Cyber Strategy: Risk-Driven Security and Resiliency
Autor Carol A. Siegel, Mark Sweeneyen Limba Engleză Hardback – 7 apr 2020
Tools utilized include:
- Key Risk Indicators (KRI) and Key Performance Indicators (KPI)
- National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF) Target State Maturity interval mapping per initiative
- Comparisons of current and target state business goals and critical success factors
- A quantitative NIST-based risk assessment of initiative technology components
- Responsible, Accountable, Consulted, Informed (RACI) diagrams for Cyber Steering Committee tasks and Governance Boards’ approval processes
- Swimlanes, timelines, data flow diagrams (inputs, resources, outputs), progress report templates, and Gantt charts for project management
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 212.44 lei 6-8 săpt. | +61.13 lei 7-13 zile |
CRC Press – 7 apr 2020 | 212.44 lei 6-8 săpt. | +61.13 lei 7-13 zile |
Hardback (1) | 559.21 lei 6-8 săpt. | |
CRC Press – 7 apr 2020 | 559.21 lei 6-8 săpt. |
Preț: 559.21 lei
Preț vechi: 817.73 lei
-32% Nou
Puncte Express: 839
Preț estimativ în valută:
107.03€ • 111.55$ • 89.10£
107.03€ • 111.55$ • 89.10£
Carte tipărită la comandă
Livrare economică 04-18 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780367458171
ISBN-10: 0367458179
Pagini: 214
Ilustrații: 116
Dimensiuni: 156 x 234 x 13 mm
Greutate: 0.45 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications
ISBN-10: 0367458179
Pagini: 214
Ilustrații: 116
Dimensiuni: 156 x 234 x 13 mm
Greutate: 0.45 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications
Public țintă
Academic and Professional Practice & DevelopmentCuprins
Author Biographies. 1 Why Cybersecurity and Cyber Resiliency Strategies Are Mandatory for Organizations Today. 2 The 6 STEPs in Developing and Maintaining a Cybersecurity and Cyber Resiliency Strategy. 3 Strategy Project Management. 4 Cyber Threats, Vulnerabilities, and Intelligence Analysis. 5 Cyber Risks and Controls. 6 Current and Target State Assessments. 7 Measuring Strategic Plan Performance and End of Year (EoY) Tasks. 8 Checklists and Templates to Help Create an Enterprise-Wide Cybersecurity and Cyber Resiliency Strategy
Notă biografică
Carol A. Siegel is a Cybersecurity strategy and IT Risk Management professional with over 30+ years’ experience. Carol earned her BS in Systems Analysis Engineering from Boston University in 1971, and her MBA in Computer Applications from New York University in 1984. She has CISSP, CISA and CISM certifications from ISC2 and ISACA respectively. Carol has co-authored one of the first books on Internet security, a book for Microsoft on Windows NT Security as well as numerous articles for Auerbach Publications on information security and risk management. Carol has worked for many Fortune 50 financial services companies in the Banking, Insurance, Big Four, and Pharma sectors and has held several Chief Information Security Officer (CISO) positions. Most recently, Carol worked for the Federal Reserve Bank of New York.
Mark Sweeney is a Cybersecurity and Cyber Resiliency professional with over 5 years of experience in strategizing and implementing risk-based cybersecurity and cyber resiliency programs. Mark earned his BS in Security & Risk Analysis – Information & Cyber Security from Penn State University in 2014. Mark has worked in Big Four consulting companies and the Financial Services Industry as a Cybersecurity and Cyber Resiliency expert and is currently a cyber underwriter.
Mark Sweeney is a Cybersecurity and Cyber Resiliency professional with over 5 years of experience in strategizing and implementing risk-based cybersecurity and cyber resiliency programs. Mark earned his BS in Security & Risk Analysis – Information & Cyber Security from Penn State University in 2014. Mark has worked in Big Four consulting companies and the Financial Services Industry as a Cybersecurity and Cyber Resiliency expert and is currently a cyber underwriter.
Recenzii
"This book is an invaluable step-by-step guide to implementing a truly resilient Cybersecurity framework. The universal concepts and strategies presented here are complemented by pragmatic processes, roadmaps, and templates useful in any organization. Whether you're a project manager, a cyber risk analyst, or a C-level executive, this book has something for you."
- William Flynn, Independent Management Consultant
"Achieving a correctly secured, risk-managed technology environment requires a strong plan, great program management, organizational buy-in, and a focus on execution, none of which happen by accident. This book provides a handy step-by-step guide for the cyber security practitioner in the development and implementation of their security improvement plan, including all-important risk assessments, budgeting, project plans, and governance models to help ensure success (or flag and address problems before they become big issues). Electronic templates available to the purchaser help simplify the work required. The practical application of this book to aid in managing real-world program implementation challenges is its greatest strength."
- David S Bauer, Managing Partner and Co-Founder, Holding Ground Decision Intelligence LLC
"Cyber security information is a complex topic to understand. There are many organisations offering standards and strategic frameworks that asks you to choose theirs without offering an understanding of the domain first. If you want to learn about the cyber security strategy domain end-to-end then this is the book that does it! You can then use the checklist and templates in the book knowing you are adopting best practice, or if you organisation already has adopted a standard, strengthen these with the information you have learned. "
- Ian Thomson, Director of AI Automation Services, SystemsAccountants and Kanbina AI Services
"This is the tour de force on designing, implementing and maintaining a modern cyber security and resiliency program. This book is a necessity for all information security and resiliency professionals."
- Howard Taylor, CISO of Radware
"This is a good, high level overview of cyber strategy and resiliency."
- Dean A. Henry, Dean Henry Business & Technology Consulting, LLC
- William Flynn, Independent Management Consultant
"Achieving a correctly secured, risk-managed technology environment requires a strong plan, great program management, organizational buy-in, and a focus on execution, none of which happen by accident. This book provides a handy step-by-step guide for the cyber security practitioner in the development and implementation of their security improvement plan, including all-important risk assessments, budgeting, project plans, and governance models to help ensure success (or flag and address problems before they become big issues). Electronic templates available to the purchaser help simplify the work required. The practical application of this book to aid in managing real-world program implementation challenges is its greatest strength."
- David S Bauer, Managing Partner and Co-Founder, Holding Ground Decision Intelligence LLC
"Cyber security information is a complex topic to understand. There are many organisations offering standards and strategic frameworks that asks you to choose theirs without offering an understanding of the domain first. If you want to learn about the cyber security strategy domain end-to-end then this is the book that does it! You can then use the checklist and templates in the book knowing you are adopting best practice, or if you organisation already has adopted a standard, strengthen these with the information you have learned. "
- Ian Thomson, Director of AI Automation Services, SystemsAccountants and Kanbina AI Services
"This is the tour de force on designing, implementing and maintaining a modern cyber security and resiliency program. This book is a necessity for all information security and resiliency professionals."
- Howard Taylor, CISO of Radware
"This is a good, high level overview of cyber strategy and resiliency."
- Dean A. Henry, Dean Henry Business & Technology Consulting, LLC
Descriere
Cyber Strategy Risk-Driven Security and Resiliency provides a process and roadmap for any company to develop its unified Cybersecurity and Cyber Resiliency Strategy. The book discusses all the steps required from conception of the plan from pre-planning (mission/vision, principles, strategic objectives, new initiatives derivation).