Book description
This book will give you a good understanding of the fundamentals of cyber security and resilience, without tying them to specific standards, frameworks or solutions, and provide an excellent starting point for any cyber resilience implementation project.
Table of contents
- Cover
- Title
- Copyright
- Contents
- About the author
- Acknowledgements
- Introduction
-
Part 1: Security principles
- Chapter 1: The cyber threat landscape
- Chapter 2: Legal and contractual requirements
- Chapter 3: Key terms and concepts
- Chapter 4: Managing the risks
- Chapter 5: Three security pillars
- Chapter 6: Layers of defence in depth
- Chapter 7: Mapping the layers against the Part 2 reference controls
- Chapter 8: Implementation tips
-
Part 2: Reference controls
- Chapter 9: Asset management
- Chapter 10: Board-level commitment and involvement
- Chapter 11: Business continuity management
- Chapter 12: Configuration and patch management
- Chapter 13: Continual improvement process
- Chapter 14: Encryption
- Chapter 15: External certification/validation
- Chapter 16: Identity and access control
- Chapter 17: Incident response management
- Chapter 18: Internal audits
- Chapter 19: Malware protection
- Chapter 20: Network and communications security
- Chapter 21: Physical and environmental security
- Chapter 22: Security monitoring
- Chapter 23: Security policies
- Chapter 24: Staff training and awareness
- Chapter 25: Supply chain security
- Chapter 26: System security
- Chapter 27: Vulnerability scanning and penetration testing
- GRC International Group PLC resources
Product information
- Title: Cyber resilience - Defence-in-depth principles
- Author(s):
- Release date: August 2023
- Publisher(s): IT Governance Publishing
- ISBN: 9781787784406
You might also like
book
Building a Cyber Resilient Business
Learn how to build a proactive cybersecurity culture together with the rest of your C-suite to …
book
Evidence-Based Security
The business world faces an interesting paradox: although companies spend more money than ever on security …
book
Cybersecurity and Third-Party Risk
STRENGTHEN THE WEAKEST LINKS IN YOUR CYBERSECURITY CHAIN Across the world, the networks of hundreds of …
book
Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies
Rely on this practical, comprehensive guide to significantly improve your cyber safety and data privacy. This …