Vores kunder ligger øverst på Google

Google Ads Specialister fra Vestjylland

Vi er 100% dedikerede til Google Annoncering – Vi har mange års erfaring med Google Ads og den bruger vi på at opsætte, optimere & vedligeholde vores fantastiske kunders konti.

100% Specialiseret i Google Ads
Vi har mange års erfaring fra +300 konti
Ingen lange bindinger & evighedskontrakter
Jævnlig opfølgning med hver enkelt kunde
Vi tager din virksomhed seriøst

8 results (0,14397 seconds)

Brand

Colour

Size

Merchant

Price (EUR)

Reset filter

Products
From
Shops

CISO COMPASS Navigating Cybersecurity Leadership Challenges with Insights from Pioneers

CISO COMPASS Navigating Cybersecurity Leadership Challenges with Insights from Pioneers

#1 Best Selling Information Security Book by Taylor & Francis in 2019 2020 2021 and 2022! 2020 Cybersecurity CANON Hall of Fame Winner Todd Fitzgerald co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success Information Security Governance Simplified: From the Boardroom to the Keyboard co-author for the E-C Council CISO Body of Knowledge and contributor to many others including Official (ISC)2 Guide to the CISSP CBK COBIT 5 for Information Security and ISACA CSX Cybersecurity Fundamental Certification is back with this new book incorporating practical experience in leading building and sustaining an information security/cybersecurity program. CISO COMPASS includes personal pragmatic perspectives and lessons learned of over 75 award-winning CISOs security leaders professional association leaders and cybersecurity standard setters who have fought the tough battle. Todd has also for the first time adapted the McKinsey 7S framework (strategy structure systems shared values staff skills and style) for organizational effectiveness to the practice of leading cybersecurity to structure the content to ensure comprehensive coverage by the CISO and security leaders to key issues impacting the delivery of the cybersecurity strategy and demonstrate to the Board of Directors due diligence. The insights will assist the security leader to create programs appreciated and supported by the organization capable of industry/ peer award-winning recognition enhance cybersecurity maturity gain confidence by senior management and avoid pitfalls. The book is a comprehensive soup-to-nuts book enabling security leaders to effectively protect information assets and build award-winning programs by covering topics such as developing cybersecurity strategy emerging trends and technologies cybersecurity organization structure and reporting models leveraging current incidents security control frameworks risk management laws and regulations data protection and privacy meaningful policies and procedures multi-generational workforce team dynamics soft skills and communicating with the Board of Directors and executive management. The book is valuable to current and future security leaders as a valuable resource and an integral part of any college program for information/ cybersecurity. | CISO COMPASS Navigating Cybersecurity Leadership Challenges with Insights from Pioneers

GBP 44.99
1

How to Start Your Own Cybersecurity Consulting Business First-Hand Lessons from a Burned-Out Ex-CISO

How to Start Your Own Cybersecurity Consulting Business First-Hand Lessons from a Burned-Out Ex-CISO

The burnout rate of a Chief Information Security Officer (CISO) is pegged at about 16 months. In other words that is what the average tenure of a CISO is at a business. At the end of their stay many CISOs look for totally different avenues of work or they try something else – namely starting their own Cybersecurity Consulting business. Although a CISO might have the skill and knowledge set to go it alone it takes careful planning to launch a successful Cyber Consulting business. This ranges all the way from developing a business plan to choosing the specific area in Cybersecurity that they want to serve. How to Start Your Own Cybersecurity Consulting Business: First-Hand Lessons from a Burned-Out Ex-CISO is written by an author who has real-world experience in launching a Cyber Consulting company. It is all-encompassing with coverage spanning from selecting which legal formation is most suitable to which segment of the Cybersecurity industry should be targeted. The book is geared specifically towards the CISO that is on the verge of a total burnout or career change. It explains how CISOs can market their experience and services to win and retain key customers. It includes a chapter on how certification can give a Cybersecurity consultant a competitive edge and covers the five top certifications in information security: CISSP CompTIA Security+ CompTIA CySA+ CSSP and CISM. The book’s author has been in the IT world for more than 20 years and has worked for numerous companies in corporate America. He has experienced CISO burnout. He has also started two successful Cybersecurity companies. This book offers his own unique perspective based on his hard-earned lessons learned and shows how to apply them in creating a successful venture. It also covers the pitfalls of starting a consultancy how to avoid them and how to bounce back from any that prove unavoidable. This is the book for burned-out former CISOs to rejuvenate themselves and their careers by launching their own consultancies. | How to Start Your Own Cybersecurity Consulting Business First-Hand Lessons from a Burned-Out Ex-CISO

GBP 44.99
1

Modern Management and Leadership Best Practice Essentials with CISO/CSO Applications

Modern Management and Leadership Best Practice Essentials with CISO/CSO Applications

