The Security Culture Playbook
An Executive Guide to Reducing Risk and Developing Your Human Defense Layer
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
Get 2 free audiobooks during trial.
Buy for $17.19
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrated by:
-
Perry Carpenter
About this listen
The topic of security culture is mysterious and confusing to most leaders. But it doesn't have to be. In The Security Culture Playbook, Perry Carpenter and Kai Roer deliver experience-driven, actionable insights into how to transform your organization's security culture and reduce human risk at every level. This book exposes the gaps in how organizations have traditionally approached human risk, and it provides security and business executives with the necessary information and tools needed to understand, measure, and improve facets of security culture across the organization.
The book offers an exposé of what security culture really is and how it can be measured; a careful exploration of the seven dimensions that comprise security culture; practical tools for managing your security culture program, such as the Security Culture Framework and the Security Culture Maturity Model; and insights into building support within the executive team and Board of Directors for your culture management program.
Also including several revealing interviews from security culture thought leaders in a variety of industries, The Security Culture Playbook is an essential resource for cybersecurity professionals, risk and compliance managers, executives, board members, and other business leaders seeking to proactively manage and reduce risk.
©2022 KnowBe4 (P)2022 Ascent AudioListeners also enjoyed...
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- By: George Finney, John Kindervag - foreword
- Narrated by: Daniel Thomas May
- Length: 7 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- By Jordan on 10-16-22
By: George Finney, and others
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- By: Matthew K. Sharp, Kyriakos Lambros
- Narrated by: Christopher Grove
- Length: 13 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Recommend
- By Cristen Mini on 01-15-24
By: Matthew K. Sharp, and others
-
Transformational Security Awareness
- What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
- By: Perry Carpenter, Kevin Mitnick - foreword
- Narrated by: Stephen Bel Davies
- Length: 12 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
When all other processes, controls, and technologies fail, humans are your last line of defense. But, how can you prepare them? Frustrated with ineffective training paradigms, most security leaders know that there must be a better way. A way that engages users, shapes behaviors, and fosters an organizational culture that encourages and reinforces security-related values. The good news is that there is hope. That's what Transformational Security Awareness is all about.
-
-
Good information between nonsense
- By Anonymous User on 03-04-24
By: Perry Carpenter, and others
-
A Leader’s Guide to Cybersecurity
- Why Boards Need to Lead - and How to Do It
- By: Thomas J. Parenty, Jack J. Domet
- Narrated by: Jonathan Todd Ross
- Length: 5 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who've spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition.
-
-
Must read for today’s corporate leaders
- By J. M. Wilson on 10-20-20
By: Thomas J. Parenty, and others
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- By: Rick Howard
- Narrated by: Rick Howard
- Length: 9 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles.
-
-
solid advice
- By Dan Casebolt on 12-12-23
By: Rick Howard
-
How to Measure Anything in Cybersecurity Risk
- By: Douglas W. Hubbard, Richard Seiersen
- Narrated by: Patrick Cronin
- Length: 10 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing - as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques.
-
-
Not appropriate for audio, buy a hard copy instead
- By Wanderer on 01-20-17
By: Douglas W. Hubbard, and others
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- By: George Finney, John Kindervag - foreword
- Narrated by: Daniel Thomas May
- Length: 7 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- By Jordan on 10-16-22
By: George Finney, and others
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- By: Matthew K. Sharp, Kyriakos Lambros
- Narrated by: Christopher Grove
- Length: 13 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Recommend
- By Cristen Mini on 01-15-24
By: Matthew K. Sharp, and others
-
Transformational Security Awareness
- What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
- By: Perry Carpenter, Kevin Mitnick - foreword
- Narrated by: Stephen Bel Davies
- Length: 12 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
When all other processes, controls, and technologies fail, humans are your last line of defense. But, how can you prepare them? Frustrated with ineffective training paradigms, most security leaders know that there must be a better way. A way that engages users, shapes behaviors, and fosters an organizational culture that encourages and reinforces security-related values. The good news is that there is hope. That's what Transformational Security Awareness is all about.
-
-
Good information between nonsense
- By Anonymous User on 03-04-24
By: Perry Carpenter, and others
-
A Leader’s Guide to Cybersecurity
- Why Boards Need to Lead - and How to Do It
- By: Thomas J. Parenty, Jack J. Domet
- Narrated by: Jonathan Todd Ross
- Length: 5 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who've spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition.
