journey to Impact
- Define Your Role
- By: SentinelOne Publication, Migo Kedem - introduction
- Narrated by: SentinelOne
- Length: 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
In our first publication, 90 Days: A CISO’s Journey to Impact, we profile some of the world’s leading enterprise cybersecurity leaders. They share their views on the role and advice to create rapid impact in a reasonable amount of time - 90 days. It is our hope that listeners, whether existing or future CISOs, gain insights to continuously improve and be their most effective selves.
-
-
Audio Book is only about 30 minutes long
- By Brad on 06-10-23
By: SentinelOne Publication, and others
-
A Leader’s Guide to Cybersecurity
- Why Boards Need to Lead - and How to Do It
- By: Thomas J. Parenty, Jack J. Domet
- Narrated by: Jonathan Todd Ross
- Length: 5 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who've spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition.
-
-
Must read for today’s corporate leaders
- By J. M. Wilson on 10-20-20
By: Thomas J. Parenty, and others
-
The Art of Attack
- Attacker Mindset for Security Professionals
- By: Maxie Reynolds
- Narrated by: Stephanie Dillard
- Length: 9 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- By Anonymous User on 10-19-22
By: Maxie Reynolds
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- By: Rick Howard
- Narrated by: Rick Howard
- Length: 9 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles.
-
-
Just What I was looking for
- By Roman on 11-17-24
By: Rick Howard
-
The Smartest Person in the Room
- The Root Cause and New Solution for Cybersecurity
- By: Christian Espinosa
- Narrated by: Kaleo Griffith
- Length: 6 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
With cyberattacks resulting in often devastating results, it’s no wonder executives hire the best and brightest of the IT world for protection. But are you doing enough? Do you understand your risks? What if the brightest aren’t always the best choice for your company? In The Smartest Person in the Room, Christian Espinosa shows you how to leverage your company’s smartest minds to your benefit and theirs. Learn from Christian’s own journey from cybersecurity engineer to company CEO.
-
-
Bland
- By Jonathan on 09-01-21
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- By: George Finney, John Kindervag - foreword
- Narrated by: Daniel Thomas May
- Length: 7 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- By Jordan on 10-16-22
By: George Finney, and others
-
90 Days: A CISO’s Journey to Impact
- Define Your Role
- By: SentinelOne Publication, Migo Kedem - introduction
- Narrated by: SentinelOne
- Length: 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
In our first publication, 90 Days: A CISO’s Journey to Impact, we profile some of the world’s leading enterprise cybersecurity leaders. They share their views on the role and advice to create rapid impact in a reasonable amount of time - 90 days. It is our hope that listeners, whether existing or future CISOs, gain insights to continuously improve and be their most effective selves.
-
-
Audio Book is only about 30 minutes long
- By Brad on 06-10-23
By: SentinelOne Publication, and others
-
A Leader’s Guide to Cybersecurity
- Why Boards Need to Lead - and How to Do It
- By: Thomas J. Parenty, Jack J. Domet
- Narrated by: Jonathan Todd Ross
- Length: 5 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who've spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition.
-
-
Must read for today’s corporate leaders
- By J. M. Wilson on 10-20-20
By: Thomas J. Parenty, and others
-
The Art of Attack
- Attacker Mindset for Security Professionals
- By: Maxie Reynolds
- Narrated by: Stephanie Dillard
- Length: 9 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- By Anonymous User on 10-19-22
By: Maxie Reynolds
-
Cybersecurity Leadership
- Powering the Modern Organization
- By: Mansur Hasib
- Narrated by: Mansur Hasib
- Length: 7 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity involves people, policy, and technology. Yet most books and academic programs cover only technology. Hence the implementation of cybersecurity as a people powered perpetual innovation and productivity engine is not done. People think they can buy cybersecurity as a product when in fact the discipline is the modern practice of digital business strategy. People also equate cybersecurity with information security or security alone. However, security is a state, while cybersecurity is a process.
-
-
CIOs and CISOs should read this book...
