Industry Syndication

Industry Syndication

Securing the C Level: Getting, Keeping or Reclaiming that Executive Title

If you are interested in reading this book, it is no doubt because you either aspire to join the elite executive ranks, or you are interested in maintaining your lofty position, or lastly, you have suffered a set-back and want to come back with vigor. This book is your road-map for taking charge of your executive career and aspirations. You have the power to create significant positive change in your life. There are really only two choices to make when you approach those crossroads and that is that either you can change You, the “Me, Myself, and I” facet, or you can change It “The Challenge”. The most important thing we can do in life is have a plan. Our plan should be adaptable and that same plan will serve as the framework for our success throughout our lives. Don’t believe for an instance that your aspirations are not achievable because you would be mistaken. While it may seem that for some people you may know, everything seems to be easy, virtually handed to them on a silver platter, but the reality is that with the appropriate amount of concerted effort and strategic, albeit cunning maneuvers, we have the absolute potential to achieve everything we include in what I will refer to as your personal career progression project plan. The challenge you will master after applying this framework is to secure, maintain or reclaim that executive level corporate position.

Purchase options:

  • EPUB E-Book Student version.
  • EPUB E-Book retail version.
  • Want the published version, Kindle, or Nook version? Now on Amazon and Barnes & Noble and other book store locations!
  • Credit Card-and-Carry Published version (Available only at book signing events!). 

Bonus Content with Proof of Purchase here. Content will not appear until your account has been authorized.

________________________________

The Holistic Operational Readiness Security Evaluation:
HORSE Project Series Volume 1:

Governance Documentation and Information Technology Security Policies Demystified

Holistic Operational Readiness Security Evaluation – HORSE Project Series Volume 1 is the professional companion book to the popular global resource, the HORSE Project Wiki, that provides a comprehensive examination of corporate information technology and security governance documents ranging from a corporate charter, policies and standards. This book provides a holistically approachable road map to design, ratification, implementation and maintenance of corporate security program policies. The guidance contained within has been the bedrock for corporate governance within some of the biggest organizations throughout the world.

Purchase options:

  • EPUB E-Book Student version.
  • EPUB E-Book retail version.
  • Want the published version, Kindle, or Nook version? Now on Amazon and Barnes & Noble and other book store locations!
  • Credit Card-and-Carry Published version (Available only at book signing events!). 

Bonus Content with Proof of Purchase here. Content will not appear until your account has been authorized.

________________________________

Keynote Presentation Titles and or Topics

  • The Security Trifecta
    • Episode 1: Security by the Numbers
    • Episode 2: We are all in the Same Boat
    • Episode 3: Collaboration vs. Isolation
    • Episode 4: Governance, Technology and Vigilance
    • Episode 5: Source Code, Application and System
  • Cyberspace Law
  • Enterprise Information Security
  • Secure Mobile Workforce
  • Executive Security Leadership
  • Bring Your Own Device (BYOD) Security
  • Enterprise Risk Management: ALE versus ROI
  • You Can’t Fix Stupid, But You Can Prevent It: Social engineering engineered out
  • Espionage Du Jour: Nation sponsored, corporate, or criminal actors
  • Saving Face: Predicting and preventing ethical disasters
  • Protecting Your Identity in Our New Virtual Reality
  • Protecting Your Technically Savvy Children from Predators
  • Big Brother, Big Mother, Big Father: How to spy on your kids
  • Commerce Security: End to end commerce security
  • Information Warfare
  • Intellectual Property Theft: Espionage threats to your business

Please inquire below for rates and availability.

Podcasting

  1. Personal-CXO-2012080401: Episode focused on The Security Trifecta: An Introduction.
  2. Personal-CXO-2012091301: Episode focused on Privacy Concerns: Survey Says!
  3. Personal-CXO-2012091901: Episode focused on Symbiotic Mutualism: A BYOD Love Story.
  4. Personal-CXO-2012092701: Episode focused on Dichotomy: My Two Holiday Hats.
  5. Personal-CXO-2012101201: Episode focused on Embargo to Espionage: A Cursory Review of the Shamoon Virus.
UA-38186568-1