000 03657cam a2200277zu 4500
001 88946457
003 FRCYB88946457
005 20250108002355.0
006 m o d
007 cr un
008 250108s2023 fr | o|||||0|0|||eng d
020 _a9781804619230
035 _aFRCYB88946457
040 _aFR-PaCSA
_ben
_c
_erda
100 1 _aBrown, Jason
245 0 1 _aExecutive’s Cybersecurity Program Handbook
_bA comprehensive guide to building and operationalizing a complete cybersecurity program
_c['Brown, Jason']
264 1 _bPackt Publishing
_c2023
300 _a p.
336 _btxt
_2rdacontent
337 _bc
_2rdamdedia
338 _bc
_2rdacarrier
650 0 _a
700 0 _aBrown, Jason
856 4 0 _2Cyberlibris
_uhttps://international.scholarvox.com/netsen/book/88946457
_qtext/html
_a
520 _aDevelop strategic plans for building cybersecurity programs and prepare your organization for compliance investigations and auditsKey FeaturesGet started as a cybersecurity executive and design an infallible security programPerform assessments and build a strong risk management frameworkPromote the importance of security within the organization through awareness and training sessionsBook DescriptionRansomware, phishing, and data breaches are major concerns affecting all organizations as a new cyber threat seems to emerge every day, making it paramount to protect the security of your organization and be prepared for potential cyberattacks. This book will ensure that you can build a reliable cybersecurity framework to keep your organization safe from cyberattacks. This Executive’s Cybersecurity Program Handbook explains the importance of executive buy-in, mission, and vision statement of the main pillars of security program (governance, defence, people and innovation). You’ll explore the different types of cybersecurity frameworks, how they differ from one another, and how to pick the right framework to minimize cyber risk. As you advance, you’ll perform an assessment against the NIST Cybersecurity Framework, which will help you evaluate threats to your organization by identifying both internal and external vulnerabilities. Toward the end, you’ll learn the importance of standard cybersecurity policies, along with concepts of governance, risk, and compliance, and become well-equipped to build an effective incident response team. By the end of this book, you’ll have gained a thorough understanding of how to build your security program from scratch as well as the importance of implementing administrative and technical security controls.What you will learnExplore various cybersecurity frameworks such as NIST and ISOImplement industry-standard cybersecurity policies and procedures effectively to minimize the risk of cyberattacksFind out how to hire the right talent for building a sound cybersecurity team structureUnderstand the difference between security awareness and trainingExplore the zero-trust concept and various firewalls to secure your environmentHarden your operating system and server to enhance the securityPerform scans to detect vulnerabilities in softwareWho this book is forThis book is for you if you are a newly appointed security team manager, director, or C-suite executive who is in the transition stage or new to the information security field and willing to empower yourself with the required knowledge. As a Cybersecurity professional, you can use this book to deepen your knowledge and understand your organization's overall security posture. Basic knowledge of information security or governance, risk, and compliance is required.
999 _c77657
_d77657