CHAPTER 9: CONCLUSION: WHERE DO WE GO FROM HERE?

If you were looking for a comprehensive manual on how to create an enterprise cybersecurity program, you were likely disappointed in this text.

There are many other, extremely well written publications that address cybersecurity program specifics. Rather, the intent here was to provide a roadmap for thinking about cybersecurity and the establishment of a successful cybersecurity program through the prism of national and international standards, regulations, guidelines, and best practices and view these as a means to navigate the treacherous waters of an unpredictable cybersecurity environment.

As part of the conclusion, it might be useful to review a cybersecurity roadmap at a high level. So, ...

Get CyberWar, CyberTerror, CyberCrime and CyberActivism, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.