- By Chad L Fulgham on 08-12-15
By: Mansur Hasib
-
CISSP All-in-One Exam Guide, Ninth Edition
- By: Fernando Maymi, Shon Harris
- Narrated by: Teri Schnaubelt
- Length: 51 hrs and 34 mins
- Unabridged
-
Overall
-
Performance
-
Story
Thoroughly updated for the latest release of the Certified Information Systems Security Professional exam, this comprehensive resource covers all objectives in the 2021 CISSP exam developed by the International Information Systems Security Certification Consortium (ISC)2®. CISSP All-in-One Exam Guide, Ninth Edition features learning objectives at the beginning of each chapter, exam tips, practice questions, and in-depth explanations.
-
-
Comprehensive Knowledge
- By Anonymous User on 05-09-24
By: Fernando Maymi, and others
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
Tracers in the Dark
- The Global Hunt for the Crime Lords of Cryptocurrency
- By: Andy Greenberg
- Narrated by: Ari Fliakos
- Length: 10 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing, money laundering, or human trafficking—than their analog counterparts could have ever dreamed of. By transacting not in dollars or pounds but in currencies with anonymous ledgers, overseen by no government, beholden to no bankers, these black marketeers have sought to rob law enforcement of their chief method of cracking down on illicit finance: following the money.
-
-
Could not put this down
- By Mike Reaves on 01-28-23
By: Andy Greenberg
-
The Security Culture Playbook
- An Executive Guide to Reducing Risk and Developing Your Human Defense Layer
- By: Perry Carpenter, Kai Roer
- Narrated by: Perry Carpenter
- Length: 6 hrs and 55 mins
- Unabridged
-
Overall
-
Performance
-
Story
The topic of security culture is mysterious and confusing to most leaders. But it doesn't have to be. In The Security Culture Playbook, Perry Carpenter and Kai Roer deliver experience-driven, actionable insights into how to transform your organization's security culture and reduce human risk at every level. This book exposes the gaps in how organizations have traditionally approached human risk, and it provides security and business executives with the necessary information and tools needed to understand, measure, and improve facets of security culture across the organization.
-
-
All common sense
- By Amazon Customer on 11-28-24
By: Perry Carpenter, and others
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- By: Eric Conrad, Seth Misenar, Joshua Feldman
- Narrated by: Matthew E. Kelly
- Length: 10 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Eleventh Hour CISSP®: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. This new edition is aligned to cover all material in the most current version of the exam’s Common Body of Knowledge.
-
-
pretty good but need pdf file for charts
- By Amazon Customer on 08-24-21
By: Eric Conrad, and others
-
1% Leadership
- Master the Small, Daily Improvements That Set Great Leaders Apart
- By: Andy Ellis
- Narrated by: Andy Ellis
- Length: 5 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Leadership development speaker & consultant Andy Ellis is the former CSO of Akamai, where he contributed to the creation of Akamai's billion‑dollar cybersecurity business. He now brings his speaking, consulting, and business knowledge to listeners with 1% Leadership—based on the reality that real-world leadership is messy and complicated; it rarely fits into an acronym or a dogmatic overarching philosophy. Ellis says that there are no “irrefutable laws” of leadership or power; there is no secret.
-
-
Actionable Advice!
- By Matt Meis on 09-18-24
By: Andy Ellis
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide
- 2nd Edition
- By: Ben Malisow
- Narrated by: Daniel Henning
- Length: 16 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. Covering all CCSP domains, this book walks you through architectural concepts and design requirements, cloud data security, cloud platform and infrastructure security, cloud application security, operations, and legal and compliance with real-world scenarios to help you apply your skills along the way.
-
-
Disruptive reading of URLs
- By Customer on 04-22-22
By: Ben Malisow
-
Prepare for the ISACA Certified Information Security Manager Exam
- CISM Review Manual
- By: Gwen Bettwy, Mark Williams, Mike Beevers
- Narrated by: Gwen Bettwy
- Length: 5 hrs and 55 mins
- Unabridged
-
Overall
-
Performance
-
Story
A straightforward look at the four domains of the ISACA Certified Information Security Manager exam. This book will help you get a firm grasp on the key topics needed for success with the exam. Included are over 120 practice questions covering the four domains of ISACA's CISM.
