๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Building an Effective Security Program

โœ Scribed by Chris K. Williams; Scott E. Donaldson; Stanley G. Siegel


Publisher
De Gruyter
Year
2020
Tongue
English
Leaves
446
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Building an Effective Security Program provides readers with a comprehensive approach to securing the IT systems in use at their organizations. This book provides information on how to structure and operate an effective cybersecurity program that includes people, processes, technologies, security awareness, and training. This program will establish and maintain effective security protections for the confidentiality, availability, and integrity of organization information. In this book, the authors take a pragmatic approach to building organization cyberdefenses that are effective while also remaining affordable.

This book is intended for business leaders, IT professionals, cybersecurity personnel, educators, and students interested in deploying real-world cyberdefenses against todayโ€™s persistent and sometimes devastating cyberattacks. It includes detailed explanation of the following IT security topics:

  • IT Security Mindsetโ€”Think like an IT security professional, and consider how your IT environment can be defended against potential cyberattacks.
  • Risk Managementโ€”Identify the assets, vulnerabilities and threats that drive IT risk, along with the controls that can be used to mitigate such risk.
  • Effective Cyberdefenseโ€”Consider the components of an effective organization cyberdefense to successfully protect computers, devices, networks, accounts, applications and data.
  • Cyber Operationsโ€”Operate cyberdefense capabilities and controls so that assets are protected, and intruders can be detected and repelled before significant damage can be done.
  • IT Security Awareness and Trainingโ€”Promote effective cybersecurity practices at work, on travel, and at home, among your organizationโ€™s business leaders, IT professionals, and staff.
  • Resilient IT Securityโ€”Implement, operate, monitor, assess, and improve your cybersecurity program on an ongoing basis to defend against the cyber threats of today and the future.

Building an Effective Security Program:

-Uses everyday language to de-mystify the subject.

-Along with experience, helps to reduce common risks.

-Outlines how to protect the confidentiality, availability, and integrity of company information.

โœฆ Table of Contents


Acknowledgments
About the Authors
Contents
Introduction
Chapter 1. The Digital Organization
Chapter 2. Ever-Present Cyber Threats
Chapter 3. Cyber Risk Management
Chapter 4. Cyberdefense Concepts
Chapter 5. Cybersecurity Drivers
Chapter 6. Cyber Program Management
Chapter 7. Cybersecurity Capabilities
Chapter 8. Cybersecurity Operations
Chapter 9. Cyber Awareness
Chapter 10. Organization Cyber Awareness
Chapter 11. Cyber Training
Chapter 12. Measuring Cyber Performance
Chapter 13. When Things Go Wrong
Chapter 14. Looking to the Future
Appendix A: Common Malware Threats
Appendix B: Cyber Awareness and Cyber Training Topics
Appendix C: Example Cyber Policy
Appendix D: Online Cybersecurity Resources
Glossary
Index


๐Ÿ“œ SIMILAR VOLUMES


Building an Effective Security Program
โœ Chris K. Williams; Scott E. Donaldson; Stanley G. Siegel ๐Ÿ“‚ Library ๐Ÿ“… 2020 ๐Ÿ› De Gruyter ๐ŸŒ English

<p><em>Building an Effective Security Program</em> provides readers with a comprehensive approach to securing the IT systems in use at their organizations. This book provides information on how to structure and operate an effective cybersecurity program that includes people, processes, technologies,

Building an Effective Security Program f
โœ Mariana Hentea ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› Wiley ๐ŸŒ English

<b>Building an Effective Security Program for Distributed Energy Resources and Systems</b> <p><b>Build a critical and effective security program for DERs</b></p><p><i>Building an Effective Security Program for Distributed Energy Resources and Systems</i> requires a unified approach to establishing a

Building an Information Security Awarene
โœ Mark B. Desman ๐Ÿ“‚ Library ๐Ÿ“… 2001 ๐ŸŒ English

In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't kno

Building an Intelligence-Led Security Pr
โœ Allan Liska ๐Ÿ“‚ Library ๐Ÿ“… 2014 ๐Ÿ› Syngress ๐ŸŒ English

<p>As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective.</p><p>Tod