000 04291cam a2200421 i 4500
999 _c12348
_d12348
001 20382927
005 20210317141413.0
008 180301s2018 njua b 001 0 eng d
010 _a 2017058958
020 _a9781119429517 (hardback)
040 _aEG-NcFUE
_beng
_cDLC
_erda
_dDLC
_dEG-NcFUE
042 _apcc
050 0 0 _aHD30.2
_b.M674 2018
082 0 0 _a658.478
_223
_bM.C.C
084 _aBUS070030
_2bisacsh
100 1 _aMoschovitis, Christos J. P.,
_eauthor.
245 1 0 _aCybersecurity program development for business :
_bthe essential planning guide /
_cChris Moschovitis.
264 1 _aHoboken, New Jersey :
_bWiley,
_c[2018]
264 4 _c©2018
300 _axvi, 206 pages :
_billustartions ;
_c25 cm
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
504 _aIncludes bibliographical references (pages 187-193) and index.
505 0 _aForeword vii Preface xi About The Author xiii Acknowledgments xv CHAPTER 1 Understanding Risk 1 CHAPTER 2 Everything You Always Wanted to Know About Tech (But Were Afraid to Ask Your Kids) 9 CHAPTER 3 A Cybersecurity Primer 15 CHAPTER 4 Management, Governance, and Alignment 47 CHAPTER 5 Your Cybersecurity Program: A High-Level Overview 67 CHAPTER 6 Assets 81 CHAPTER 7 Threats 95 CHAPTER 8 Vulnerabilities 105 CHAPTER 9 Environments 113 CHAPTER 10 Controls 131 CHAPTER 11 Incident-Response Planning 147 CHAPTER 12 People 163 CHAPTER 13 Living Cybersecure! 175 Bibliography 187 Appendix: Clear And Present Danger 195 Index 199
520 _a"Get answers to all your cybersecurity questions In 2016, we reached a tipping point—a moment where the global and local implications of cybersecurity became undeniable. Despite the seriousness of the topic, the term "cybersecurity" still exasperates many people. They feel terrorized and overwhelmed. The majority of business people have very little understanding of cybersecurity, how to manage it, and what's really at risk. This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles and responsibilities, this book walks the reader through each step of developing and implementing a cybersecurity program. Read cover-to-cover, it’s a thorough overview, but it can also function as a useful reference book as individual questions and difficulties arise. Unlike other cybersecurity books, the text is not bogged down with industry jargon Speaks specifically to the executive who is not familiar with the development or implementation of cybersecurity programs Shows you how to make pragmatic, rational, and informed decisions for your organization Written by a top-flight technologist with decades of experience and a track record of success If you’re a business manager or executive who needs to make sense of cybersecurity, this book demystifies it for you. "--
_cProvided by publisher.
520 _a"This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles and responsibilities, this book walks the reader through each step of developing and implementing a cybersecurity program. Read cover-to-cover, it's a thorough overview, but it can also function as a useful reference book as individual questions and difficulties arise"--
_cProvided by publisher.
650 0 _aInformation technology
_xManagement.
650 0 _aBusiness enterprises
_xComputer programs.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aComputer industry.
650 7 _aBUSINESS & ECONOMICS / Industries / Computer Industry.
_2bisacsh
776 0 8 _iOnline version:
_aMoschovitis, Christos J. P., author.
_tCybersecurity program development for business
_dHoboken : Wiley, 2018
_z9781119430056
_w(DLC) 2018015364
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2ddc
_cBK