Enterprise Cybersecurity Study Guide How to Build a Successful Cyberdefense Program Against Advanced Threats /
Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How...
Main Authors: | , , , |
---|---|
Corporate Author: | |
Format: | Electronic eBook |
Language: | English |
Published: |
Berkeley, CA :
Apress : Imprint: Apress,
2018.
|
Edition: | 1st ed. 2018. |
Subjects: | |
Online Access: | Full Text via HEAL-Link |
Table of Contents:
- Part I: The Cybersecurity Challenge
- Chapter 1: Defining the Cybersecurity Challenge
- Chapter 2: Meeting the Cybersecurity Challenge
- Part II: A New Enterprise Cybersecurity Architecture
- Chapter 3: Enterprise Cybersecurity Architecture
- Chapter 4: Implementing Enterprise Cybersecurity
- Chapter 5: Operating Enterprise Cybersecurity
- Chapter 6: Enterprise Cybersecurity and the Cloud
- Chapter 7: Enterprise Cybersecurity for Mobile and BYOD
- Part III: The Art of Cyber Defense
- Chapter 8: Building an Effective Defense
- Chapter 9: Responding to Incidents
- Chapter 10: Managing a Cybersecurity Crisis
- Part IV: Enterprise Cyber Defense Assessment
- Chapter 11: Assessing Enterprise Cybersecurity
- Chapter 12: Measuring a Cybersecurity Program
- Chapter 13: Mapping Against Cybersecurity Frameworks
- Part V: Enterprise Cybersecurity Program
- Chapter 14: Managing an Enterprise Cybersecurity Program
- Chapter 15: Looking to the Future
- Part VI: Appendices
- Appendix A: Sample Cybersecurity Policy
- Appendix B: Cybersecurity Operational Processes
- Appendix C: Object Measurement
- Appendix D: Cybersecurity Sample Assessment
- Appendix E: Cybersecurity Capability Value Scales.