Executive's cybersecurity program handbook: a comprehensive guide to building and operationalizing a complete cybersecurity program
Ransomware, phishing, and data breaches are major concerns affecting all organizations as a new cyber threat seems to emerge every day, making it paramount to protect the security of your organization and be prepared for potential cyberattacks. This book will ensure that you can build a reliable cyb...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham
Packt Publishing
2023
|
Online-Zugang: | DE-Aug4 DE-573 DE-898 DE-91 DE-706 URL des Erstveröffentlichers |
Zusammenfassung: | Ransomware, phishing, and data breaches are major concerns affecting all organizations as a new cyber threat seems to emerge every day, making it paramount to protect the security of your organization and be prepared for potential cyberattacks. This book will ensure that you can build a reliable cybersecurity framework to keep your organization safe from cyberattacks. This Executive's Cybersecurity Program Handbook explains the importance of executive buy-in, mission, and vision statement of the main pillars of security program (governance, defence, people and innovation). You'll explore the different types of cybersecurity frameworks, how they differ from one another, and how to pick the right framework to minimize cyber risk. As you advance, you'll perform an assessment against the NIST Cybersecurity Framework, which will help you evaluate threats to your organization by identifying both internal and external vulnerabilities. Toward the end, you'll learn the importance of standard cybersecurity policies, along with concepts of governance, risk, and compliance, and become well-equipped to build an effective incident response team. By the end of this book, you'll have gained a thorough understanding of how to build your security program from scratch as well as the importance of implementing administrative and technical security controls. |
Beschreibung: | 1 Online-Ressource (xvii, 213 Seiten) |
ISBN: | 9781804616741 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV049422104 | ||
003 | DE-604 | ||
005 | 20240206 | ||
007 | cr|uuu---uuuuu | ||
008 | 231120s2023 xx o|||| 00||| eng d | ||
020 | |a 9781804616741 |9 978-1-80461-674-1 | ||
035 | |a (ZDB-221-PPK)PACKT0006579 | ||
035 | |a (OCoLC)1410710143 | ||
035 | |a (DE-599)BVBBV049422104 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-573 |a DE-706 |a DE-898 | ||
100 | 1 | |a Brown, Jason |e Verfasser |4 aut | |
245 | 1 | 0 | |a Executive's cybersecurity program handbook |b a comprehensive guide to building and operationalizing a complete cybersecurity program |c Jason Brown |
264 | 1 | |a Birmingham |b Packt Publishing |c 2023 | |
300 | |a 1 Online-Ressource (xvii, 213 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a Ransomware, phishing, and data breaches are major concerns affecting all organizations as a new cyber threat seems to emerge every day, making it paramount to protect the security of your organization and be prepared for potential cyberattacks. This book will ensure that you can build a reliable cybersecurity framework to keep your organization safe from cyberattacks. This Executive's Cybersecurity Program Handbook explains the importance of executive buy-in, mission, and vision statement of the main pillars of security program (governance, defence, people and innovation). You'll explore the different types of cybersecurity frameworks, how they differ from one another, and how to pick the right framework to minimize cyber risk. As you advance, you'll perform an assessment against the NIST Cybersecurity Framework, which will help you evaluate threats to your organization by identifying both internal and external vulnerabilities. Toward the end, you'll learn the importance of standard cybersecurity policies, along with concepts of governance, risk, and compliance, and become well-equipped to build an effective incident response team. By the end of this book, you'll have gained a thorough understanding of how to build your security program from scratch as well as the importance of implementing administrative and technical security controls. | ||
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-80461-923-0 |
856 | 4 | 0 | |u https://portal.igpublish.com/iglibrary/search/PACKT0006579.html |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-221-PPK | ||
912 | |a ZDB-221-PCL | ||
912 | |a ZDB-221-PCR | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034749607 | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0006579.html |l DE-Aug4 |p ZDB-221-PCR |x Verlag |3 Volltext | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0006579.html |l DE-573 |p ZDB-221-PCR |x Verlag |3 Volltext | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0006579.html |l DE-898 |p ZDB-221-PCR |x Verlag |3 Volltext | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0006579.html |l DE-91 |p ZDB-221-PCL |q TUM_Paketkauf_2024 |x Verlag |3 Volltext | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0006579.html |l DE-706 |p ZDB-221-PCL |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1822044809434497024 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Brown, Jason |
author_facet | Brown, Jason |
author_role | aut |
author_sort | Brown, Jason |
author_variant | j b jb |
building | Verbundindex |
bvnumber | BV049422104 |
collection | ZDB-221-PPK ZDB-221-PCL ZDB-221-PCR |
ctrlnum | (ZDB-221-PPK)PACKT0006579 (OCoLC)1410710143 (DE-599)BVBBV049422104 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV049422104</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240206</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">231120s2023 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781804616741</subfield><subfield code="9">978-1-80461-674-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-221-PPK)PACKT0006579</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1410710143</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049422104</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-898</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Brown, Jason</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Executive's cybersecurity program handbook</subfield><subfield code="b">a comprehensive guide to building and operationalizing a complete cybersecurity program</subfield><subfield code="c">Jason Brown</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvii, 213 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Ransomware, phishing, and data breaches are major concerns affecting all