Executive's cybersecurity program handbook : a comprehensive guide to building and operationalizing a complete cybersecurity program /

Brown, Jason

Executive's cybersecurity program handbook : a comprehensive guide to building and operationalizing a complete cybersecurity program / by Jason Brown - Birmingham : Packt Publishing, Limited , 2023 - 1 online resource (232, pages) : color illustrations.

https://portal.igpublish.com/iglibrary/ is required to read this e-book.

Includes index


Part 1. Getting your program off the ground -- 1. The first 90 days -- 2. Choosing the right cybersecurity framework -- 3. Cybersecurity strategic planning through the assessment process -- Part 2. Administrative cybersecurity controls
-- 4. Establishing governance through policy -- 5. The security team -- 6. Risk management -- 7. Incident response -- 8. Security awareness and training -- 3. Technical controls -- 9. Network security -- 10. Computer and server security --
11. Securing software development through DevSecOps --12. Testing your security and building metrics

nsomware, phishing, and data breaches are major concerns affecting all organizations as a new cyber threat seems to emerge every day, making it paramount to protect the security of your organization and be prepared for potential cyberattacks. This book will ensure that you can build a reliable cybersecurity framework to keep your organization safe from cyberattacks. This Executive’s Cybersecurity Program Handbook explains the importance of executive buy-in, mission, and vision statement of the main pillars of security program (governance, defence, people and innovation). You’ll explore the different types of cybersecurity frameworks, how they differ from one another, and how to pick the right framework to minimize cyber risk. As you advance, you’ll perform an assessment against the NIST Cybersecurity Framework, which will help you evaluate threats to your organization by identifying both internal and external vulnerabilities. Toward the end, you’ll learn the importance of standard cybersecurity policies, along with concepts of governance, risk, and compliance, and become well-equipped to build an effective incident response team. By the end of this book, you’ll have gained a thorough understanding of how to build your security program from scratch as well as the importance of implementing administrative and technical security controls.

9781804616741 (e-book)


Computer security
Business--Data processing

QA76.9 / A25 B81 2023
Copyright © 2024. Cavite State University | Koha 23.05