13,99 €
inkl. MwSt.

Versandfertig in 1-2 Wochen
  • Broschiertes Buch

Cyber Security explained in non-cyber language. Get ready to have everything you thought you knew about Cyber Security Awareness challenged. Fight back against the scourge of scams, data breaches, and cyber crime by addressing the human factor. Using humour, real-world anecdotes, and experiences, this book introduces seven simple rules to communicate cyber security concepts effectively and get the most value from your cyber awareness initiatives. Since one of the rules is "Don't Be Boring," this proven process is presented in an entertaining manner without relying on scary numbers, boring…mehr

Produktbeschreibung
Cyber Security explained in non-cyber language. Get ready to have everything you thought you knew about Cyber Security Awareness challenged. Fight back against the scourge of scams, data breaches, and cyber crime by addressing the human factor. Using humour, real-world anecdotes, and experiences, this book introduces seven simple rules to communicate cyber security concepts effectively and get the most value from your cyber awareness initiatives. Since one of the rules is "Don't Be Boring," this proven process is presented in an entertaining manner without relying on scary numbers, boring hoodie-wearing hacker pictures, or techie jargon! Additionally, this book addresses the "What" and "Why" of cyber security awareness in layman's terms, homing in on the fundamental objective of cyber awareness-how to influence user behaviour and get people to integrate secure practices into their daily lives. It draws wisdom from several global bodies of knowledge in the technology domain and incorporates relevant teachings from outside the traditional cyber areas, such as behavioural psychology, neuroscience, and public health campaigns. This book is for everyone, regardless of their prior cyber security experience. This includes cyber security and IT professionals, change managers, consultants, communication specialists, senior executives, as well as those new to the world of cyber security. What Will This Book Do for You? If you're new to cyber security, it will help you understand and communicate the topic better. It will also give you a clear, jargon-free action plan and resources to jump start your own security awareness efforts. If you're an experienced cyber security professional, it will challenge your existing assumptions and provide a better way to increase the effectiveness of your cyber awareness programs. It will empower you to influence user behaviour and subsequently reduce cyber incidents caused by the human factor. It will enable you to avoid common mistakes that make cyber security awareness programs ineffective. It will help make you a more engaging leader and presenter. Most importantly, it won't waste your time with boring content (yes, that's one of the rules!).
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Autorenporträt
Chirag's ambitious goal is simple - enable human progress through technology. To accomplish this, he wants to help build a world where there is trust in digital systems, protection against cyber threats and a safe environment online for communication, commerce and engagement. He is especially passionate about safety of children and vulnerable sections of society online. This goal has served as a driver that has led Chirag to become a sought-after public speaker and advocate at various industry-leading conferences and events. During the course of his career spanning over a decade in multiple countries, he has built, implemented and successfully managed cyber security, risk management and security awareness programs. The success of these programs were a result of unyielding focus on business priorities, pragmatic approach to cyber threats and most importantly, effective stakeholder engagement. As a leader holding senior positions in organizations, Chirag excels at the art of translating business and technical speak in a manner that optimizes value. Chirag's academic qualifications include Master's degree in Telecommunications Management and Bachelor's degree in Engineering degree in Electronics and Telecommunications Engineering. He holds multiple certifications including Certified Information Security Manager, Certified Information Systems Auditor and Certified in Risk and Information Systems Control.