-
-
Good content could be organized better
- By SMB on 09-21-21
By: Gwen Bettwy, and others
-
The First 90 Days, Updated and Expanded
- Proven Strategies for Getting Up to Speed Faster and Smarter
- By: Michael Watkins
- Narrated by: Grover Gardner
- Length: 6 hrs and 58 mins
- Unabridged
-
Overall
-
Performance
-
Story
The world’s most trusted guide for leaders in transition. Transitions are a critical time for leaders. In fact, most agree that moving into a new role is the biggest challenge a manager will face. While transitions offer a chance to start fresh and make needed changes in an organization, they also place leaders in a position of acute vulnerability. Missteps made during the crucial first three months in a new role can jeopardize or even derail your success.
-
-
Missing access to tables and charts
- By Vipul Gautam on 03-25-16
By: Michael Watkins
-
Cybersecurity Program Development for Business
- The Essential Planning Guide
- By: Chris Moschovitis
- Narrated by: Sean Pratt
- Length: 9 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles, and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. If you're a business manager or executive who needs to make sense of cybersecurity, this audiobook demystifies it for you.
-
-
Best Reference for Cyber Program Development
- By Roger Swanson on 07-19-18
-
Accelerate: Building and Scaling High Performing Technology Organizations
- By: Nicole Forsgren PhD, Jez Humble, Gene Kim
- Narrated by: Nicole Forsgren
- Length: 4 hrs and 58 mins
- Unabridged
-
Overall
-
Performance
-
Story
How can we apply technology to drive business value? For years we've been told that the performance of software delivery teams doesn't matter - that it can't provide a competitive advantage to our companies. Through four years of groundbreaking research to include data collected from the State of DevOps reports conducted with Puppet, Dr. Nicole Forsgren, Jez Humble, and Gene Kim set out to find a way to measure software delivery performance - and what drives it - using rigorous statistical methods. This book presents both the findings and the science behind that research, making the information accessible for listeners to apply in their own organizations.
-
-
Only if you have nothing else to do
- By Gvido on 07-24-18
By: Nicole Forsgren PhD, and others
Related to this topic
-
Clarity First
- How Smart Leaders and Organizations Achieve Outstanding Performance
- By: Karen Martin
- Narrated by: Karen Martin
- Length: 8 hrs and 25 mins
- Unabridged
-
Overall
-
Performance
-
Story
Through her global consulting projects, keynote speeches, and work with thousands of leaders, Karen has seen first-hand how a pervasive lack of clarity strangles business performance and erodes employee engagement. Ambiguity is the corporate default state, a condition so prevalent that “tolerance for ambiguity” has become a clichéd job requirement. It doesn’t have to be this way.
-
-
Not for me - dislike narrator's voice +
- By sharing1 on 10-11-19
By: Karen Martin
-
The Outstanding Organization
- Generate Business Results by Eliminating Chaos and Building the Foundation for Everyday Excellence
- By: Karen Martin
- Narrated by: Karen Martin
- Length: 6 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
After two decades in the trenches of helping companies design and build better, more efficient operations, Karen Martin has pinpointed why performance improvement programs usually fail: Chaos, the sneaky but powerful force that frustrates customers, keeps business leaders awake at night, and saps company morale. In The Outstanding Organization, Karen offers a toolbox for combating chaos by creating the organizational conditions that will allow your improvement efforts to return greater gains.
-
-
Good breadth, shallow depth
- By aochoa19 on 02-09-21
By: Karen Martin
-
Driving Digital
- The Leader's Guide to Business Transformation Through Technology
- By: Isaac Sacolick
- Narrated by: Tom Parks
- Length: 10 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
The race is on to become a digital enterprise. Every organization has a plan for updating products, technologies, and business processes. But that's not enough anymore. With disruptive startups outperforming industry stalwarts, executives everywhere are pushing greater growth and innovation. Staying competitive demands a complete digital transformation.
-
-
Best book I have read on Digital Transformation
- By Holistic Health on 10-20-17
By: Isaac Sacolick
-
Extreme Teams
- Why Pixar, Netflix, AirBnB, and Other Cutting-Edge Companies Succeed Where Most Fail
- By: Robert Bruce Shaw
- Narrated by: James Foster
- Length: 7 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Managers want great teams, but most build them around decades-old ideas and practices made popular by companies that have lost their edge. Extreme Teams looks at the new generation of teams driving growth in today's most innovative firms. They do this by doing things differently: hiring the right person instead of the best person; focusing on one priority while leaving room to explore new ideas; creating an environment where people are comfortable dealing with the uncomfortable.