-
-
Must read for today’s corporate leaders
- By J. M. Wilson on 10-20-20
By: Thomas J. Parenty, and others
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- By: Rick Howard
- Narrated by: Rick Howard
- Length: 9 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles.
-
-
solid advice
- By Dan Casebolt on 12-12-23
By: Rick Howard
-
How to Measure Anything in Cybersecurity Risk
- By: Douglas W. Hubbard, Richard Seiersen
- Narrated by: Patrick Cronin
- Length: 10 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing - as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques.
-
-
Not appropriate for audio, buy a hard copy instead
- By Wanderer on 01-20-17
By: Douglas W. Hubbard, and others
-
The Art of Attack
- Attacker Mindset for Security Professionals
- By: Maxie Reynolds
- Narrated by: Stephanie Dillard
- Length: 9 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- By Anonymous User on 10-19-22
By: Maxie Reynolds
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- By: Nicole Perlroth
- Narrated by: Allyson Ryan
- Length: 18 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Decent story, cringeworthy narration and editing
- By since1968 on 02-13-21
By: Nicole Perlroth
-
Tracers in the Dark
- The Global Hunt for the Crime Lords of Cryptocurrency
- By: Andy Greenberg
- Narrated by: Ari Fliakos
- Length: 10 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing, money laundering, or human trafficking—than their analog counterparts could have ever dreamed of. By transacting not in dollars or pounds but in currencies with anonymous ledgers, overseen by no government, beholden to no bankers, these black marketeers have sought to rob law enforcement of their chief method of cracking down on illicit finance: following the money.
-
-
Could not put this down
- By Mike Reaves on 01-28-23
By: Andy Greenberg
-
CISSP All-in-One Exam Guide, Ninth Edition
- By: Fernando Maymi, Shon Harris
- Narrated by: Teri Schnaubelt
- Length: 51 hrs and 34 mins
- Unabridged
-
Overall
-
Performance
-
Story
Thoroughly updated for the latest release of the Certified Information Systems Security Professional exam, this comprehensive resource covers all objectives in the 2021 CISSP exam developed by the International Information Systems Security Certification Consortium (ISC)2®. CISSP All-in-One Exam Guide, Ninth Edition features learning objectives at the beginning of each chapter, exam tips, practice questions, and in-depth explanations.
-
-
Comprehensive Knowledge
- By Anonymous User on 05-09-24
By: Fernando Maymi, and others
-
Human Hacking
- Win Friends, Influence People, and Leave Them Better Off for Having Met You
- By: Christopher Hadnagy, Seth Schulman
- Narrated by: Christopher Hadnagy
- Length: 8 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
A pioneer in the field of social engineering and a master hacker, Christopher Hadnagy specializes in understanding how malicious attackers exploit principles of human communication to access information and resources through manipulation and deceit. Now, he shows you how to use social engineering as a force for good - to help you regain your confidence and control. Hacking Humans provides tools that will help you establish rapport with strangers, use body language and verbal cues to your advantage, steer conversations and influence other’s decisions, and more.
-
-
Instead of this, buy “Social Engineering, Second Edition”.
- By Jessica on 11-30-21
By: Christopher Hadnagy, and others
-
Accelerate: Building and Scaling High Performing Technology Organizations
- By: Nicole Forsgren PhD, Jez Humble, Gene Kim
- Narrated by: Nicole Forsgren
- Length: 4 hrs and 58 mins
- Unabridged
-
Overall
-
Performance
-
Story
How can we apply technology to drive business value? For years we've been told that the performance of software delivery teams doesn't matter - that it can't provide a competitive advantage to our companies. Through four years of groundbreaking research to include data collected from the State of DevOps reports conducted with Puppet, Dr. Nicole Forsgren, Jez Humble, and Gene Kim set out to find a way to measure software delivery performance - and what drives it - using rigorous statistical methods. This book presents both the findings and the science behind that research, making the information accessible for listeners to apply in their own organizations.
