{"id":17040,"date":"2021-01-27T00:08:00","date_gmt":"2021-01-27T00:08:00","guid":{"rendered":"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-protecting-the-crown-jewels-3\/"},"modified":"2023-05-31T10:20:00","modified_gmt":"2023-05-31T10:20:00","slug":"ciso-playbook-protecting-the-crown-jewels","status":"publish","type":"page","link":"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-protecting-the-crown-jewels\/","title":{"rendered":"CISO Playbook: Protecting the Crown Jewels"},"content":{"rendered":"

CISO Playbook:<\/p>\n

Protecting <\/span>the <\/span><\/strong><\/span>Crown Jewels<\/span><\/strong><\/h1>\n

Building a cyber security strategy around high value digital asset<\/span><\/span><\/span>s<\/span><\/p>\n

This CISO Playbook provides some practical guidelines for enterprises to identify and maintain a tight list of high-value digital assets and develop a highly focused cyber resilience program to maximise the value from cyber security investments and accelerate the strengthening of their cyber resilience posture.<\/p>\n

Enter your details below for free membership of the Cyber Leadership Institute to download the playbook.<\/p>\n

If you’re already a member, click here<\/a> to log in or just download the PDF<\/a>.<\/p>\n

\"\"<\/span>About the AuthorPhillimon Zongo<\/strong><\/p>\n

Phil is an international keynote speaker, multi-award winning virtual CISO and bestselling author of The Five Anchors of Cyber Resilience<\/a><\/span>, a practical cyber strategy book for senior business leaders. He is an official member of Forbes Business Council, an Invitation-Only Global Community for Successful Business Owners and Leaders. He was named one of 2020\u2019s Top 100 Most Influential People of African Descent (New York USA), as well as 2017 winner of ISACA International\u2019s Best Article Award (Chicago, USA). His views have been featured by Forbes, CISCO, NZ Business Herald, Financial Standard, SAP, etc., and named as one of the Top 7 Global Cyber Security Leaders in 2023 by the Security Magazine and ISACA.<\/strong><\/p>\n

Related contents:<\/strong>\"\"<\/a><\/span>\"\"<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"