-
-
Extreme Blah
- By Blair C on 05-03-18
-
Born to Build
- How to Build a Thriving Startup, a Winning Team, New Customers and Your Best Life Imaginable
- By: Jim Clifton, Sangeeta Badal
- Narrated by: Braden Wright
- Length: 3 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
Written for anyone trying to figure out how to make the most of their lives, Born to Build seeks to inspire entrepreneurs and ambitious, self-motivated people to build something that will change the world. A builder’s venture could be a small business that grows into a mammoth enterprise, a thriving new division in an existing company, a nonprofit, a social enterprise, a church, a school - anything that creates economic growth and makes a lasting impact on society.
-
-
Powerful perspective shift
- By Diana_loves_audiobooks on 06-09-18
By: Jim Clifton, and others
-
The Founder's Dilemmas
- By: Noam Wasserman
- Narrated by: Mark Mosely
- Length: 13 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Often downplayed in the excitement of starting up a new business venture is one of the most important decisions entrepreneurs will face: should they go it alone, or bring in cofounders, hires, and investors to help build the business? More than just financial rewards are at stake. Friendships and relationships can suffer. Bad decisions at the inception of a promising venture lay the foundations for its eventual ruin.
-
-
Too much talk on the data
- By Stanley Tan on 10-02-14
By: Noam Wasserman
-
Clarity First
- How Smart Leaders and Organizations Achieve Outstanding Performance
- By: Karen Martin
- Narrated by: Karen Martin
- Length: 8 hrs and 25 mins
- Unabridged
-
Overall
-
Performance
-
Story
Through her global consulting projects, keynote speeches, and work with thousands of leaders, Karen has seen first-hand how a pervasive lack of clarity strangles business performance and erodes employee engagement. Ambiguity is the corporate default state, a condition so prevalent that “tolerance for ambiguity” has become a clichéd job requirement. It doesn’t have to be this way.
-
-
Not for me - dislike narrator's voice +
- By sharing1 on 10-11-19
By: Karen Martin
-
The Outstanding Organization
- Generate Business Results by Eliminating Chaos and Building the Foundation for Everyday Excellence
- By: Karen Martin
- Narrated by: Karen Martin
- Length: 6 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
After two decades in the trenches of helping companies design and build better, more efficient operations, Karen Martin has pinpointed why performance improvement programs usually fail: Chaos, the sneaky but powerful force that frustrates customers, keeps business leaders awake at night, and saps company morale. In The Outstanding Organization, Karen offers a toolbox for combating chaos by creating the organizational conditions that will allow your improvement efforts to return greater gains.
-
-
Good breadth, shallow depth
- By aochoa19 on 02-09-21
By: Karen Martin
-
Driving Digital
- The Leader's Guide to Business Transformation Through Technology
- By: Isaac Sacolick
- Narrated by: Tom Parks
- Length: 10 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
The race is on to become a digital enterprise. Every organization has a plan for updating products, technologies, and business processes. But that's not enough anymore. With disruptive startups outperforming industry stalwarts, executives everywhere are pushing greater growth and innovation. Staying competitive demands a complete digital transformation.
-
-
Best book I have read on Digital Transformation
- By Holistic Health on 10-20-17
By: Isaac Sacolick
-
Extreme Teams
- Why Pixar, Netflix, AirBnB, and Other Cutting-Edge Companies Succeed Where Most Fail
- By: Robert Bruce Shaw
- Narrated by: James Foster
- Length: 7 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Managers want great teams, but most build them around decades-old ideas and practices made popular by companies that have lost their edge. Extreme Teams looks at the new generation of teams driving growth in today's most innovative firms. They do this by doing things differently: hiring the right person instead of the best person; focusing on one priority while leaving room to explore new ideas; creating an environment where people are comfortable dealing with the uncomfortable.
-
-
Extreme Blah
- By Blair C on 05-03-18
-
Born to Build
- How to Build a Thriving Startup, a Winning Team, New Customers and Your Best Life Imaginable
- By: Jim Clifton, Sangeeta Badal
- Narrated by: Braden Wright
- Length: 3 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
Written for anyone trying to figure out how to make the most of their lives, Born to Build seeks to inspire entrepreneurs and ambitious, self-motivated people to build something that will change the world. A builder’s venture could be a small business that grows into a mammoth enterprise, a thriving new division in an existing company, a nonprofit, a social enterprise, a church, a school - anything that creates economic growth and makes a lasting impact on society.