-
-
Only if you have nothing else to do
- By Gvido on 07-24-18
By: Nicole Forsgren PhD, and others
-
The Smartest Person in the Room
- The Root Cause and New Solution for Cybersecurity
- By: Christian Espinosa
- Narrated by: Kaleo Griffith
- Length: 6 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
With cyberattacks resulting in often devastating results, it’s no wonder executives hire the best and brightest of the IT world for protection. But are you doing enough? Do you understand your risks? What if the brightest aren’t always the best choice for your company? In The Smartest Person in the Room, Christian Espinosa shows you how to leverage your company’s smartest minds to your benefit and theirs. Learn from Christian’s own journey from cybersecurity engineer to company CEO.
-
-
Bland
- By Jonathan on 09-01-21
-
Cybersecurity All-in-One for Dummies
- By: Joseph Steinberg, Kevin Beaver CISSP, Ira Winkler CISSP, and others
- Narrated by: Tom Perkins
- Length: 24 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness. Filled with content to help with both personal and business cybersecurity needs, this book shows you how to lock down your computers, devices, and systems—and explains why doing so is more important now than ever.
-
-
Great book
- By KatieLynn on 10-08-24
By: Joseph Steinberg, and others
-
Wiring the Winning Organization
- By: Gene Kim, Steve Spear
- Narrated by: Alex Knox
- Length: 10 hrs and 52 mins
- Unabridged
-
Overall
-
Performance
-
Story
In their eagerly awaited book, Kim and Spear bring to light a new theory of high-achieving organizations. They examine how companies solve the most important problems better, faster, and easier than their competitors by quickly and regularly closing the gap between aspirations and real-world success. This book teaches companies that are struggling to perform how to achieve the continual greatness seen in the best of the best.
-
-
Powerful tools and a insights
- By Sean Brooks on 04-06-24
By: Gene Kim, and others
-
1% Leadership
- Master the Small, Daily Improvements That Set Great Leaders Apart
- By: Andy Ellis
- Narrated by: Andy Ellis
- Length: 5 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Leadership development speaker & consultant Andy Ellis is the former CSO of Akamai, where he contributed to the creation of Akamai's billion‑dollar cybersecurity business. He now brings his speaking, consulting, and business knowledge to listeners with 1% Leadership—based on the reality that real-world leadership is messy and complicated; it rarely fits into an acronym or a dogmatic overarching philosophy. Ellis says that there are no “irrefutable laws” of leadership or power; there is no secret.
-
-
Actionable Advice!
- By Matt Meis on 09-18-24
By: Andy Ellis
Related to this topic
-
Clarity First
- How Smart Leaders and Organizations Achieve Outstanding Performance
- By: Karen Martin
- Narrated by: Karen Martin
- Length: 8 hrs and 25 mins
- Unabridged
-
Overall
-
Performance
-
Story
Through her global consulting projects, keynote speeches, and work with thousands of leaders, Karen has seen first-hand how a pervasive lack of clarity strangles business performance and erodes employee engagement. Ambiguity is the corporate default state, a condition so prevalent that “tolerance for ambiguity” has become a clichéd job requirement. It doesn’t have to be this way.
-
-
Not for me - dislike narrator's voice +
- By sharing1 on 10-11-19
By: Karen Martin
-
Organizational Culture and Leadership, Fifth Edition
- By: Edgar H. Schein, Peter Schein
- Narrated by: Noah Michael Levine
- Length: 12 hrs and 34 mins
- Unabridged
-
Overall
-
Performance
-
Story
Organizational Culture and Leadership is the classic reference for managers and students seeking a deeper understanding of the inter-relationship of organizational culture dynamics and leadership. Author Edgar Schein is the 'father' of organizational culture, world-renowned for his expertise and research in the field; in this book, he analyzes and illustrates through cases the abstract concept of culture and shows its importance to the management of organizational change.
-
-
Terrible listening experience
- By Ashley on 01-26-19
By: Edgar H. Schein, and others
-
The Outstanding Organization
- Generate Business Results by Eliminating Chaos and Building the Foundation for Everyday Excellence
- By: Karen Martin
- Narrated by: Karen Martin
- Length: 6 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
After two decades in the trenches of helping companies design and build better, more efficient operations, Karen Martin has pinpointed why performance improvement programs usually fail: Chaos, the sneaky but powerful force that frustrates customers, keeps business leaders awake at night, and saps company morale. In The Outstanding Organization, Karen offers a toolbox for combating chaos by creating the organizational conditions that will allow your improvement efforts to return greater gains.
