CISO Holiday Bookshelf
A selection of interesting security reads perfect as gifts from and to the typical CISO.
December 22, 2014
Say Anything: How Leaders Inspire Ideas, Cultivate Candor, and Forge Fearless Cultures
Studies show that the most effective CISOs spend as much time brushing up on communication skills as they do learning about technology. This newly released book offers a bit of light continuing education to help CISOs learn to build better relationships both within and outside the IT department.
CISOs in the energy and critical infrastructure industries should buy multiple copies of this in bulk. Written in a children's book manner, this fun little book simplifies SCADA technology and vulnerabilities in a way that even kids (or ADD executives) can follow.
Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous
Even CISOs and security gurus that are keenly aware of the rise of Anonymous may find this an interesting take on the group. The culmination of years of study by an anthropologist, this book offers irreverent and well-informed insight about the hacktivism phenomenon.
If you're a dev or ops person helping to get buy-in for a DevOps transformation within your IT organization, consider wrapping up a copy of this puppy and leaving it on the CISO's desk. In a narrative that explains how DevOps can reshape the way IT does business, the fictional security lead has a big role in this story, which will explain how a CISO needs to be a part of the cooperation of DevOps.
If you're a security geek hoping to explain to loved ones the importance of what you do every day, consider putting a copy of Spam Nation under their tree. Written by Brian Krebs of KrebsOnSecurity, this book offers a compelling and humanizing look at the criminals behind the cybercrime epidemic.
Learn more about the intriguing unfolding of the Stuxnet drama, as Wired's Kim Zetter lays out a gripping narrative that explains its origins, discovery, and implications for the future of cyber security.
@War: The Rise of the Military-Internet Complex
With news of purported North Korean ties to the Sony hack, this just-released tome couldn't be more prescient. It takes an in-depth look at the so-called "fifth domain" of cyber as a warfare theater and the alliances the US military has made with tech and finance companies to operate in that domain.
With just a few shopping days until Christmas, now is the time to fill in those gift-giving gaps. But put down the assorted chocolates -- nobody needs the extra calories at this point -- and turn your attention to the printed word. Books are the perfect last-minute gift. Whether you're searching for something that your CISO loved one or co-worker would enjoy during the holiday lull, or you're a CISO hoping to educate family on what it is you do for work, we've got a selection of choices for you. The following books offer something educational, fun, or otherwise noteworthy for the security-minded and layperson alike.
With just a few shopping days until Christmas, now is the time to fill in those gift-giving gaps. But put down the assorted chocolates -- nobody needs the extra calories at this point -- and turn your attention to the printed word. Books are the perfect last-minute gift. Whether you're searching for something that your CISO loved one or co-worker would enjoy during the holiday lull, or you're a CISO hoping to educate family on what it is you do for work, we've got a selection of choices for you. The following books offer something educational, fun, or otherwise noteworthy for the security-minded and layperson alike.
Say Anything: How Leaders Inspire Ideas, Cultivate Candor, and Forge Fearless Cultures
Studies show that the most effective CISOs spend as much time brushing up on communication skills as they do learning about technology. This newly released book offers a bit of light continuing education to help CISOs learn to build better relationships both within and outside the IT department.
About the Author(s)
You May Also Like
CISO Perspectives: How to make AI an Accelerator, Not a Blocker
August 20, 2024Securing Your Cloud Assets
August 27, 2024