''I am very proud to co-author my first EBOOK, a crowdsourced effort from the members of the Peerlyst online community of information security professionals.’’, Magda Chelly, PhD, CISSP, MD & CISO on Demand at Responsible Cyber
‘’The white hat hackers guide to hacking & pentesting for the common good’’ will be broadly educating on hacking techniques across cloud, mobile and web applications, as each of these topics requires books on their own to dig into the topics in depth. The book on Amazon costs $0.99. The proceeds of this book will be donated by Peerlyst to http://withoutmyconsent.org, an organization fighting online harassment.
Chief Information Security Officer Guide has an objective of giving you some practical advice about the current situation of a CISO role and corporate perception and expectations.
The CISO role has been previously characterized as a technical/IT related role. This has drastically evolved and nowadays, the CISO/CSO role has much wider responsibilities. This guide is structured as a high level, through main considerations and feedback from my own personal experience.
The Impact of the cyber security boom is undeniably important and brings on many additional questions from the InfoSec community.
Implementing cloud MUST be aligned with security measures to tackle the associated cyber risks.
Security is an advantage, and a competitive value. I believe that the responsibilities of the security professional handling cloud transformation include architecture review and hardening the configuration of the cloud architecture and subsequent security requirements.