-
-
Good breadth, shallow depth
- By aochoa19 on 02-09-21
By: Karen Martin
-
Extreme Teams
- Why Pixar, Netflix, AirBnB, and Other Cutting-Edge Companies Succeed Where Most Fail
- By: Robert Bruce Shaw
- Narrated by: James Foster
- Length: 7 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Managers want great teams, but most build them around decades-old ideas and practices made popular by companies that have lost their edge. Extreme Teams looks at the new generation of teams driving growth in today's most innovative firms. They do this by doing things differently: hiring the right person instead of the best person; focusing on one priority while leaving room to explore new ideas; creating an environment where people are comfortable dealing with the uncomfortable.
-
-
Extreme Blah
- By Blair C on 05-03-18
-
The Effortless Experience
- Conquering the New Battleground for Customer Loyalty
- By: Matthew Dixon, Nick Toman, Rick DeLisi
- Narrated by: Matthew Dixon, Nick Toman, Rick DeLisi
- Length: 6 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
In their acclaimed best seller The Challenger Sale, Matthew Dixon and his colleagues at CEB busted many longstanding myths about sales. Now they've turned their research and analysis to a new vital business subject - customer loyalty - with a new book that turns the conventional wisdom on its head. The idea that companies must delight customers by exceeding service expectations is so entrenched that managers rarely even question it. They devote untold time, energy, and resources to trying to dazzle people and inspire their undying loyalty.
-
-
If you are a CXer, you have to read/listen to it
- By Shirley Campbell on 05-26-23
By: Matthew Dixon, and others
-
Designing for Growth
- A Design Thinking Tool Kit for Managers
- By: Jeanne Liedtka, Tim Ogilvie
- Narrated by: Nicol Zanzarella
- Length: 6 hrs and 35 mins
- Unabridged
-
Overall
-
Performance
-
Story
Jeanne Liedtka and Tim Ogilvie educate listeners on one of the hottest trends in business development: "design thinking", or the ability to turn abstract ideas into practical applications for maximal business growth. Jeanne Liedtka's recent book, The Catalyst: How YOU Can Lead Extraordinary Growth, was named a Top Innovation and Design Thinking Book by Business Week. Tim Ogilvie has been hailed as a visionary for his pioneering contributions to service innovation, business model innovation, and customer experience design.
-
-
Audiobook requires regular book
- By GoingGoingGone... on 07-01-18
By: Jeanne Liedtka, and others
-
Clarity First
- How Smart Leaders and Organizations Achieve Outstanding Performance
- By: Karen Martin
- Narrated by: Karen Martin
- Length: 8 hrs and 25 mins
- Unabridged
-
Overall
-
Performance
-
Story
Through her global consulting projects, keynote speeches, and work with thousands of leaders, Karen has seen first-hand how a pervasive lack of clarity strangles business performance and erodes employee engagement. Ambiguity is the corporate default state, a condition so prevalent that “tolerance for ambiguity” has become a clichéd job requirement. It doesn’t have to be this way.
-
-
Not for me - dislike narrator's voice +
- By sharing1 on 10-11-19
By: Karen Martin
-
Organizational Culture and Leadership, Fifth Edition
- By: Edgar H. Schein, Peter Schein
- Narrated by: Noah Michael Levine
- Length: 12 hrs and 34 mins
- Unabridged
-
Overall
-
Performance
-
Story
Organizational Culture and Leadership is the classic reference for managers and students seeking a deeper understanding of the inter-relationship of organizational culture dynamics and leadership. Author Edgar Schein is the 'father' of organizational culture, world-renowned for his expertise and research in the field; in this book, he analyzes and illustrates through cases the abstract concept of culture and shows its importance to the management of organizational change.
-
-
Terrible listening experience
- By Ashley on 01-26-19
By: Edgar H. Schein, and others
-
The Outstanding Organization
- Generate Business Results by Eliminating Chaos and Building the Foundation for Everyday Excellence
- By: Karen Martin
- Narrated by: Karen Martin
- Length: 6 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
After two decades in the trenches of helping companies design and build better, more efficient operations, Karen Martin has pinpointed why performance improvement programs usually fail: Chaos, the sneaky but powerful force that frustrates customers, keeps business leaders awake at night, and saps company morale. In The Outstanding Organization, Karen offers a toolbox for combating chaos by creating the organizational conditions that will allow your improvement efforts to return greater gains.
