Atnaujinkite slapukų nuostatas

How to Start Your Own Cybersecurity Consulting Business: First-Hand Lessons from a Burned-Out Ex-CISO [Minkštas viršelis]

(Apollo Biometrics, Inc., Chicago, Illinois, USA)
  • Formatas: Paperback / softback, 156 pages, aukštis x plotis: 234x156 mm, weight: 254 g, 9 Tables, black and white
  • Išleidimo metai: 04-Aug-2022
  • Leidėjas: Auerbach
  • ISBN-10: 1032163631
  • ISBN-13: 9781032163635
Kitos knygos pagal šią temą:
  • Formatas: Paperback / softback, 156 pages, aukštis x plotis: 234x156 mm, weight: 254 g, 9 Tables, black and white
  • Išleidimo metai: 04-Aug-2022
  • Leidėjas: Auerbach
  • ISBN-10: 1032163631
  • ISBN-13: 9781032163635
Kitos knygos pagal šią temą:
The burnout rate of a Chief Information Security Officer (CISO) is pegged at about 16 months. In other words, that is what the average tenure of a CISO is at a business. At the end of their stay, many CISOs look for totally different avenues of work, or they try something else namely starting their own Cybersecurity Consulting business. Although a CISO might have the skill and knowledge set to go it alone, it takes careful planning to launch a successful Cyber Consulting business. This ranges all the way from developing a business plan to choosing the specific area in Cybersecurity that they want to serve.

How to Start Your Own Cybersecurity Consulting Business: First-Hand Lessons from a Burned-Out Ex-CISO is written by an author who has real-world experience in launching a Cyber Consulting company. It is all-encompassing, with coverage spanning from selecting which legal formation is most suitable to which segment of the Cybersecurity industry should be targeted. The book is geared specifically towards the CISO that is on the verge of a total burnout or career change. It explains how CISOs can market their experience and services to win and retain key customers. It includes a chapter on how certification can give a Cybersecurity consultant a competitive edge and covers the five top certifications in information security: CISSP, CompTIA Security+, CompTIA CySA+, CSSP, and CISM.

