Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Other Sellers on Amazon
+ Free Shipping
+ Free Shipping
+ $6.03 shipping
Secure Enough?: 20 Questions on Cybersecurity for Business Owners and Executives Hardcover – October 1, 2017
|New from||Used from|
See the Best Books of 2018 So Far
Looking for something great to read? Browse our editors' picks for the best books of the year so far in fiction, nonfiction, mysteries, children's books, and much more.
“Your winning cybersecurity strategy starts with this book.”
—Joey Smith, Chief Information Security Officer, Schnuck Markets
“This book isn’t an education on everything in cybersecurity. It includes the topics I need to know as a business owner to make good decisions for my company.”
—Phil Milne, Co-owner and CEO, Rapid Packaging Inc.
“A must read for any executive who wants to know what is at stake in the information security arena.”
—Miles Edmundson, Chief Information Security Officer, Ceridian
About the Author
Bryce Austin started his technology career on a Commodore 64 computer and a cassette tape drive. Today he is a leading voice on emerging technology and cybersecurity issues. Bryce is known as a thought leader, cybersecurity authority, and internationally recognized professional speaker. With over 10 years of experience as a Chief Information Officer and Chief Information Security Officer, Bryce actively advises company boards in a wide variety of industries. He was the CIO and CISO of Wells Fargo Business Payroll Services, and a Senior Group Manager at Target Corporation. He has first-hand experience of what happens to a business and its employees during a cybersecurity crisis, as it did to Target because of their 2013/2014 credit card data breach. When Bryce isn't spending quality time with his family, he spends his weekends as a high-speed track driver and coach. He has over 15 years of experience, and has driven cars as diverse as an 85 HP Saturn to a 650 HP Porsche 911 Turbo. He has had more than 100 students under his instruction, all alive and eager to drive again.
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
Who is the book for?
Large organizations are likely to have invested in teams of security professionals and consultants who evaluate practices. They are also likely to follow trends in security management closely. Smaller organizations may not have dedicated teams to manage cybersecurity and will benefit from books like this.
Written in a lucid style, this is a highly readable book both practitioners and technology executives are likely to benefit from.
This book covers the spectrum of cybersecurity at a level that is both tailored to the security professional but also written in a way to be understood by anyone. Minimal acronyms, higher level security discussions to not confuse everyone and very well cited sources.
I found the best part of the book was tying the questions to real world situations and examples Bryce came across in his career. This is what you need to do when you talk security because it provides context. Real world connections to cybersecurity to help people, professional or not, to better understand the "Why" of security and how it applies to you and your business.
I took away new view points and perspectives on similar problems I have dealt with and will deal with in the future with my own teams but also other clients. Where I may have done things one way, stories like Bryce tells will show a different point of view to come to the same goal, make the world more secure.
I highly recommend this book and will to all my clients. It's earned a place on my office bookshelf.
Served up with a large dose of personal anecdotes from his security consulting experiences, the book is very readable and full of recognizable scenarios that back up the points Austin is making. He makes no pretense that this is a comprehensive how-to manual, but it could serve as an excellent starting point for a cybersecurity program or a "status check" on an existing one.
For IT or InfoSec leaders or teams at larger or highly-regulated enterprises, it's an enjoyable read but most of what's here will not be a surprise. What's unusual and worthwhile is how well it is geared to non-IT, non-Security business leadership - and as such could potentially be a useful tool for IT and InfoSec leaders as reading material for their business and financial leadership to encourage support for security programs.