Start-Up Secure

Book description

Add cybersecurity to your value proposition and protect your company from cyberattacks

Cybersecurity is now a requirement for every company in the world regardless of size or industry. Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit covers everything a founder, entrepreneur and venture capitalist should know when building a secure company in today’s world. It takes you step-by-step through the cybersecurity moves you need to make at every stage, from landing your first round of funding through to a successful exit. The book describes how to include security and privacy from the start and build a cyber resilient company. You'll learn the basic cybersecurity concepts every founder needs to know, and you'll see how baking in security drives the value proposition for your startup’s target market. This book will also show you how to scale cybersecurity within your organization, even if you aren’t an expert!

Cybersecurity as a whole can be overwhelming for startup founders. Start-Up Secure breaks down the essentials so you can determine what is right for your start-up and your customers. You’ll learn techniques, tools, and strategies that will ensure data security for yourself, your customers, your funders, and your employees. Pick and choose the suggestions that make the most sense for your situation—based on the solid information in this book.

  • Get primed on the basic cybersecurity concepts every founder needs to know
  • Learn how to use cybersecurity know-how to add to your value proposition
  • Ensure that your company stays secure through all its phases, and scale cybersecurity wisely as your business grows
  • Make a clean and successful exit with the peace of mind that comes with knowing your company's data is fully secure

Start-Up Secure is the go-to source on cybersecurity for start-up entrepreneurs, leaders, and individual contributors who need to select the right frameworks and standards at every phase of the entrepreneurial journey.