-
-
Powerful perspective shift
- By Diana_loves_audiobooks on 06-09-18
By: Jim Clifton, and others
-
The Founder's Dilemmas
- By: Noam Wasserman
- Narrated by: Mark Mosely
- Length: 13 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Often downplayed in the excitement of starting up a new business venture is one of the most important decisions entrepreneurs will face: should they go it alone, or bring in cofounders, hires, and investors to help build the business? More than just financial rewards are at stake. Friendships and relationships can suffer. Bad decisions at the inception of a promising venture lay the foundations for its eventual ruin.
-
-
Too much talk on the data
- By Stanley Tan on 10-02-14
By: Noam Wasserman
People who viewed this also viewed...
-
Cyber Crisis
- Protecting Your Business from Real Threats in the Virtual World
- By: Eric Cole
- Narrated by: Michael Butler Murray
- Length: 6 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Based on news reports, you might think there's a major cybersecurity threat every four to five months. In reality, there's a cybersecurity attack happening every minute of every day. In Cyber Crisis, Eric Cole gives listeners a clear-eyed picture of the information war raging in cyberspace. Drawing on 30 years of experience, Cole offers practical, actionable advice that even those with little technical background can implement, including steps to take on a daily, weekly, and monthly basis to protect their businesses and themselves.
-
-
Industry Best Practices
- By netusera on 02-18-25
By: Eric Cole
-
The CISO's Guide to Securing Artificial Intelligence
- By: Russell Nomer
- Narrated by: Virtual Voice
- Length: 28 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
The CISO's Guide to Securing Artificial Intelligence is an essential resource for cybersecurity professionals and CISOs seeking to navigate the complex landscape of AI security. Written by Russell D. Nomer, CISSP, a renowned expert in the field, this comprehensive guide provides practical insights and strategies to effectively protect AI systems from evolving threats. Published by Russell Nomer Consulting, Inc., it is a trusted source of knowledge and expertise in the cybersecurity industry. With the rapid adoption of AI across industries, it is imperative for organizations to understand ...
By: Russell Nomer
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- By: Rick Howard
- Narrated by: Rick Howard
- Length: 9 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles.
-
-
Just What I was looking for
- By Roman on 11-17-24
By: Rick Howard
-
90 Days: A CISO’s Journey to Impact
- Define Your Role
- By: SentinelOne Publication, Migo Kedem - introduction
- Narrated by: SentinelOne
- Length: 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
In our first publication, 90 Days: A CISO’s Journey to Impact, we profile some of the world’s leading enterprise cybersecurity leaders. They share their views on the role and advice to create rapid impact in a reasonable amount of time - 90 days. It is our hope that listeners, whether existing or future CISOs, gain insights to continuously improve and be their most effective selves.
-
-
Audio Book is only about 30 minutes long
- By Brad on 06-10-23
By: SentinelOne Publication, and others
-
Hacking for Dummies, 7th Edition
- By: Kevin Beaver CISSP
- Narrated by: Tom Perkins
- Length: 11 hrs and 34 mins
- Unabridged
-
Overall
-
Performance
-
Story
Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them.
-
-
Good Book Preview says exactly what is the book,
- By Amazon Customer on 12-25-22
-
How to Measure Anything in Cybersecurity Risk (2nd Edition)
- By: Douglas W. Hubbard, Richard Seiersen
- Narrated by: Jim Seybert
- Length: 14 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
In How to Measure Anything in Cybersecurity Risk, Second Edition, a pioneering information security professional and a leader in quantitative analysis methods deliver yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity. In the book, the authors demonstrate how to quantify uncertainty and shed light on how to measure seemingly intangible goals. It's a practical guide to improving risk assessment with a straightforward and simple framework.
By: Douglas W. Hubbard, and others
-
Cyber Crisis
- Protecting Your Business from Real Threats in the Virtual World
- By: Eric Cole
- Narrated by: Michael Butler Murray
- Length: 6 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Based on news reports, you might think there's a major cybersecurity threat every four to five months. In reality, there's a cybersecurity attack happening every minute of every day. In Cyber Crisis, Eric Cole gives listeners a clear-eyed picture of the information war raging in cyberspace. Drawing on 30 years of experience, Cole offers practical, actionable advice that even those with little technical background can implement, including steps to take on a daily, weekly, and monthly basis to protect their businesses and themselves.
