Book description
All the Knowledge You Need to Build Cybersecurity Programs and Policies That Work
Clearly presents best practices, governance frameworks, and key standards
Includes focused coverage of healthcare, finance, and PCI DSS compliance
An essential and invaluable guide for leaders, managers, and technical professionals
Today, cyberattacks can place entire organizations at risk. Cybersecurity can no longer be delegated to specialists: success requires everyone to work together, from leaders on down. Developing Cybersecurity Programs and Policies offers start-to-finish guidance for establishing effective cybersecurity in any organization. Drawing on more than 20 years of real-world experience, Omar Santos presents realistic best practices for defining policy and governance, ensuring compliance, and collaborating to harden the entire organization.
First, Santos shows how to develop workable cybersecurity policies and an effective framework for governing them. Next, he addresses risk management, asset management, and data loss prevention, showing how to align functions from HR to physical security. You’ll discover best practices for securing communications, operations, and access; acquiring, developing, and maintaining technology; and responding to incidents.
Santos concludes with detailed coverage of compliance in finance and healthcare, the crucial Payment Card Industry Data Security Standard (PCI DSS) standard, and the NIST Cybersecurity Framework.
Whatever your current responsibilities, this guide will help you plan, manage, and lead cybersecurity–and safeguard all the assets that matter.
Learn How To
· Establish cybersecurity policies and governance that serve your organization’s needs
· Integrate cybersecurity program components into a coherent framework for action
· Assess, prioritize, and manage security risk throughout the organization
· Manage assets and prevent data loss
· Work with HR to address human factors in cybersecurity
· Harden your facilities and physical environment
· Design effective policies for securing communications, operations, and access
· Strengthen security throughout the information systems lifecycle
· Plan for quick, effective incident response and ensure business continuity
· Comply with rigorous regulations in finance and healthcare
· Plan for PCI compliance to safely process payments
· Explore and apply the guidance provided by the NIST Cybersecurity Framework..
Table of contents
- Cover
- About This E-Book
- Title Page
- Copyright Page
- Contents at a Glance
- Table of Contents
- About the Author
- Dedication
- Acknowledgments
- We Want to Hear from You!
- Reader Services
- Introduction
- Chapter 1 Understanding Cybersecurity Policy and Governance
- Chapter 2 Cybersecurity Policy Organization, Format, and Styles
- Chapter 3 Cybersecurity Framework
- Chapter 4 Governance and Risk Management
- Chapter 5 Asset Management and Data Loss Prevention
- Chapter 6 Human Resources Security
- Chapter 7 Physical and Environmental Security
- Chapter 8 Communications and Operations Security
- Chapter 9 Access Control Management
- Chapter 10 Information Systems Acquisition, Development, and Maintenance
- Chapter 11 Cybersecurity Incident Response
- Chapter 12 Business Continuity Management
- Chapter 13 Regulatory Compliance for Financial Institutions
- Chapter 14 Regulatory Compliance for the Health-Care Sector
- Chapter 15 PCI Compliance for Merchants
-
Chapter 16 NIST Cybersecurity Framework
- Introducing the NIST Cybersecurity Framework Components
- The Framework Core
- Framework Implementation Tiers (“Tiers”)
- NIST’s Recommended Steps to Establish or Improve a Cybersecurity Program
- NIST’s Cybersecurity Framework Reference Tool
- Adopting the NIST Cybersecurity Framework in Real Life
- Summary
- Test Your Skills
- Appendix A Cybersecurity Program Resources
- Appendix B Answers to the Multiple Choice Questions
- Index
- Code Snippets
Product information
- Title: Developing Cybersecurity Programs and Policies, 3rd Edition
- Author(s):
- Release date: August 2018
- Publisher(s): Pearson IT Certification
- ISBN: 9780134858623
You might also like
book
Cybersecurity and Third-Party Risk
STRENGTHEN THE WEAKEST LINKS IN YOUR CYBERSECURITY CHAIN Across the world, the networks of hundreds of …
book
Cybersecurity Risk Management
Cybersecurity Risk Management In Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran …
book
Access Control and Identity Management, 3rd Edition
Revised and updated with the latest data from this fast paced field, Access Control, Authentication, and …
book
Practical Cloud Security
With their rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and …