Enterprise cybersecurity study guide : how to build a successful cyberdefense program against advanced threats / Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam.
Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How...
Saved in:
Online Access: |
Full Text (via O'Reilly/Safari) |
---|---|
Main Authors: | , , , |
Format: | eBook |
Language: | English |
Published: |
New York, NY :
Apress,
[2018]
|
Series: | Expert's voice in cybersecurity.
|
Subjects: |
Table of Contents:
- Part I: The Cybersecurity Challenge
- Chapter 1: Defining the Cybersecurity Challenge
- Chapter 2: Meeting the Cybersecurity Challenge
- Part II: A New Enterprise Cybersecurity Architecture
- Chapter 3: Enterprise Cybersecurity Architecture
- Chapter 4: Implementing Enterprise Cybersecurity
- Chapter 5: Operating Enterprise Cybersecurity
- Chapter 6: Enterprise Cybersecurity and the Cloud
- Chapter 7: Enterprise Cybersecurity for Mobile and BYOD
- Part III: The Art of Cyber Defense
- Chapter 8: Building an Effective Defense
- Chapter 9: Responding to Incidents
- Chapter 10: Managing a Cybersecurity Crisis
- Part IV: Enterprise Cyber Defense Assessment
- Chapter 11: Assessing Enterprise Cybersecurity
- Chapter 12: Measuring a Cybersecurity Program
- Chapter 13: Mapping Against Cybersecurity Frameworks
- Part V: Enterprise Cybersecurity Program
- Chapter 14: Managing an Enterprise Cybersecurity Program
- Chapter 15: Looking to the Future
- Part VI: Appendices
- Appendix A: Sample Cybersecurity Policy
- Appendix B: Cybersecurity Operational Processes
- Appendix C: Object Measurement
- Appendix D: Cybersecurity Sample Assessment
- Appendix E: Cybersecurity Capability Value Scales.