-
-
Industry Best Practices
- By netusera on 02-18-25
By: Eric Cole
-
The CISO's Guide to Securing Artificial Intelligence
- By: Russell Nomer
- Narrated by: Virtual Voice
- Length: 28 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
The CISO's Guide to Securing Artificial Intelligence is an essential resource for cybersecurity professionals and CISOs seeking to navigate the complex landscape of AI security. Written by Russell D. Nomer, CISSP, a renowned expert in the field, this comprehensive guide provides practical insights and strategies to effectively protect AI systems from evolving threats. Published by Russell Nomer Consulting, Inc., it is a trusted source of knowledge and expertise in the cybersecurity industry. With the rapid adoption of AI across industries, it is imperative for organizations to understand ...
By: Russell Nomer
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- By: Rick Howard
- Narrated by: Rick Howard
- Length: 9 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles.
-
-
Just What I was looking for
- By Roman on 11-17-24
By: Rick Howard
-
90 Days: A CISO’s Journey to Impact
- Define Your Role
- By: SentinelOne Publication, Migo Kedem - introduction
- Narrated by: SentinelOne
- Length: 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
In our first publication, 90 Days: A CISO’s Journey to Impact, we profile some of the world’s leading enterprise cybersecurity leaders. They share their views on the role and advice to create rapid impact in a reasonable amount of time - 90 days. It is our hope that listeners, whether existing or future CISOs, gain insights to continuously improve and be their most effective selves.
-
-
Audio Book is only about 30 minutes long
- By Brad on 06-10-23
By: SentinelOne Publication, and others
-
Hacking for Dummies, 7th Edition
- By: Kevin Beaver CISSP
- Narrated by: Tom Perkins
- Length: 11 hrs and 34 mins
- Unabridged
-
Overall
-
Performance
-
Story
Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them.
-
-
Good Book Preview says exactly what is the book,
- By Amazon Customer on 12-25-22
-
How to Measure Anything in Cybersecurity Risk (2nd Edition)
- By: Douglas W. Hubbard, Richard Seiersen
- Narrated by: Jim Seybert
- Length: 14 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
In How to Measure Anything in Cybersecurity Risk, Second Edition, a pioneering information security professional and a leader in quantitative analysis methods deliver yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity. In the book, the authors demonstrate how to quantify uncertainty and shed light on how to measure seemingly intangible goals. It's a practical guide to improving risk assessment with a straightforward and simple framework.
By: Douglas W. Hubbard, and others
-
The Smartest Person in the Room
- The Root Cause and New Solution for Cybersecurity
- By: Christian Espinosa
- Narrated by: Kaleo Griffith
- Length: 6 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
With cyberattacks resulting in often devastating results, it’s no wonder executives hire the best and brightest of the IT world for protection. But are you doing enough? Do you understand your risks? What if the brightest aren’t always the best choice for your company? In The Smartest Person in the Room, Christian Espinosa shows you how to leverage your company’s smartest minds to your benefit and theirs. Learn from Christian’s own journey from cybersecurity engineer to company CEO.
-
-
Bland
- By Jonathan on 09-01-21
-
Navigating the Cybersecurity Career Path
- Insider Advice for Navigating from Your First Gig to the C-Suite
- By: Helen Patton
- Narrated by: Leslie Howard
- Length: 7 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Finding the right position in cybersecurity is challenging. Being successful in the profession takes a lot of work. And becoming a cybersecurity leader responsible for a security team is even more difficult. In Navigating the Cybersecurity Career Path, decorated chief information security officer Helen Patton delivers a practical and insightful discussion designed to assist aspiring cybersecurity professionals entering the industry and help those already in the industry advance their careers and lead their first security teams.
-
-
This is cyber security not minority politics.
- By Mama on 02-06-25
By: Helen Patton
-
Hacking the Hacker
- Learn From the Experts Who Take Down Hackers
- By: Roger A. Grimes
- Narrated by: Jonathan Todd Ross
- Length: 10 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology.
