Leading in Digital Security
Twelve ways to combat the silent enemy
Most of the time digital security is seen as a IT department responsibility. Nowadays business leaders need to gain sufficient knowledge on leading their organisation into the -riskfree- digital era
Lees verder
Specificaties
ISBN/EAN | 9789090335131 |
Auteur | Yuri Bobbert |
Uitgever | BITTI B.V. |
Taal | Engels |
Uitvoering | Gebonden in harde band |
Pagina's | 256 |
Lengte | 217.0 mm |
Breedte | 156.0 mm |
Yuri Bobbert is a scientific practitioner. He is a Chief Information Security Officer at ON2IT and Academic Director / Professor at Antwerp Management School (AMS). With concrete advice and a down-to-earth approach, he has advised more than 300 companies, including NN Group and UWV as Head of Digital Security. Yuri has a double PhD from both the University of Antwerp and Radboud University in the Netherlands. His dissertation about “Maturing Business Information Security (MBIS),” describes the managerial side of security and the technology used to meas- ure and administrate it. His first book was published in 2010; the second in 2014, describing 25 companies that have applied his methods. In 2018 he published two books: “Critical success fac- tors for effective business information security” and “Cybersecurity in 60 minutes” for Boards and supervisory bodies. Mark Butterhoff has gained experience over the last 20 years in various roles. He has a long history in one of the Big Four accounting firms, where he worked in infor- mation security, IT auditing, and management consulting. After that he worked for several years as program manager and interim manager restructuring and changing mainly IT organizations as well as a post as Interim Chief Information Security Officer. So far he has helped over 80 companies in 17 countries. Alongside his work he also teaches at the TIAS Business School in the Netherlands. Mark has completed studies in various topics, including Business Informatics and IT Auditing. In 2016 he published a book entitled “Discover the IT Cherry,” which describes how to become the most valued IT organization by building trust and creating experiences instead of using the latest technology or implementing new processes. His experienc- es from work and the insights gained from writing this book were also the basis for writing this book. Solid technology and processes are massively important in cyber- security; however, they won’t help you win the war against this silent enemy. Just as in sports, the army, aviation, healthcare, etc., it’s mostly leadership and the people in your organization that make the difference.