Developing Cybersecurity Programs and Policies

Paperback Engels 2018 9780789759405
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

This book is a complete guide to establishing a cybersecurity program and governance in your organisation. In this book, you will learn how to create cybersecurity policies, standards, procedures, guidelines, and plans —and the differences among them. This book covers the Confidentiality, Integrity & Availability (CIA) security model. You will also learn how threat actors are launching attacks against their victims compromising confidentiality, integrity, and availability of systems and networks. This book covers the NIST Cybersecurity Framework and ISO/IEC 27000-series standards. You will learn how to align security with business strategy, as well as define, inventory, and classify your information and systems.

This book teaches you how to systematically identify, prioritise, and manage cybersecurity risks and reduce social engineering (human) risks with role-based Security Education, Awareness, and Training (SETA). You will also learn how to implement effective physical, environmental, communications, and operational security; and effectively manage access control. In this book you will learn how to respond to incidents and ensure continuity of operations and how to comply with laws and regulations, including GLBA, HIPAA/HITECH, FISMA, state data security and notification rules, and PCI DSS.

Specificaties

ISBN13:9780789759405
Taal:Engels
Bindwijze:Paperback

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

<ul> <li>Chapter 1. Understanding Cybersecurity Policy and Governance </li> <li>Chapter 2. Cybersecurity Policy Organization, Format and Styles </li> <li>Chapter 3. Cybersecurity Framework </li> <li>Chapter 4. Governance and Risk Management </li> <li>Chapter 5. Asset Management and Data Loss Prevention </li> <li>Chapter 6. Human Resources Security </li> <li>Chapter 7. Physical and Environmental Security </li> <li>Chapter 8. Communications and Operations Security </li> <li>Chapter 9. Access Control Management </li> <li>Chapter 10. Information Systems Acquisition, Development, and Maintenance </li> <li>Chapter 11. Cybersecurity Incident Response </li> <li>Chapter 12. Business Continuity Management </li> <li>Chapter 13. Regulatory Compliance for Financial Institutions</li> <li>Chapter 14. Regulatory Compliance for the Healthcare Sector </li> <li>Chapter 15. PCI Compliance for Merchants </li> <li>Appendix A. Information Security Program Resources </li> <li>Appendix B. Sample Information Security Policy </li> <li>Appendix C. Information Systems Acceptable Use Agreement and Policy</li> </ul>

Managementboek Top 100

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        Developing Cybersecurity Programs and Policies