Ramdan Hours:
Sun - Thu
9.30 AM - 2.30 PM
Iftar in --:--:--
🌙 Maghrib: --:--
Image from Google Jackets

Cybersecurity program development for business : the essential planning guide / Chris Moschovitis.

By: Material type: TextTextPublisher: Hoboken, New Jersey : Wiley, [2018]Copyright date: ©2018Description: xvi, 206 pages : illustartions ; 25 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781119429517 (hardback)
Subject(s): Additional physical formats: Online version:: Cybersecurity program development for businessDDC classification:
  • 658.478 23 M.C.C
LOC classification:
  • HD30.2 .M674 2018
Other classification:
  • BUS070030
Contents:
Foreword vii Preface xi About The Author xiii Acknowledgments xv CHAPTER 1 Understanding Risk 1 CHAPTER 2 Everything You Always Wanted to Know About Tech (But Were Afraid to Ask Your Kids) 9 CHAPTER 3 A Cybersecurity Primer 15 CHAPTER 4 Management, Governance, and Alignment 47 CHAPTER 5 Your Cybersecurity Program: A High-Level Overview 67 CHAPTER 6 Assets 81 CHAPTER 7 Threats 95 CHAPTER 8 Vulnerabilities 105 CHAPTER 9 Environments 113 CHAPTER 10 Controls 131 CHAPTER 11 Incident-Response Planning 147 CHAPTER 12 People 163 CHAPTER 13 Living Cybersecure! 175 Bibliography 187 Appendix: Clear And Present Danger 195 Index 199
Summary: "Get answers to all your cybersecurity questions In 2016, we reached a tipping point—a moment where the global and local implications of cybersecurity became undeniable. Despite the seriousness of the topic, the term "cybersecurity" still exasperates many people. They feel terrorized and overwhelmed. The majority of business people have very little understanding of cybersecurity, how to manage it, and what's really at risk. This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles and responsibilities, this book walks the reader through each step of developing and implementing a cybersecurity program. Read cover-to-cover, it’s a thorough overview, but it can also function as a useful reference book as individual questions and difficulties arise. Unlike other cybersecurity books, the text is not bogged down with industry jargon Speaks specifically to the executive who is not familiar with the development or implementation of cybersecurity programs Shows you how to make pragmatic, rational, and informed decisions for your organization Written by a top-flight technologist with decades of experience and a track record of success If you’re a business manager or executive who needs to make sense of cybersecurity, this book demystifies it for you. "-- Provided by publisher.Summary: "This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles and responsibilities, this book walks the reader through each step of developing and implementing a cybersecurity program. Read cover-to-cover, it's a thorough overview, but it can also function as a useful reference book as individual questions and difficulties arise"-- Provided by publisher.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Copy number Status Date due Barcode
Books Books Main library B7 Computers & Information Technology ( Information systems ) 658.478 M.C.C (Browse shelf(Opens below)) 1 Available 00015742

Includes bibliographical references (pages 187-193) and index.

Foreword vii Preface xi About The Author xiii Acknowledgments xv CHAPTER 1 Understanding Risk 1 CHAPTER 2 Everything You Always Wanted to Know About Tech (But Were Afraid to Ask Your Kids) 9 CHAPTER 3 A Cybersecurity Primer 15 CHAPTER 4 Management, Governance, and Alignment 47 CHAPTER 5 Your Cybersecurity Program: A High-Level Overview 67 CHAPTER 6 Assets 81 CHAPTER 7 Threats 95 CHAPTER 8 Vulnerabilities 105 CHAPTER 9 Environments 113 CHAPTER 10 Controls 131 CHAPTER 11 Incident-Response Planning 147 CHAPTER 12 People 163 CHAPTER 13 Living Cybersecure! 175 Bibliography 187 Appendix: Clear And Present Danger 195 Index 199

"Get answers to all your cybersecurity questions In 2016, we reached a tipping point—a moment where the global and local implications of cybersecurity became undeniable. Despite the seriousness of the topic, the term "cybersecurity" still exasperates many people. They feel terrorized and overwhelmed. The majority of business people have very little understanding of cybersecurity, how to manage it, and what's really at risk. This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles and responsibilities, this book walks the reader through each step of developing and implementing a cybersecurity program. Read cover-to-cover, it’s a thorough overview, but it can also function as a useful reference book as individual questions and difficulties arise. Unlike other cybersecurity books, the text is not bogged down with industry jargon Speaks specifically to the executive who is not familiar with the development or implementation of cybersecurity programs Shows you how to make pragmatic, rational, and informed decisions for your organization Written by a top-flight technologist with decades of experience and a track record of success If you’re a business manager or executive who needs to make sense of cybersecurity, this book demystifies it for you. "-- Provided by publisher.

"This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles and responsibilities, this book walks the reader through each step of developing and implementing a cybersecurity program. Read cover-to-cover, it's a thorough overview, but it can also function as a useful reference book as individual questions and difficulties arise"-- Provided by publisher.

There are no comments on this title.

to post a comment.