Book Review ‘’ CISO Desk Reference Guide - A Practical Guide for CISOs - Volume 2’’
Dr Magda Chelly
Cybersecurity & Risk Management | AI-Powered Regulatory Compliance | Polish-Tunisian | Published Author & TEDx Speaker | Featured in Forbes ???? | Advocate for Responsible Cyber | Techstars 2024
I received this book for a review before even being published by Gary Hayslip. And, of course, I would not hide my immense honor to do so. Gary has been an amazingly supportive professional for all the cyber security industry through his blogs and articles.?Therefore, I was very excited to read his book, co-authored with Bill Bonney, and Matt Stamper.??
Thank you again for giving me the chance to be one of your first readers! What a honour! Now off to the review.
Let me state first that this has been one of the most interesting and practical reads that I had for the year. In fact, the book added to my experience very interesting facts and practical advice that I can apply immediately, working as a CISO On Demand. I was left with great return on experiences, and really good quality tips.
I wasn’t sure how all the notions will fit into my experience, but to my positive surprise, I can and will be able to put in place a good pool of concepts, especially related to the recruitment process in the cyber security industry. My first thought or comment would be that this book has a tremendous value also to Chief Human Resources Officers. It opens a different perspective, and clearly explains the dissociation between demand and supply. One of my favourite part is related to the skill gap assessment with a matrix and some extremely relevant questions to ask yourself before building up your new cyber security team.
Authors mention very clearly that a presence online with some good social research, and a cyber security network might be extremely helpful to find the right skills and competences for future hiring requirements. I would absolutely not argue with that. I will actually say that I am applying it every day and increasing my network across the whole World. There are some excellent points for the readers to take on board, especially in our industry where a clear balance between the online presence and branding vs security, and privacy needs to be applied.
There were a few things in the chapter ‘’Cyber Awareness’’ that I am just pencilling down and integrating in my own cyber program as I am writing this review. The chapter gives you a concrete answer, so you can put in place the right vision for your awareness program with a precise top-down approach, rather than just the commonly know one cyber awareness session once a year !
Now, one of the main aspects that I would still add to the book, is a more international view and approach.
With all that being said …. AMAZING ! I JUST LOVED THE BOOK ! Being a new CISO, I have got to be learning every day, and that is one of the main reasons why I have been in this industry. I am passionate about the continuous learning. The authors have only emphasized that, promoting continuous learning for the CISOs. They did an amazingly great job.?
I really enjoyed the practical aspect of the book, and a clear return on experience. The examples, and concepts are clearly being implemented and they are not just theoretical notions, but proper advice. It is also well written and clear. You do not feel that you NEED to read it but that you WANT to, and you won’t be bored because it all relates to various experiences, with an opening on new perspectives.
Again, thank you Gary for letting me be a part of the reviewers and allowing me the pleasure to work with you and give you my feedback! I absolutely loved it.
If you have not read the first volume of this book, please do IMMEDIATELY.?
You can buy it here:?https://www.amazon.com/CISO-Desk-Reference-Guide-Practical/dp/0997744146
By Magda Chelly:
Former Chief Security Officer | Author & Keynote Speaker | IFSEC Global Top 20 Cybersecurity Influencer | Entrepreneur | PhD, S-CISO, CISSP, Cert SCI (General Insurance)
Find out on magda-on-cyber.com
Awards
Social Media Accounts
[NETWORK SECURITY PROFESSIONAL] [PRIVACY AND SECURITY ADVOCATE]
6 年Well I am a pragmatic person so this guide will fit my personality. I don't like books based off of?theoretical and academics that are not systematically written. I will have to check out the vol 1 first. ?
Manager, Identity & Access Management at Envision Healthcare
6 年I recently read Volume 1 and refer to it repeatedly. I'm looking forward to Vol 2!? When will Volume? come out?
Information System Audit | IT Strategy & Framework | Information Security SOP, Standard, Policy | Privacy Protection | Incident Handling | IT Risk Management | IT Project Management | Cyber Security
6 年I cannot help me but to be the first to comment on your book review. I am amazed and enthusiast at your emerging endeavor on cyber security. By the way, I am going to conduct a day long training on cyber security with IT professionals in Bangladesh, and definitely your resources will help me.?