MbrlCatalogueTitleDetail

Do you wish to reserve the book?
Cybersecurity Program Development for Businesses
Cybersecurity Program Development for Businesses
Hey, we have placed the reservation for you!
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Cybersecurity Program Development for Businesses
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Title added to your shelf!
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Cybersecurity Program Development for Businesses
Cybersecurity Program Development for Businesses

Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
How would you like to get it?
We have requested the book for you! Sorry the robot delivery is not available at the moment
We have requested the book for you!
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Cybersecurity Program Development for Businesses
Cybersecurity Program Development for Businesses
Book

Cybersecurity Program Development for Businesses

2018
Request Book From Autostore and Choose the Collection Method
Overview
Intro -- TITLE PAGE -- TABLE OF CONTENTS -- FOREWORD -- PREFACE -- Something Completely Different -- ABOUT THE AUTHOR -- ACKNOWLEDGMENTS -- CHAPTER 1: Understanding Risk -- How Much Is It Worth to You? -- Risk! Not Just a Board Game -- CHAPTER 2: Everything You Always Wanted to Know About Tech (But Were Afraid to Ask Your Kids) -- In the Beginning… -- Key Definitions -- Note -- CHAPTER 3: A Cybersecurity Primer -- Cybersecurity Defined -- The Meaning of Security -- Measuring Cybersecurity's Success -- Deter, Identify, Protect, Detect, Respond -- Cybersecurity Controls and Defense in Depth -- Defense in Depth -- The Threats -- Threat Agents -- Key Trends Influencing Threat Agents -- The Nature of Hackers -- Attack Process -- Types of Attacks -- A Brief Cyberglossary of Terms -- CHAPTER 4: Management, Governance, and Alignment -- Why Governance Matters -- Strategy, Steering, and Standards -- Critical Success Factors -- CHAPTER 5: Your Cybersecurity Program: A High‐Level Overview -- Vision and Mission Statements -- Culture and Strategy -- Off to See the Wizard -- What's at Risk? -- Threat Assessment -- At the Club House Turn! -- Mitigating Risk -- Incident‐Response Planning -- CHAPTER 6: Assets -- Asset Classification -- Asset Metadata -- Business‐Impact Analysis -- One Spreadsheet to Rule Them All -- CHAPTER 7: Threats -- Types of Threats -- Threat Rankings -- Threat Intelligence -- Threat Modeling -- CHAPTER 8: Vulnerabilities -- Who Is Who in Vulnerabilities Tracking -- Zero‐Day Exploits -- Vulnerabilities Mapping -- Vulnerability Testing -- Prioritizing Vulnerability Remediation -- CHAPTER 9: Environments -- On‐Premises (Onsite) Computing Environments -- Private‐Cloud Computing Environments -- Public‐Cloud Computing Environments -- Hybrid‐Cloud Computing Environments -- The Internet of Things (IoT) -- Distributed Workforces
Publisher
John Wiley & Sons, Incorporated
ISBN
9781119430001, 1119430003