000 | 03486nmm a22003257a 4500 | ||
---|---|---|---|
003 | OSt | ||
005 | 20240812095340.0 | ||
008 | 240812b |||||||| |||| 00| 0 eng d | ||
020 | _a9781804616741 (e-book) | ||
040 |
_cCavite State University - Main Campus Library _erda |
||
041 | _aeng | ||
050 |
_aQA76.9 _bA25 B81 2023 |
||
100 |
_aBrown, Jason _947909 _eauthor |
||
245 |
_aExecutive's cybersecurity program handbook : _ba comprehensive guide to building and operationalizing a complete cybersecurity program / _cby Jason Brown |
||
260 |
_a Birmingham : _bPackt Publishing, Limited , _c2023 |
||
300 |
_a1 online resource (232, pages) : _bcolor illustrations. |
||
336 |
_2rdacontent _atext |
||
337 |
_2rdamedia _acomputer |
||
338 |
_2rdacarrier _aonline resource |
||
500 | _ahttps://portal.igpublish.com/iglibrary/ is required to read this e-book. | ||
504 | _aIncludes index | ||
505 | _aPart 1. Getting your program off the ground -- 1. The first 90 days -- 2. Choosing the right cybersecurity framework -- 3. Cybersecurity strategic planning through the assessment process -- Part 2. Administrative cybersecurity controls -- 4. Establishing governance through policy -- 5. The security team -- 6. Risk management -- 7. Incident response -- 8. Security awareness and training -- 3. Technical controls -- 9. Network security -- 10. Computer and server security -- 11. Securing software development through DevSecOps --12. Testing your security and building metrics | ||
520 | _ansomware, phishing, and data breaches are major concerns affecting all organizations as a new cyber threat seems to emerge every day, making it paramount to protect the security of your organization and be prepared for potential cyberattacks. This book will ensure that you can build a reliable cybersecurity framework to keep your organization safe from cyberattacks. This Executive’s Cybersecurity Program Handbook explains the importance of executive buy-in, mission, and vision statement of the main pillars of security program (governance, defence, people and innovation). You’ll explore the different types of cybersecurity frameworks, how they differ from one another, and how to pick the right framework to minimize cyber risk. As you advance, you’ll perform an assessment against the NIST Cybersecurity Framework, which will help you evaluate threats to your organization by identifying both internal and external vulnerabilities. Toward the end, you’ll learn the importance of standard cybersecurity policies, along with concepts of governance, risk, and compliance, and become well-equipped to build an effective incident response team. By the end of this book, you’ll have gained a thorough understanding of how to build your security program from scratch as well as the importance of implementing administrative and technical security controls. | ||
541 |
_aFund 164 _bCE-Logic _cPurchased _dFebruary 19, 2024 _eOEBP000453 _fP. Roderno _hPHP 5,586.00 _p2024-02-0124 _q2024-1-113 |
||
650 | 0 |
_aComputer security _91768 |
|
650 | 0 |
_aBusiness _92849 _xData processing |
|
856 |
_uhttps://portal.igpublish.com/iglibrary/obj/PACKT0006579?searchid=1720055929622_n3bGJhdSMJEBT4IorQGN _yClick here to read Full-Text E-Book |
||
856 |
_uhttps://docs.google.com/forms/d/e/1FAIpQLSfSoAj3qM4b_ttQMZLuimqgwkfHDH1NyJ7S4eyjHD7Vr4j7EQ/viewform _yLog-in to the website is required to read this e-book. Click here to request access. |
||
942 |
_2lcc _cOEB |
||
999 |
_c64481 _d64481 |