CISO Playbook: Protecting the Crown Jewels Building a cyber security strategy around high value digital assets This CISO Playbook provides some […]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"acf":[],"yoast_head":"\nCISO Playbook: Protecting the Crown Jewels<\/title>\n<meta name=\"description\" content=\"Provides practical guidelines for enterprises to identify & maintain a tight list of high-value digital assets & develop a cyber resilience program\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-protecting-the-crown-jewels\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISO Playbook: Protecting the Crown Jewels\" \/>\n<meta property=\"og:description\" content=\"Building a cyber security strategy around high value digital assets. This CISO Playbook provides some practical guidelines for enterprises to identify and maintain a tight list of high-value digital assets and develop a highly focused cyber resilience program to maximise the value from cyber security investments and accelerate the strengthening of their cyber resilience posture.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-protecting-the-crown-jewels\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Leadership Institute\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/cyberleadershipinstitute\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-31T10:20:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/Playbook-PTCJ.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"620\" \/>\n\t<meta property=\"og:image:height\" content=\"351\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"CISO Playbook: Protecting the Crown Jewels\" \/>\n<meta name=\"twitter:description\" content=\"CISO Playbook:Protecting the Crown JewelsBuilding a cyber security strategy around high value digital assetsThis CISO Playbook provides some\" \/>\n<meta name=\"twitter:site\" content=\"@C_L_Institute\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-protecting-the-crown-jewels\/\",\"url\":\"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-protecting-the-crown-jewels\/\",\"name\":\"CISO Playbook: Protecting the Crown Jewels\",\"isPartOf\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-protecting-the-crown-jewels\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-protecting-the-crown-jewels\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/PhilZongo.jpg\",\"datePublished\":\"2021-01-27T00:08:00+00:00\",\"dateModified\":\"2023-05-31T10:20:00+00:00\",\"description\":\"Provides practical guidelines for enterprises to identify & maintain a tight list of high-value digital assets & develop a cyber resilience program\",\"breadcrumb\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-protecting-the-crown-jewels\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-protecting-the-crown-jewels\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-protecting-the-crown-jewels\/#primaryimage\",\"url\":\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/PhilZongo.jpg\",\"contentUrl\":\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/PhilZongo.jpg\",\"width\":300,\"height\":287},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-protecting-the-crown-jewels\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cyberleadershipinstitute.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISO Playbook: Protecting the Crown Jewels\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#website\",\"url\":\"https:\/\/cyberleadershipinstitute.com\/\",\"name\":\"Cyber Leadership Institute\",\"description\":\"Know You're Ready\",\"publisher\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyberleadershipinstitute.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#organization\",\"name\":\"Cyber Leadership Institute\",\"url\":\"https:\/\/cyberleadershipinstitute.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/2021\/03\/cropped-CLI-Favicon.jpg\",\"contentUrl\":\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/2021\/03\/cropped-CLI-Favicon.jpg\",\"width\":512,\"height\":512,\"caption\":\"Cyber Leadership Institute\"},\"image\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/cyberleadershipinstitute\",\"https:\/\/x.com\/C_L_Institute\",\"https:\/\/www.instagram.com\/cyber_leadership_institute\/\",\"https:\/\/www.linkedin.com\/school\/cyberleadershipinstitute\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"CISO Playbook: Protecting the Crown Jewels","description":"Provides practical guidelines for enterprises to identify & maintain a tight list of high-value digital assets & develop a cyber resilience program","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-protecting-the-crown-jewels\/","og_locale":"en_US","og_type":"article","og_title":"CISO Playbook: Protecting the Crown Jewels","og_description":"Building a cyber security strategy around high value digital assets. This CISO Playbook provides some practical guidelines for enterprises to identify and maintain a tight list of high-value digital assets and develop a highly focused cyber resilience program to maximise the value from cyber security investments and accelerate the strengthening of their cyber resilience posture.","og_url":"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-protecting-the-crown-jewels\/","og_site_name":"Cyber Leadership Institute","article_publisher":"https:\/\/facebook.com\/cyberleadershipinstitute","article_modified_time":"2023-05-31T10:20:00+00:00","og_image":[{"width":620,"height":351,"url":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/Playbook-PTCJ.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"CISO Playbook: Protecting the Crown Jewels","twitter_description":"CISO Playbook:Protecting the Crown JewelsBuilding a cyber security strategy around high value digital assetsThis CISO Playbook provides some","twitter_site":"@C_L_Institute","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-protecting-the-crown-jewels\/","url":"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-protecting-the-crown-jewels\/","name":"CISO Playbook: Protecting the Crown Jewels","isPartOf":{"@id":"https:\/\/cyberleadershipinstitute.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-protecting-the-crown-jewels\/#primaryimage"},"image":{"@id":"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-protecting-the-crown-jewels\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/PhilZongo.jpg","datePublished":"2021-01-27T00:08:00+00:00","dateModified":"2023-05-31T10:20:00+00:00","description":"Provides practical guidelines for enterprises to identify & maintain a tight list of high-value digital assets & develop a cyber resilience program","breadcrumb":{"@id":"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-protecting-the-crown-jewels\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberleadershipinstitute.com\/ciso-playbook-protecting-the-crown-jewels\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-protecting-the-crown-jewels\/#primaryimage","url":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/PhilZongo.jpg","contentUrl":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/PhilZongo.jpg","width":300,"height":287},{"@type":"BreadcrumbList","@id":"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-protecting-the-crown-jewels\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyberleadershipinstitute.com\/"},{"@type":"ListItem","position":2,"name":"CISO Playbook: Protecting the Crown Jewels"}]},{"@type":"WebSite","@id":"https:\/\/cyberleadershipinstitute.com\/#website","url":"https:\/\/cyberleadershipinstitute.com\/","name":"Cyber Leadership Institute","description":"Know You're Ready","publisher":{"@id":"https:\/\/cyberleadershipinstitute.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberleadershipinstitute.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyberleadershipinstitute.com\/#organization","name":"Cyber Leadership Institute","url":"https:\/\/cyberleadershipinstitute.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberleadershipinstitute.com\/#\/schema\/logo\/image\/","url":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/2021\/03\/cropped-CLI-Favicon.jpg","contentUrl":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/2021\/03\/cropped-CLI-Favicon.jpg","width":512,"height":512,"caption":"Cyber Leadership Institute"},"image":{"@id":"https:\/\/cyberleadershipinstitute.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/cyberleadershipinstitute","https:\/\/x.com\/C_L_Institute","https:\/\/www.instagram.com\/cyber_leadership_institute\/","https:\/\/www.linkedin.com\/school\/cyberleadershipinstitute\/"]}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"authorship-box-avatar":false,"authorship-box-related":false},"uagb_author_info":{"display_name":"anirtac arim","author_link":"https:\/\/cyberleadershipinstitute.com\/author\/cat\/"},"uagb_comment_info":0,"uagb_excerpt":"CISO Playbook: Protecting the Crown Jewels Building a cyber security strategy around high value digital assets This CISO Playbook provides some […]","_links":{"self":[{"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/pages\/17040"}],"collection":[{"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/comments?post=17040"}],"version-history":[{"count":24,"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/pages\/17040\/revisions"}],"predecessor-version":[{"id":38057,"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/pages\/17040\/revisions\/38057"}],"wp:attachment":[{"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/media?parent=17040"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}