-
-
Please stop reading the urls
- By Jonathan on 11-16-19
By: Roger A. Grimes
-
Cloud Security for Dummies
- By: Ted Coombs
- Narrated by: Chris Reilly
- Length: 16 hrs and 24 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds by hardening the walls that protect your data. Using the practical techniques discussed in Cloud Security for Dummies, you'll mitigate the risk of a data breach by building security into your network from the bottom up.
By: Ted Coombs
-
A Leader’s Guide to Cybersecurity
- Why Boards Need to Lead - and How to Do It
- By: Thomas J. Parenty, Jack J. Domet
- Narrated by: Jonathan Todd Ross
- Length: 5 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who've spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition.
-
-
Must read for today’s corporate leaders
- By J. M. Wilson on 10-20-20
By: Thomas J. Parenty, and others
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- By: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrated by: Tom Parks
- Length: 65 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline. This bestselling Sybex study guide covers 100% of the exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, knowledge from our real-world experience, advice on mastering this adaptive exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions.
-
-
Passed the CISSP exam
- By Ollie on 12-30-23
By: Mike Chapple, and others
-
Cybersecurity and Cyberwar
- What Everyone Needs to Know
- By: P. W. Singer, Allan Friedman
- Narrated by: Sean Pratt
- Length: 11 hrs and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Cybersecurity and Cyberwar: What Everyone Needs to Know®, New York Times best-selling author P. W. Singer and noted cyberexpert Allan Friedman team up to provide the kind of deeply informative resource book that has been missing on a crucial issue of 21st-century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters....
-
-
A job application for some government job?
- By Pascal on 03-04-17
By: P. W. Singer, and others
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- By: Ben Buchanan
- Narrated by: Christopher Grove
- Length: 11 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- By Eric Jackson on 08-05-20
By: Ben Buchanan
-
Cybersecurity Leadership
- Powering the Modern Organization
- By: Mansur Hasib
- Narrated by: Mansur Hasib
- Length: 7 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity involves people, policy, and technology. Yet most books and academic programs cover only technology. Hence the implementation of cybersecurity as a people powered perpetual innovation and productivity engine is not done. People think they can buy cybersecurity as a product when in fact the discipline is the modern practice of digital business strategy. People also equate cybersecurity with information security or security alone. However, security is a state, while cybersecurity is a process.
-
-
CIOs and CISOs should read this book...
- By Chad L Fulgham on 08-12-15
By: Mansur Hasib
-
Social Engineering, Second Edition
- The Science of Human Hacking
- By: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- By RM on 04-10-19
-
The Art of Attack
- Attacker Mindset for Security Professionals
- By: Maxie Reynolds
- Narrated by: Stephanie Dillard
- Length: 9 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- By Anonymous User on 10-19-22
By: Maxie Reynolds
-
The Art of Deception
- Controlling the Human Element of Security
- By: Kevin Mitnick
- Narrated by: Nick Sullivan
- Length: 13 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
-
-
Good security device delivered by old misogynist
- By James S. on 02-01-21
By: Kevin Mitnick
What listeners say about The CISO Evolution
Average customer ratingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- Gilan
- 01-31-25
Essential read for CISO’s and those in their professional orbit
A must read for CISO’s, aspiring CISO’s, and those in their professional orbits. Personally, I am on the vendor sales side of Cybersecurity, and to me this was immensely valuable for learning how to better qualify and disqualify if I have the right solution for a CISO. Understanding their responsibility to the business helps me identify where I can make a positive impact, and then prepare that CISO to articulate the value I provide to their business.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Abdelrahman Samy
- 01-13-24
A must read/listen to book
A strong and very insightful book for any security leader. I have leart a lot and enjoyed listening to it. Thanks
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Hizic
- 02-08-23
Not technical. Leadership book with security context and examples.
It starts out pretty odd with a deep dive into financial numbers. They were good but the book shouldn’t start out that way. There’s also an odd story about a CISOs turbulent marriage, which was a stretch for relevance. Once I got past those parts, the stories and examples were very good.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Cristen Mini
- 01-15-24
Recommend
Exactly what I was looking for in regards to best practices. Highly recommend for Cybersecurity professionals
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Name
- 09-22-23
Waste of time
A laundry list of ideas from 10-minute reviews of renowned business books. Mile wide and inch deep, lacking insight from real life organizations.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!