-
-
Good breadth, shallow depth
- By aochoa19 on 02-09-21
By: Karen Martin
-
Extreme Teams
- Why Pixar, Netflix, AirBnB, and Other Cutting-Edge Companies Succeed Where Most Fail
- By: Robert Bruce Shaw
- Narrated by: James Foster
- Length: 7 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Managers want great teams, but most build them around decades-old ideas and practices made popular by companies that have lost their edge. Extreme Teams looks at the new generation of teams driving growth in today's most innovative firms. They do this by doing things differently: hiring the right person instead of the best person; focusing on one priority while leaving room to explore new ideas; creating an environment where people are comfortable dealing with the uncomfortable.
-
-
Extreme Blah
- By Blair C on 05-03-18
-
The Effortless Experience
- Conquering the New Battleground for Customer Loyalty
- By: Matthew Dixon, Nick Toman, Rick DeLisi
- Narrated by: Matthew Dixon, Nick Toman, Rick DeLisi
- Length: 6 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
In their acclaimed best seller The Challenger Sale, Matthew Dixon and his colleagues at CEB busted many longstanding myths about sales. Now they've turned their research and analysis to a new vital business subject - customer loyalty - with a new book that turns the conventional wisdom on its head. The idea that companies must delight customers by exceeding service expectations is so entrenched that managers rarely even question it. They devote untold time, energy, and resources to trying to dazzle people and inspire their undying loyalty.
-
-
If you are a CXer, you have to read/listen to it
- By Shirley Campbell on 05-26-23
By: Matthew Dixon, and others
-
Designing for Growth
- A Design Thinking Tool Kit for Managers
- By: Jeanne Liedtka, Tim Ogilvie
- Narrated by: Nicol Zanzarella
- Length: 6 hrs and 35 mins
- Unabridged
-
Overall
-
Performance
-
Story
Jeanne Liedtka and Tim Ogilvie educate listeners on one of the hottest trends in business development: "design thinking", or the ability to turn abstract ideas into practical applications for maximal business growth. Jeanne Liedtka's recent book, The Catalyst: How YOU Can Lead Extraordinary Growth, was named a Top Innovation and Design Thinking Book by Business Week. Tim Ogilvie has been hailed as a visionary for his pioneering contributions to service innovation, business model innovation, and customer experience design.
-
-
Audiobook requires regular book
- By GoingGoingGone... on 07-01-18
By: Jeanne Liedtka, and others
People who viewed this also viewed...
-
Transformational Security Awareness
- What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
- By: Perry Carpenter, Kevin Mitnick - foreword
- Narrated by: Stephen Bel Davies
- Length: 12 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
When all other processes, controls, and technologies fail, humans are your last line of defense. But, how can you prepare them? Frustrated with ineffective training paradigms, most security leaders know that there must be a better way. A way that engages users, shapes behaviors, and fosters an organizational culture that encourages and reinforces security-related values. The good news is that there is hope. That's what Transformational Security Awareness is all about.
-
-
Good information between nonsense
- By Anonymous User on 03-04-24
By: Perry Carpenter, and others
-
A Leader’s Guide to Cybersecurity
- Why Boards Need to Lead - and How to Do It
- By: Thomas J. Parenty, Jack J. Domet
- Narrated by: Jonathan Todd Ross
- Length: 5 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who've spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition.
-
-
Must read for today’s corporate leaders
- By J. M. Wilson on 10-20-20
By: Thomas J. Parenty, and others
-
The Art of Attack
- Attacker Mindset for Security Professionals
- By: Maxie Reynolds
- Narrated by: Stephanie Dillard
- Length: 9 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- By Anonymous User on 10-19-22
By: Maxie Reynolds
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- By: George Finney, John Kindervag - foreword
- Narrated by: Daniel Thomas May
- Length: 7 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- By Jordan on 10-16-22
By: George Finney, and others
-
Navigating the Cybersecurity Career Path
- Insider Advice for Navigating from Your First Gig to the C-Suite
- By: Helen Patton
- Narrated by: Leslie Howard
- Length: 7 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Finding the right position in cybersecurity is challenging. Being successful in the profession takes a lot of work. And becoming a cybersecurity leader responsible for a security team is even more difficult. In Navigating the Cybersecurity Career Path, decorated chief information security officer Helen Patton delivers a practical and insightful discussion designed to assist aspiring cybersecurity professionals entering the industry and help those already in the industry advance their careers and lead their first security teams.
