This author participates in the Readers' Favorite Free Book Program, which is open to all readers and is completely free. The author will provide you with a free copy of their book in exchange for an honest review. You and the author will discuss what sites you will post your review to and what kind of copy of the book you would like to receive (eBook, PDF, Word, paperback, etc.). To begin, click the purple email icon to send this author a private email.
This author participates in the Readers' Favorite Book Review Exchange Program, which is open to all authors and is completely free. Simply put, you agree to provide an honest review an author's book in exchange for the author doing the same for you. What sites your reviews are posted on (B&N, Amazon, etc.) and whether you send digital (eBook, PDF, Word, etc.) or hard copies of your books to each other for review is up to you. To begin, click the purple email icon to send this author a private email, and be sure to describe your book or include a link to your Readers' Favorite review page or Amazon page.
This author participates in the Readers' Favorite Book Donation Program, which was created to help nonprofit and charitable organizations (schools, libraries, convalescent homes, soldier donation programs, etc.) by providing them with free books and to help authors garner more exposure for their work. This author is willing to donate free copies of their book in exchange for reviews (if circumstances allow) and the knowledge that their book is being read and enjoyed. To begin, click the purple email icon to send this author a private email. Be sure to tell the author who you are, what organization you are with, how many books you need, how they will be used, and the number of reviews, if any, you would be able to provide.
Reviewed by Pikasho Deka for Readers' Favorite
Over the past decade, many organizations have been prone to information security lapses and faced a few infamous cyber attacks. In The Cybersecurity Spiral of Failure: And How to Break Out of It, veteran cybersecurity consultant and CEO of Corix Partners, Jean-Christophe Gaillard, presents a collection of published articles between 2015 and 2022 that explore how organizations must face information security threats today. The book calls for creating lasting organizational change concerning cybersecurity and hiring IT executives who put an equal onus on control and security as they do on delivery, functionality, and performance. CISOs must develop robust operating models for their information security teams. The book also delves into the role of the modern CISO, leadership challenges around cybersecurity, questions the board of directors must reflect on, approaching cybersecurity as a leadership imperative, risk management, and much more.
The Cybersecurity Spiral of Failure: And How to Break Out of It takes a deep dive into the culture organizations must foster to address various challenges related to information security. With these informative and in-depth articles, Jean-Christophe Gaillard shows how senior IT executives, especially CISOs, can offer dynamic leadership and become the flagbearers of security and control within organizations. The articles are thorough and accessible. There is attention to detail in every topic covered in this book. Gaillard insists cybersecurity threats are not merely a technology problem but a systematic organizational problem depending on the firm's maturity levels. The book is technical at times but still easy and engaging to read. I found it very educational and illuminating, and I highly recommend it to CISOs, CEOs, and other IT executives.