Book description
This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape.
Table of contents
- Cover
- Title
- Copyright
- Contents
- Part 1: Introduction
- Part 2: Threats and vulnerabilities
-
Part 3: The CRF processes
- Chapter 11: An overview of the CRF processes
-
Chapter 12: Manage and protect
- 12.1 Asset management
- 12.2 Information security policies
- 12.3 Physical and environmental security
- 12.4 Identity and access control
- 12.5 Malware protection
- 12.6 Configuration and patch management
- 12.7 Encryption
- 12.8 System security
- 12.9 Network and communications security
- 12.10 Security competence and training
- 12.11 Staff awareness training
- 12.12 Comprehensive risk management programme
- 12.13 Supply chain risk management
- Chapter 13: Identify and detect
- Chapter 14: Respond and recover
- Chapter 15: Govern and assure
- Chapter 16: Maturity levels
-
Part 4: Eight steps to implementing cyber security
- Chapter 17: Introducing the IT Governance eight-step approach
- Chapter 18: Step 1 – Start the project
- Chapter 19: Step 2 – Determine requirements and objectives
- Chapter 20: Step 3 – Determine the scope
- Chapter 21: Step 4 – Define current and ideal target states
- Chapter 22: Step 5 – Establish a continual improvement model
- Chapter 23: Step 6 – Conduct a risk assessment
- Chapter 24: Step 7 – Select and implement controls
- Chapter 25: Step 8 – Measure and review performance
- Part 5: Reference frameworks
- Appendix 1: IT and information asset checklist
- Appendix 2: Template outline project plan
- Appendix 3: Glossary of acronyms and abbreviations
- GRC International Group resources
Product information
- Title: The Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks
- Author(s):
- Release date: December 2020
- Publisher(s): IT Governance Publishing
- ISBN: None
You might also like
book
Cyber Security
Cyber security is more essential today than ever, not just in the workplace but at home …
book
Cyber Security, 2nd Edition
Cyber security has never been more essential than it is today, it’s not a case of …
book
Cyber Security Policy Guidebook
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook …
book
Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers
Understand the process of setting up a successful cyber threat intelligence (CTI) practice within an established …