000 03486nmm a22003257a 4500
003 OSt
005 20240812095340.0
008 240812b |||||||| |||| 00| 0 eng d
020 _a9781804616741 (e-book)
040 _cCavite State University - Main Campus Library
_erda
041 _aeng
050 _aQA76.9
_bA25 B81 2023
100 _aBrown, Jason
_947909
_eauthor
245 _aExecutive's cybersecurity program handbook :
_ba comprehensive guide to building and operationalizing a complete cybersecurity program /
_cby Jason Brown
260 _a Birmingham :
_bPackt Publishing, Limited ,
_c2023
300 _a1 online resource (232, pages) :
_bcolor illustrations.
336 _2rdacontent
_atext
337 _2rdamedia
_acomputer
338 _2rdacarrier
_aonline resource
500 _ahttps://portal.igpublish.com/iglibrary/ is required to read this e-book.
504 _aIncludes index
505 _aPart 1. Getting your program off the ground -- 1. The first 90 days -- 2. Choosing the right cybersecurity framework -- 3. Cybersecurity strategic planning through the assessment process -- Part 2. Administrative cybersecurity controls -- 4. Establishing governance through policy -- 5. The security team -- 6. Risk management -- 7. Incident response -- 8. Security awareness and training -- 3. Technical controls -- 9. Network security -- 10. Computer and server security -- 11. Securing software development through DevSecOps --12. Testing your security and building metrics
520 _ansomware, phishing, and data breaches are major concerns affecting all organizations as a new cyber threat seems to emerge every day, making it paramount to protect the security of your organization and be prepared for potential cyberattacks. This book will ensure that you can build a reliable cybersecurity framework to keep your organization safe from cyberattacks. This Executive’s Cybersecurity Program Handbook explains the importance of executive buy-in, mission, and vision statement of the main pillars of security program (governance, defence, people and innovation). You’ll explore the different types of cybersecurity frameworks, how they differ from one another, and how to pick the right framework to minimize cyber risk. As you advance, you’ll perform an assessment against the NIST Cybersecurity Framework, which will help you evaluate threats to your organization by identifying both internal and external vulnerabilities. Toward the end, you’ll learn the importance of standard cybersecurity policies, along with concepts of governance, risk, and compliance, and become well-equipped to build an effective incident response team. By the end of this book, you’ll have gained a thorough understanding of how to build your security program from scratch as well as the importance of implementing administrative and technical security controls.
541 _aFund 164
_bCE-Logic
_cPurchased
_dFebruary 19, 2024
_eOEBP000453
_fP. Roderno
_hPHP 5,586.00
_p2024-02-0124
_q2024-1-113
650 0 _aComputer security
_91768
650 0 _aBusiness
_92849
_xData processing
856 _uhttps://portal.igpublish.com/iglibrary/obj/PACKT0006579?searchid=1720055929622_n3bGJhdSMJEBT4IorQGN
_yClick here to read Full-Text E-Book
856 _uhttps://docs.google.com/forms/d/e/1FAIpQLSfSoAj3qM4b_ttQMZLuimqgwkfHDH1NyJ7S4eyjHD7Vr4j7EQ/viewform
_yLog-in to the website is required to read this e-book. Click here to request access.
942 _2lcc
_cOEB
999 _c64481
_d64481