organizations as a new cyber threat seems to emerge every day, making it paramount to protect the security of your organization and be prepared for potential cyberattacks. This book will ensure that you can build a reliable cybersecurity framework to keep your organization safe from cyberattacks. This Executive's Cybersecurity Program Handbook explains the importance of executive buy-in, mission, and vision statement of the main pillars of security program (governance, defence, people and innovation). You'll explore the different types of cybersecurity frameworks, how they differ from one another, and how to pick the right framework to minimize cyber risk. As you advance, you'll perform an assessment against the NIST Cybersecurity Framework, which will help you evaluate threats to your organization by identifying both internal and external vulnerabilities. Toward the end, you'll learn the importance of standard cybersecurity policies, along with concepts of governance, risk, and compliance, and become well-equipped to build an effective incident response team. By the end of this book, you'll have gained a thorough understanding of how to build your security program from scratch as well as the importance of implementing administrative and technical security controls.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-80461-923-0</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0006579.html</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-221-PPK</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-221-PCL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-221-PCR</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034749607</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0006579.html</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-221-PCR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0006579.html</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-221-PCR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0006579.html</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-221-PCR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0006579.html</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-221-PCL</subfield><subfield code="q">TUM_Paketkauf_2024</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0006579.html</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-221-PCL</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049422104 |
illustrated | Not Illustrated |
index_date | 2024-07-03T23:07:57Z |
indexdate | 2025-01-23T13:02:18Z |
institution | BVB |
isbn | 9781804616741 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034749607 |
oclc_num | 1410710143 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-573 DE-706 DE-898 DE-BY-UBR |
owner_facet | DE-91 DE-BY-TUM DE-573 DE-706 DE-898 DE-BY-UBR |
physical | 1 Online-Ressource (xvii, 213 Seiten) |
psigel | ZDB-221-PPK ZDB-221-PCL ZDB-221-PCR ZDB-221-PCL TUM_Paketkauf_2024 |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Packt Publishing |
record_format | marc |
spelling | Brown, Jason Verfasser aut Executive's cybersecurity program handbook a comprehensive guide to building and operationalizing a complete cybersecurity program Jason Brown Birmingham Packt Publishing 2023 1 Online-Ressource (xvii, 213 Seiten) txt rdacontent c rdamedia cr rdacarrier Ransomware, phishing, and data breaches are major concerns affecting all organizations as a new cyber threat seems to emerge every day, making it paramount to protect the security of your organization and be prepared for potential cyberattacks. This book will ensure that you can build a reliable cybersecurity framework to keep your organization safe from cyberattacks. This Executive's Cybersecurity Program Handbook explains the importance of executive buy-in, mission, and vision statement of the main pillars of security program (governance, defence, people and innovation). You'll explore the different types of cybersecurity frameworks, how they differ from one another, and how to pick the right framework to minimize cyber risk. As you advance, you'll perform an assessment against the NIST Cybersecurity Framework, which will help you evaluate threats to your organization by identifying both internal and external vulnerabilities. Toward the end, you'll learn the importance of standard cybersecurity policies, along with concepts of governance, risk, and compliance, and become well-equipped to build an effective incident response team. By the end of this book, you'll have gained a thorough understanding of how to build your security program from scratch as well as the importance of implementing administrative and technical security controls. Erscheint auch als Druck-Ausgabe 978-1-80461-923-0 https://portal.igpublish.com/iglibrary/search/PACKT0006579.html Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Brown, Jason Executive's cybersecurity program handbook a comprehensive guide to building and operationalizing a complete cybersecurity program |
title | Executive's cybersecurity program handbook a comprehensive guide to building and operationalizing a complete cybersecurity program |
title_auth | Executive's cybersecurity program handbook a comprehensive guide to building and operationalizing a complete cybersecurity program |
title_exact_search | Executive's cybersecurity program handbook a comprehensive guide to building and operationalizing a complete cybersecurity program |
title_exact_search_txtP | Executive's cybersecurity program handbook a comprehensive guide to building and operationalizing a complete cybersecurity program |
title_full | Executive's cybersecurity program handbook a comprehensive guide to building and operationalizing a complete cybersecurity program Jason Brown |
title_fullStr | Executive's cybersecurity program handbook a comprehensive guide to building and operationalizing a complete cybersecurity program Jason Brown |
title_full_unstemmed | Executive's cybersecurity program handbook a comprehensive guide to building and operationalizing a complete cybersecurity program Jason Brown |
title_short | Executive's cybersecurity program handbook |
title_sort | executive s cybersecurity program handbook a comprehensive guide to building and operationalizing a complete cybersecurity program |
title_sub | a comprehensive guide to building and operationalizing a complete cybersecurity program |
url | https://portal.igpublish.com/iglibrary/search/PACKT0006579.html |
work_keys_str_mv | AT brownjason executivescybersecurityprogramhandbookacomprehensiveguidetobuildingandoperationalizingacompletecybersecurityprogram |