By: Helen Patton
-
The Art of Deception
- Controlling the Human Element of Security
- By: Kevin Mitnick
- Narrated by: Nick Sullivan
- Length: 13 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
-
-
Good security device delivered by old misogynist
- By James S. on 02-01-21
By: Kevin Mitnick
-
Transformational Security Awareness
- What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
- By: Perry Carpenter, Kevin Mitnick - foreword
- Narrated by: Stephen Bel Davies
- Length: 12 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
When all other processes, controls, and technologies fail, humans are your last line of defense. But, how can you prepare them? Frustrated with ineffective training paradigms, most security leaders know that there must be a better way. A way that engages users, shapes behaviors, and fosters an organizational culture that encourages and reinforces security-related values. The good news is that there is hope. That's what Transformational Security Awareness is all about.
-
-
Good information between nonsense
- By Anonymous User on 03-04-24
By: Perry Carpenter, and others
-
A Leader’s Guide to Cybersecurity
- Why Boards Need to Lead - and How to Do It
- By: Thomas J. Parenty, Jack J. Domet
- Narrated by: Jonathan Todd Ross
- Length: 5 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who've spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition.
-
-
Must read for today’s corporate leaders
- By J. M. Wilson on 10-20-20
By: Thomas J. Parenty, and others
-
The Art of Attack
- Attacker Mindset for Security Professionals
- By: Maxie Reynolds
- Narrated by: Stephanie Dillard
- Length: 9 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- By Anonymous User on 10-19-22
By: Maxie Reynolds
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- By: George Finney, John Kindervag - foreword
- Narrated by: Daniel Thomas May
- Length: 7 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- By Jordan on 10-16-22
By: George Finney, and others
-
Navigating the Cybersecurity Career Path
- Insider Advice for Navigating from Your First Gig to the C-Suite
- By: Helen Patton
- Narrated by: Leslie Howard
- Length: 7 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Finding the right position in cybersecurity is challenging. Being successful in the profession takes a lot of work. And becoming a cybersecurity leader responsible for a security team is even more difficult. In Navigating the Cybersecurity Career Path, decorated chief information security officer Helen Patton delivers a practical and insightful discussion designed to assist aspiring cybersecurity professionals entering the industry and help those already in the industry advance their careers and lead their first security teams.
By: Helen Patton
-
The Art of Deception
- Controlling the Human Element of Security
- By: Kevin Mitnick
- Narrated by: Nick Sullivan
- Length: 13 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
-
-
Good security device delivered by old misogynist
- By James S. on 02-01-21
By: Kevin Mitnick
-
Cloud Security for Dummies
- By: Ted Coombs
- Narrated by: Chris Reilly
- Length: 16 hrs and 24 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds by hardening the walls that protect your data. Using the practical techniques discussed in Cloud Security for Dummies, you'll mitigate the risk of a data breach by building security into your network from the bottom up.
By: Ted Coombs
-
A Hacker's Mind
- How the Powerful Bend Society's Rules, and How to Bend Them Back
- By: Bruce Schneier
- Narrated by: Dan John Miller
- Length: 8 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
In A Hacker’s Mind, Bruce Schneier takes hacking out of the world of computing and uses it to analyze the systems that underpin our society: from tax laws to financial markets to politics. He reveals an array of powerful actors whose hacks bend our economic, political, and legal systems to their advantage, at the expense of everyone else.
-
-
Too Much Political Bias
- By Dreux on 02-18-23
By: Bruce Schneier
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- By: Matthew K. Sharp, Kyriakos Lambros
- Narrated by: Christopher Grove
- Length: 13 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Recommend
- By Cristen Mini on 01-15-24
By: Matthew K. Sharp, and others
-
The Pentester BluePrint
- Starting a Career as an Ethical Hacker
- By: Phillip L. Wylie, Kim Crawley
- Narrated by: Matthew Josdal
- Length: 6 hrs and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Pentester BluePrint: Starting a Career as an Ethical Hacker offers listeners a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.
-
-
Excellent book!