The books author has been in the IT world for more than 20 years and has worked for numerous companies in corporate America. He has experienced CISO burnout. He has also started two successful Cybersecurity companies. This book offers his own unique perspective based on his hard-earned lessons learned and shows how to apply them in creating a successful venture. It also covers the pitfalls of starting a consultancy, how to avoid them, and how to bounce back from any that prove unavoidable. This is the book for burned-out former CISOs to rejuvenate themselves and their careers by launching their own consultancies.
Acknowledgments xiii
About the Author xv
1 Introduction -- The CISO
1(68)
About Myself
1(5)
What the C-Suite Is
6(1)
The C-Suite Roles
7(4)
The Role of the Chief Information Officer (CIO)
11(3)
The Role of the vCISO
14(1)
The Key Differences between the vCISO and the CISO
14(1)
The Benefits of the vCISO
15(3)
Other Related CISO Roles
18(1)
The Role of the vPO
18(2)
The Role of the vCCO
20(2)
The Role of the CISO
22(1)
Security Operations
23(1)
Cyber Risk and Cyber Resiliency
23(1)
Defining Cyber Risk
23(2)
How to Manage Cybersecurity Risk
25(2)
Introduction -- What Exactly Is Cyber Resiliency?
27(1)
An Example of Cyber Resiliency
27(1)
How the Definition of Cyber Resiliency Was Met
28(1)
What Is the Difference between Cyber Resiliency and Cyber Security?
29(1)
The NIST Special Publication 800-160 Volume 2
29(2)
Data Loss
31(1)
The Data Breach
31(1)
Top Five Tips to Avoid a Data Breach
32(2)
Internal Fraud Prevention
34(1)
How to Avoid Internal Fraud
34(3)
Identity and Access Management
37(1)
Biometrics and Identity Management
38(1)
Introduction
38(1)
What Biometrics Is All About
38(1)
How Biometrics Can Confirm Your Identity
39(1)
Biometrics as a Replacement to the Password
40(3)
An Introduction to the Zero Trust Framework
43(1)
Introduction
43(1)
What Exactly Is Zero Trust?
43(1)
How to Implement the Zero Trust Framework
44(3)
The Advantages of the Zero Trust Framework
47(2)
Third-Party and Vendor Risk Management
49(1)
How to Manage Third-Party Risk
50(1)
Introduction
50(1)
The Types of Third-Party Risks
50(2)
How to Manage Third-Party Risks
52(1)
The Importance of Vendor Compliance Management
53(1)
Introduction
53(1)
What Is Vendor Compliance?
54(1)
The Components
55(2)
Investigations and Forensics
57(1)
The Use of Artificial Intelligence in Digital Forensics
57(1)
How It Is Being Used
58(2)
Governance
60(1)
Understanding IT Governance, Risk, and Compliance
60(1)
Introduction
60(1)
What Exactly Do They Mean?
61(2)
Other Factors That Keep the CISO Up at Night
63(3)
What the CISO Can Do to Improve the Odds of Tenure
66(1)
The Quantitative Backup
67(1)
Further Reading
68(1)
2 The Business Plan
69(28)
What Should I Focus My Business On?
71(4)
Choosing the Legal Business Entity
75(1)
The Different Kinds of Entities
75(2)
The LLC
77(1)
The S Corporation
78(1)
The C Corporation
79(1)
Getting the FEIN Number
80(1)
Your Business's Website
81(6)
Establishing Payment Terms and Hiring Employees
87(1)
Setting Up Payment Terms
87(2)
Hiring New Employees
89(1)
Do I Need a Brick-and-Mortar Presence?
90(1)
The Financial Components of the Business Plan
91(1)
The Profit and Loss Statement
91(2)
The Cash Flow Statement
93(2)
The Break-Even Point
95(1)
Further Reading
96(1)
3 Launching the Threat-Hunting Business
97(40)
Introduction
97(1)
A Formal Definition of Proactive Threat Hunting
98(3)
The Process of Proactive Threat Hunting and Its Components
101(2)
Hiring Your Threat Hunting Team
103(1)
Level 1 Questions
104(5)
Question 1
104(1)
Question 2
104(1)
Question 3
105(1)
Question 4
105(1)
Question 5
106(1)
Question 6
106(1)
Question 7
107(1)
Question 8
107(1)
Question 9
108(1)
Question 10
108(1)
Level 2 Questions
109(6)
Question 1
109(1)
Question 2
110(1)
Question 3
110(1)
Question 4
111(1)
Question 5
111(1)
Question 6
112(1)
Question 7
112(1)
Question 8
113(1)
Question 9
113(1)
Question 10
114(1)
Question 11
114(1)
Level 3 Questions
115(6)
Question 1
115(1)
Question 2
116(1)
Question 3
116(1)
Question 4
117(1)
Question 5
117(1)
Question 6
118(1)
Question 7
119(1)
Question 8
119(1)
Question 9
120(1)
Question 10
120(1)
The Characteristics of a Good Threat Hunter
121(3)
The Value of a Good Threat Hunter
124(2)
Launching the Threat Hunting Exercise
126(1)
The Risk Assessment -- What Needs to Be Examined
126(3)
Determining What to Hunt For and How Often
129(2)
Launching the Threat Hunting Remediation Exercise
131(2)
Determining the Effectiveness of the Threat Hunting Exercise
133(2)
Further Reading
135(2)
4 Staying Ahead of the Competition
137(14)
The Top Five Certs
137(7)
The Different Ways to Prepare for a Cybersecurity Certification
144(1)
Be On Top of the Hiring Curve
145(1)
Introduction
146(1)
What Is the Solution???
147(3)
Further Reading
150(1)
Index 151
Ravi Das is a cybersecurity consultant and business development specialist. He also does cybersecurity consulting through his private practice, RaviDas.tech. He is also studying for the CompTIA Security+ Certification.