I myself am a CISO and have long been a fan of the Desk Reference Guides so I had to get this book when it was released.Any CISO who has worked with CIOs, CEOs, CFOs or a board of directors knows that there is a good bit of teaching that goes along with your role. This is primarily due to the highly technical space the CISO operates in daily and the other executives on the leadership teams generally are not as technical.Bottom Line:➙ If you're a security executive, this book should be slipped into your superior's hands (CIO/CEO/Board), gifted as stocking stuffer - whatever you need to do to get it into the hands of the folks who would benefit the most of "getting" what it is you do.➙ If you're an executive who has a security team reporting to you or a CISO colleague you work with, do yourself a favor and grab this book. You'll walk away with a clear understanding of just how your security leadership is protecting your company's revenue and securing your future.➙Last, if you're a recruiter who is responsible for placing executive level cyber roles, this book will give you some great insight into what makes a great CISO.Some high level topics that brought a lot of value to me:▣ Cyber Insurance. While I'm keenly aware of working with underwriters and producing evidence of our controls, policies and procedures, this book clearly laid out the types of coverage, riders and things to look for when embarking on the path of renewing cyber insurance. Very helpful!▣ The way the authors broke down and dissected third-party risk management (TPRM) was salient. If I had a nickel for the times I've been asked, "Why does the vendor's security matter to me? Why should we care?"...▣ "Inspect what you expect" in terms of contracts. The authors rightly point out that if you negotiated for the right to audit (for example) in a contract, be sure to actually audit the vendor!▣ Don't abdicate policy writing to just be compliant and "check the box". Many of us have spent hours/weeks/months/years in totality writing policies or procedures and know that it can become tempting to phone it in with recycled text. Great reminder to validate your policies/procedures are truthful, followed, supported by leadership and audited for accountability.▣ The talent section of the book was fantastic...I love the quote, "affinity is a better predictor than efficiency" in regards to talent. People who are passionate and gifted at a role are the folks we should be hiring. Additionally, the NICE 800-181 resource was a nice little bonus that I haven't previously used but it ties roles in cybersecurity to the NIST 800-53 framework.▣ Lastly, the final chapter on the board interaction with the CISO was helpful to see both sides of the table.You won’t be disappointed with this primer!