-
Book Overview & Buying
-
Table Of Contents
Executive's Cybersecurity Program Handbook
By :
Executive's Cybersecurity Program Handbook
By:
Overview of this book
Ransomware, phishing, and data breaches are major concerns affecting all organizations as a new cyber threat seems to emerge every day, making it paramount to protect the security of your organization and be prepared for potential cyberattacks. This book will ensure that you can build a reliable cybersecurity framework to keep your organization safe from cyberattacks.
This Executive’s Cybersecurity Program Handbook explains the importance of executive buy-in, mission, and vision statement of the main pillars of security program (governance, defence, people and innovation). You’ll explore the different types of cybersecurity frameworks, how they differ from one another, and how to pick the right framework to minimize cyber risk. As you advance, you’ll perform an assessment against the NIST Cybersecurity Framework, which will help you evaluate threats to your organization by identifying both internal and external vulnerabilities. Toward the end, you’ll learn the importance of standard cybersecurity policies, along with concepts of governance, risk, and compliance, and become well-equipped to build an effective incident response team.
By the end of this book, you’ll have gained a thorough understanding of how to build your security program from scratch as well as the importance of implementing administrative and technical security controls.
Table of Contents (18 chapters)
Preface
Part 1 – Getting Your Program Off the Ground
Chapter 1: The First 90 Days
Chapter 2: Choosing the Right Cybersecurity Framework
Chapter 3: Cybersecurity Strategic Planning through the Assessment Process
Part 2 – Administrative Cybersecurity Controls
Chapter 4: Establishing Governance through Policy
Chapter 5: The Security Team
Chapter 6: Risk Management
Chapter 7: Incident Response
Chapter 8: Security Awareness and Training
Part 3 – Technical Controls
Chapter 9: Network Security
Chapter 10: Computer and Server Security
Chapter 11: Securing Software Development through DevSecOps
Chapter 12: Testing Your Security and Building Metrics
Index