Local cover image
Local cover image
Amazon cover image
Image from Amazon.com

Executive's cybersecurity program handbook : a comprehensive guide to building and operationalizing a complete cybersecurity program / by Jason Brown

By: Material type: Computer fileComputer fileLanguage: English Publication details: Birmingham : Packt Publishing, Limited , 2023Description: 1 online resource (232, pages) : color illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781804616741 (e-book)
Subject(s): LOC classification:
  • QA76.9 A25 B81 2023
Online resources:
Contents:
Part 1. Getting your program off the ground -- 1. The first 90 days -- 2. Choosing the right cybersecurity framework -- 3. Cybersecurity strategic planning through the assessment process -- Part 2. Administrative cybersecurity controls -- 4. Establishing governance through policy -- 5. The security team -- 6. Risk management -- 7. Incident response -- 8. Security awareness and training -- 3. Technical controls -- 9. Network security -- 10. Computer and server security -- 11. Securing software development through DevSecOps --12. Testing your security and building metrics
Summary: nsomware, phishing, and data breaches are major concerns affecting all organizations as a new cyber threat seems to emerge every day, making it paramount to protect the security of your organization and be prepared for potential cyberattacks. This book will ensure that you can build a reliable cybersecurity framework to keep your organization safe from cyberattacks. This Executive’s Cybersecurity Program Handbook explains the importance of executive buy-in, mission, and vision statement of the main pillars of security program (governance, defence, people and innovation). You’ll explore the different types of cybersecurity frameworks, how they differ from one another, and how to pick the right framework to minimize cyber risk. As you advance, you’ll perform an assessment against the NIST Cybersecurity Framework, which will help you evaluate threats to your organization by identifying both internal and external vulnerabilities. Toward the end, you’ll learn the importance of standard cybersecurity policies, along with concepts of governance, risk, and compliance, and become well-equipped to build an effective incident response team. By the end of this book, you’ll have gained a thorough understanding of how to build your security program from scratch as well as the importance of implementing administrative and technical security controls.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Materials specified Status Notes Date due Barcode
Online E-Books Online E-Books Ladislao N. Diwa Memorial Library Multimedia Section Non-fiction OEBP QA76.9.A25 B81 2023 (Browse shelf(Opens below)) Available PAV OEBP000453
Compact Discs Compact Discs Ladislao N. Diwa Memorial Library Multimedia Section Non-fiction EB QA76.9.A25 B81 2023 (Browse shelf(Opens below)) Room use only PAV CD0001382

https://portal.igpublish.com/iglibrary/ is required to read this e-book.

Includes index

Part 1. Getting your program off the ground -- 1. The first 90 days -- 2. Choosing the right cybersecurity framework -- 3. Cybersecurity strategic planning through the assessment process -- Part 2. Administrative cybersecurity controls
-- 4. Establishing governance through policy -- 5. The security team -- 6. Risk management -- 7. Incident response -- 8. Security awareness and training -- 3. Technical controls -- 9. Network security -- 10. Computer and server security --
11. Securing software development through DevSecOps --12. Testing your security and building metrics

nsomware, phishing, and data breaches are major concerns affecting all organizations as a new cyber threat seems to emerge every day, making it paramount to protect the security of your organization and be prepared for potential cyberattacks. This book will ensure that you can build a reliable cybersecurity framework to keep your organization safe from cyberattacks. This Executive’s Cybersecurity Program Handbook explains the importance of executive buy-in, mission, and vision statement of the main pillars of security program (governance, defence, people and innovation). You’ll explore the different types of cybersecurity frameworks, how they differ from one another, and how to pick the right framework to minimize cyber risk. As you advance, you’ll perform an assessment against the NIST Cybersecurity Framework, which will help you evaluate threats to your organization by identifying both internal and external vulnerabilities. Toward the end, you’ll learn the importance of standard cybersecurity policies, along with concepts of governance, risk, and compliance, and become well-equipped to build an effective incident response team. By the end of this book, you’ll have gained a thorough understanding of how to build your security program from scratch as well as the importance of implementing administrative and technical security controls.

Fund 164 CE-Logic Purchased February 19, 2024 OEBP000453
P. Roderno PHP 5,586.00
2024-02-0124 2024-1-113

Click on an image to view it in the image viewer

Local cover image
Copyright © 2024. Cavite State University | Koha 23.05