Table of contents

  1. Cover
  2. Title Page
  3. Copyright
  4. Dedication
  5. Foreword
  6. Preface
    1. WHY WRITE THIS BOOK?
    2. NOTES
  7. Acknowledgments
  8. About the Author
  9. Introduction
    1. ABOUT THIS BOOK
    2. HOW TO USE THIS BOOK
  10. PART ONE: Fundamentals
    1. CHAPTER ONE: Minimum Security Investment for Maximum Risk Reduction
      1. COMMUNICATING YOUR CYBERSECURITY
      2. EMAIL SECURITY
      3. SECURE YOUR CREDENTIALS
      4. SAAS CAN BE SECURE
      5. PATCHING
      6. ANTIVIRUS IS STILL NECESSARY BUT GOES BY A DIFFERENT NAME
      7. MOBILE DEVICES
      8. SUMMARY
      9. ACTION PLAN
      10. NOTES
    2. CHAPTER TWO: Cybersecurity Strategy and Roadmap Development
      1. WHAT TYPE OF BUSINESS IS THIS?
      2. WHAT TYPES OF CUSTOMERS WILL WE SELL TO?
      3. WHAT TYPES OF INFORMATION WILL THE BUSINESS CONSUME?
      4. WHAT TYPES OF INFORMATION WILL THE BUSINESS CREATE?
      5. WHERE GEOGRAPHICALLY WILL BUSINESS BE CONDUCTED?
      6. BUILDING THE ROADMAP
      7. CASE STUDY
      8. SUMMARY
      9. ACTION PLAN
      10. NOTE
    3. CHAPTER THREE: Secure Your Credentials
      1. PASSWORD MANAGERS
      2. PASSPHRASE
      3. MULTI-FACTOR AUTHENTICATION
      4. ENTITLEMENTS
      5. KEY MANAGEMENT
      6. CASE STUDY
      7. SUMMARY
      8. ACTION PLAN
      9. NOTES
    4. CHAPTER FOUR: Endpoint Protection
      1. VENDORS
      2. SELECTING AN EDR
      3. MANAGED DETECTION AND RESPONSE
      4. CASE STUDY
      5. SUMMARY
      6. ACTION PLAN
      7. NOTES
    5. CHAPTER FIVE: Your Office Network
      1. YOUR FIRST OFFICE SPACE
      2. CO-WORKING SPACES
      3. VIRTUAL PRIVATE NETWORK
      4. SUMMARY
      5. ACTION PLAN
      6. NOTES
    6. CHAPTER SIX: Your Product in the Cloud
      1. SECURE YOUR CLOUD PROVIDER ACCOUNTS
      2. PROTECT YOUR WORKLOADS
      3. SECURE YOUR CONTAINERS
      4. SUMMARY
      5. ACTION PLAN
      6. NOTES
    7. CHAPTER SEVEN: Information Technology
      1. ASSET MANAGEMENT
      2. IDENTITY AND ACCESS MANAGEMENT
      3. SUMMARY
      4. ACTION PLAN
  11. PART TWO: Growing the Team
    1. CHAPTER EIGHT: Hiring, Outsourcing, or Hybrid
      1. CATALYSTS TO HIRING
      2. GET THE FIRST HIRE RIGHT
      3. EXECUTIVE VERSUS INDIVIDUAL CONTRIBUTOR
      4. RECRUITING
      5. JOB DESCRIPTIONS
      6. INTERVIEWING
      7. FIRST 90 DAYS IS A MYTH
      8. SUMMARY
      9. ACTION PLAN
      10. NOTE
  12. PART THREE: Maturation
    1. CHAPTER NINE: Compliance
      1. MASTER SERVICE AGREEMENTS, TERMS AND CONDITIONS, OH MY
      2. PATCH AND VULNERABILITY MANAGEMENT
      3. ANTIVIRUS
      4. AUDITING
      5. INCIDENT RESPONSE
      6. POLICIES AND CONTROLS
      7. CHANGE MANAGEMENT
      8. ENCRYPTION
      9. DATA LOSS PREVENTION
      10. DATA PROCESSING AGREEMENT
      11. SUMMARY
      12. ACTION PLAN
      13. NOTE
    2. CHAPTER TEN: Industry and Government Standards and Regulations
      1. OPEN SOURCE
      2. UNITED STATES PUBLIC
      3. RETAIL
      4. ENERGY, OIL, AND GAS
      5. HEALTH
      6. FINANCIAL
      7. EDUCATION
      8. INTERNATIONAL
      9. UNITED STATES FEDERAL AND STATE GOVERNMENT
      10. SUMMARY
      11. ACTION PLAN
      12. NOTES
    3. CHAPTER ELEVEN: Communicating Your Cybersecurity Posture and Maturity to Customers
      1. CERTIFICATIONS AND AUDITS
      2. QUESTIONNAIRES
      3. SHARING DATA WITH YOUR CUSTOMER
      4. CASE STUDY
      5. SUMMARY
      6. ACTION PLAN
      7. NOTES
    4. CHAPTER TWELVE: When the Breach Happens
      1. CYBER INSURANCE
      2. INCIDENT RESPONSE RETAINERS
      3. THE INCIDENT
      4. TABLETOP EXERCISES
      5. SUMMARY
      6. ACTION PLAN
      7. NOTE
    5. CHAPTER THIRTEEN: Secure Development
      1. FRAMEWORKS
      2. MICROSOFT SDL
      3. PRE-COMMIT
      4. INTEGRATED DEVELOPMENT ENVIRONMENT
      5. COMMIT
      6. BUILD
      7. PENETRATION TESTING
      8. SUMMARY
      9. ACTION PLAN
      10. NOTES
    6. CHAPTER FOURTEEN: Third-Party Risk
      1. TERMS AND CONDITIONS
      2. SHOULD I REVIEW THIS VENDOR?
      3. WHAT TO ASK AND LOOK FOR
      4. SUMMARY
      5. ACTION PLAN
      6. NOTE
    7. CHAPTER FIFTEEN: Bringing It All Together
  13. Glossary
  14. Index
  15. End User License Agreement

Product information

  • Title: Start-Up Secure
  • Author(s): Chris Castaldo
  • Release date: May 2021
  • Publisher(s): Wiley
  • ISBN: 9781119700739