Book description
This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape.
Table of contents
- Cover
- Title
- Copyright
- Contents
- Part 1: Introduction
- Part 2: Threats and vulnerabilities
-
Part 3: The CRF processes
- Chapter 11: An overview of the CRF processes
-
Chapter 12: Manage and protect
- 12.1 Asset management
- 12.2 Information security policies
- 12.3 Physical and environmental security
- 12.4 Identity and access control
- 12.5 Malware protection
- 12.6 Configuration and patch management
- 12.7 Encryption
- 12.8 System security
- 12.9 Network and communications security
- 12.10 Security competence and training
- 12.11 Staff awareness training
- 12.12 Comprehensive risk management programme
- 12.13 Supply chain risk management
- Chapter 13: Identify and detect
- Chapter 14: Respond and recover
- Chapter 15: Govern and assure
- Chapter 16: Maturity levels
-
Part 4: Eight steps to implementing cyber security
- Chapter 17: Introducing the IT Governance eight-step approach
- Chapter 18: Step 1 – Start the project
- Chapter 19: Step 2 – Determine requirements and objectives
- Chapter 20: Step 3 – Determine the scope
- Chapter 21: Step 4 – Define current and ideal target states
- Chapter 22: Step 5 – Establish a continual improvement model
- Chapter 23: Step 6 – Conduct a risk assessment
- Chapter 24: Step 7 – Select and implement controls
- Chapter 25: Step 8 – Measure and review performance
- Part 5: Reference frameworks
- Appendix 1: IT and information asset checklist
- Appendix 2: Template outline project plan
- Appendix 3: Glossary of acronyms and abbreviations
- GRC International Group resources
Product information
- Title: The Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks
- Author(s):
- Release date: December 2020
- Publisher(s): IT Governance Publishing
- ISBN: None
You might also like
book
Computer and Information Security Handbook, 3rd Edition
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer …
audiobook
Algorithms
Digital technology runs on algorithms, sets of instructions that describe how to do something efficiently. Application …
book
EU General Data Protection Regulation (GDPR) – An implementation and compliance guide, fourth edition
This bestselling guide is the ideal companion for anyone carrying out a GDPR (General Data Protection …
book
Authentication and Access Control: Practical Cryptography Methods and Tools
Cybersecurity is a critical concern for individuals and for organizations of all types and sizes. Authentication …