In one modest-sized volume this book offers three valuable sets of knowledge. First it provides best practice guidance on virtually every large-scale task a modern manager may be involved in—from recruiting and hiring to onboarding and leading teams and from employee engagement and retention to performance management and working with difficult employees. Second it explains the essential concepts and practice of a range of effective leadership styles—including (but not limited to) servant leadership crisis leadership change agent leadership and diversity and inclusion leadership. Third it offers brief case studies from select CISOs and CSOs on how these management and leadership principles and practices play out in real-life workplace situations. The best practice essentials provided throughout this volume will empower aspiring leaders and also enable experienced managers to take their leadership to the next level. Many if not most CISOs and other leaders have had very little if any formal training in management and leadership. The select few that have such training usually obtained it through academic courses that take a theoretical broad brush approach. In contrast this book provides much actionable guidance in the nitty-gritty tasks that managers must do every day. Lack of management practical knowledge puts CISOs and CSOs at a disadvantage vis-a-vis other executives in the C-suite. They risk being pigeonholed as “security cops” rather than respected business leaders. Many articles on these subjects published in the press are too incomplete and filled with bad information. And combing through the few high-quality sources that are out there such as Harvard Business Publishing can take hundreds of dollars in magazine subscription and book purchase fees and weeks or months of reading time. This book puts all the essential information into your hands through a series of concise chapters authored by an award-winning writer. | Modern Management and Leadership Best Practice Essentials with CISO/CSO Applications

GBP 36.99
1

Klass Cryo Leather Water-Repellent Handling Gloves - XL

Klass Cryo Leather Water-Repellent Handling Gloves - Large

The Privacy Leader Compass A Comprehensive Business-Oriented Roadmap for Building and Leading Practical Privacy Programs

The Privacy Leader Compass A Comprehensive Business-Oriented Roadmap for Building and Leading Practical Privacy Programs

476 Pages 57 B/W Illustrations Congratulations! Perhaps you have been appointed as the Chief Privacy Officer (CPO) or the Data Protection Officer (DPO) for your company. Or maybe you are an experienced CPO/DPO and you wonder – what can I learn from other successful privacy experts to be even more effective? Or perhaps you are considering a move from a different career path and deciding if this is the right direction for you. Seasoned award-winning Privacy and Cybersecurity leaders Dr. Valerie Lyons (Dublin Ireland) and Todd Fitzgerald (Chicago IL USA) have teamed up with over 60 award-winning CPOs DPOs highly respected privacy/data protection leaders data protection authorities and privacy standard setters who have fought the tough battle. Just as the #1 best-selling and CANON Cybersecurity Hall of Fame winning CISO Compass: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers book provided actionable advice to Chief Information Security Officers The Privacy Leader Compass is about straight talk – delivering a comprehensive privacy roadmap applied to and organized by a time-tested organizational effectiveness model (the McKinsey 7-S Framework) with practical insightful stories and lessons learned. You own your continued success as a privacy leader. If you want a roadmap to build lead and sustain a program respected and supported by your board management organization and peers this book is for you. | The Privacy Leader Compass A Comprehensive Business-Oriented Roadmap for Building and Leading Practical Privacy Programs

GBP 44.99
1

The Security Hippie

The Security Hippie

The Security Hippie is Barak Engel’s second book. As the originator of the “Virtual CISO” (fractional security chief) concept he has served as security leader in dozens of notable organizations such as Mulesoft Stubhub Amplitude Analytics and many others. The Security Hippie follows his previous book Why CISOs Fail which became a sleeper hit earning a spot in the Cybercannon project as a leading text on the topic of information security management. In this new book Barak looks at security purely through the lens of story-telling sharing many and varied experiences from his long and accomplished career as organizational and thought leader and visionary in the information security field. Instead of instructing this book teaches by example sharing many real situations in the field and actual events from real companies as well as Barak’s related takes and thought processes. An out-of-the-mainstream counterculture thinker – Hippie – in the world of information security Barak’s rich background and unusual approach to the field come forth in this book in vivid color and detail allowing the reader to sit back and enjoy these experiences and perhaps gain insights when faced with similar issues themselves or within their organizations. The author works hard to avoid technical terms as much as possible and instead focus on the human and behavioral side of security finding the humor inherent in every anecdote and using it to demystify the field and connect with the reader. Importantly these are not the stories that made the news; yet they are the ones that happen all the time. If you’ve ever wondered about the field of information security but have been intimidated by it or simply wished for more shared experiences then The Security Hippie is the perfect way to open that window by accompanying Barak on some of his many travels into the land of security.

GBP 34.99
1

Practical AI for Cybersecurity

Practical AI for Cybersecurity

The world of cybersecurity and the landscape that it possesses is changing on a dynamic basis. It seems like that hardly one threat vector is launched new variants of it are already on the way. IT Security teams in businesses and corporations are struggling daily to fight off any cyberthreats that they are experiencing. On top of this they are also asked by their CIO or CISO to model what future Cyberattacks could potentially look like and ways as to how the lines of defenses can be further enhanced. IT Security teams are overburdened and are struggling to find ways in order to keep up with what they are being asked to do. Trying to model the cyberthreat landscape is a very laborious process because it takes a lot of time to analyze datasets from many intelligence feeds. What can be done to accomplish this Herculean task? The answer lies in Artificial Intelligence (AI). With AI an IT Security team can model what the future Cyberthreat landscape could potentially look like in just a matter of minutes. As a result this gives valuable time for them not only to fight off the threats that they are facing but to also come up with solutions for the variants that will come out later. Practical AI for Cybersecurity explores the ways and methods as to how AI can be used in cybersecurity with an emphasis upon its subcomponents of machine learning computer vision and neural networks. The book shows how AI can be used to help automate the routine and ordinary tasks that are encountered by both penetration testing and threat hunting teams. The result is that security professionals can spend more time finding and discovering unknown vulnerabilities and weaknesses that their systems are facing as well as be able to come up with solid recommendations as to how the systems can be patched up quickly.

GBP 44.99
1