- By Jennifer Langford on 08-27-21
By: Phillip L. Wylie, and others
-
Cybersecurity
- The Insights You Need from Harvard Business Review
- By: Harvard Business Review, Alex Blau, Andrew Burt, and others
- Narrated by: Jonathan Todd Ross
- Length: 2 hrs and 56 mins
- Unabridged
-
Overall
-
Performance
-
Story
No data is completely safe. Cyberattacks on companies and individuals are on the rise and growing not only in number but also in ferocity. And while you may think your company has taken all the precautionary steps to prevent an attack, no individual, company, or country is safe. Cybersecurity can no longer be left exclusively to IT specialists. Improving and increasing data security practices and identifying suspicious activity is everyone's responsibility, from the boardroom to the break room.
By: Harvard Business Review, and others
-
If It's Smart, It's Vulnerable
- By: Mikko Hypponen
- Narrated by: Rich Miller
- Length: 7 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
All our devices and gadgets—from our refrigerators to our home security systems—are going online, just like our computers did. But once we've successfully connected our devices to the internet, do we have any hope of keeping them, and ourselves, safe from the dangers that lurk beneath the digital waters? Veteran cybersecurity professional Mikko Hypponen delivers an eye-opening exploration of the best—and worst—things the internet has given us. From instant connectivity between any two points on the globe to organized ransomware gangs, the net truly has been a mixed blessing.
-
-
One of the best books on this topic
- By hamilton on 02-25-24
By: Mikko Hypponen
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide
- 2nd Edition
- By: Ben Malisow
- Narrated by: Daniel Henning
- Length: 16 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. Covering all CCSP domains, this book walks you through architectural concepts and design requirements, cloud data security, cloud platform and infrastructure security, cloud application security, operations, and legal and compliance with real-world scenarios to help you apply your skills along the way.
-
-
Disruptive reading of URLs
- By Customer on 04-22-22
By: Ben Malisow
-
Security Awareness for Dummies
- By: Ira Winkler CISSP
- Narrated by: Tristan Morris
- Length: 9 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
Every organization needs a strong security program. One recent study estimated that a hacker attack occurs somewhere every 37 seconds. Since security programs are only as effective as a team's willingness to follow their rules and protocols, it's increasingly necessary to have not just a widely accessible gold standard of security, but also a practical plan for rolling it out and getting others on board with following it. Security Awareness for Dummies gives you the blueprint for implementing this sort of holistic and hyper-secure program in your organization.
-
Network Security Essentials
- Protecting Digital Infrastructures
- By: Barrett Williams, ChatGPT ChatGPT
- Narrated by: Virtual Voice
- Length: 4 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Introducing "Network Security Essentials", the must-have guide for professionals navigating the transformative landscape of network security in the digital age. This comprehensive eBook provides rich, multi-faceted insights that penetrate the surface of network security, revealing the depths of this essential discipline like never before. Starting with a clear introduction to Network Security, the book seamlessly guides you through the dynamic world of digital infrastructures. Explore the integral role they play in business today and discover practical strategies to protect them from myriad...
By: Barrett Williams, and others
-
How to Measure Anything in Cybersecurity Risk (2nd Edition)
- By: Douglas W. Hubbard, Richard Seiersen
- Narrated by: Jim Seybert
- Length: 14 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
In How to Measure Anything in Cybersecurity Risk, Second Edition, a pioneering information security professional and a leader in quantitative analysis methods deliver yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity. In the book, the authors demonstrate how to quantify uncertainty and shed light on how to measure seemingly intangible goals. It's a practical guide to improving risk assessment with a straightforward and simple framework.
By: Douglas W. Hubbard, and others
-
Cybersecurity for Dummies
- By: Joseph Steinberg
- Narrated by: BJ Harrison
- Length: 13 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
-
-
informative
- By Anonymous User on 07-09-21
By: Joseph Steinberg
-
Cybersecurity and Cyberwar
- What Everyone Needs to Know
- By: P. W. Singer, Allan Friedman
- Narrated by: Sean Pratt
- Length: 11 hrs and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Cybersecurity and Cyberwar: What Everyone Needs to Know®, New York Times best-selling author P. W. Singer and noted cyberexpert Allan Friedman team up to provide the kind of deeply informative resource book that has been missing on a crucial issue of 21st-century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters....
-
-
A job application for some government job?
- By Pascal on 03-04-17
By: P. W. Singer, and others
What listeners say about The Security Culture Playbook
Average customer ratingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- Amazon Customer
- 01-16-23
Cybersecurity Culture
The book proved a great insight on security culture, I had to buy the hardcopy for later reference and review
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!