All the Knowledge You Need to Build Cybersecurity Programs and Policies That Work
Clearly presents best practices, governance frameworks, and key standards
Includes focused coverage of healthcare, finance, and PCI DSS compliance
An essential and invaluable guide for leaders, managers, and technical professionals
Today, cyberattacks can place entire organizations at risk. Cybersecurity can no longer be delegated to specialists: success requires everyone to work together, from leaders on down. Developing Cybersecurity Programs and Policies offers start-to-finish guidance for establishing effective cybersecurity in any organization. Drawing on more than 20 years of real-world experience, Omar Santos presents realistic best practices for defining policy and governance, ensuring compliance, and collaborating to harden the entire organization.
First, Santos shows how to develop workable cybersecurity policies and an effective framework for governing them. Next, he addresses risk management, asset management, and data loss prevention, showing how to align functions from HR to physical security. You’ll discover best practices for securing communications, operations, and access; acquiring, developing, and maintaining technology; and responding to incidents.
Santos concludes with detailed coverage of compliance in finance and healthcare, the crucial Payment Card Industry Data Security Standard (PCI DSS) standard, and the NIST Cybersecurity Framework.
Whatever your current responsibilities, this guide will help you plan, manage, and lead cybersecurity–and safeguard all the assets that matter.
Learn How To
· Establish cybersecurity policies and governance that serve your organization’s needs
· Integrate cybersecurity program components into a coherent framework for action
· Assess, prioritize, and manage security risk throughout the organization
· Manage assets and prevent data loss
· Work with HR to address human factors in cybersecurity
· Harden your facilities and physical environment
· Design effective policies for securing communications, operations, and access
· Strengthen security throughout the information systems lifecycle
· Plan for quick, effective incident response and ensure business continuity
· Comply with rigorous regulations in finance and healthcare
· Plan for PCI compliance to safely process payments
· Explore and apply the guidance provided by the NIST Cybersecurity Framework
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Omar Santos is a principal engineer in the Cisco Product Security Incident Response Team (PSIRT) within the Cisco Security Research and Operations. He mentors and leads engineers and incident managers during the investigation and resolution of security vulnerabilities in all Cisco products, including cloud services. Omar has been working with information technology and cybersecurity since the mid-1990s. Omar has designed, implemented, and supported numerous secure networks for Fortune 100 and 500 companies and the U.S. government. Prior to his current role, he was a technical leader within the World-Wide Security Practice and the Cisco Technical Assistance Center (TAC), where he taught, led, and mentored many engineers within both organizations.
Omar is an active member of the security community, where he leads several industrywide initiatives and standard bodies. His active role helps businesses, academic institutions, state and local law enforcement agencies, and other participants that are dedicated to increasing the security of the critical infrastructure.
Omar often delivers technical presentations at many conferences and to Cisco customers and partners. He is the author of dozens of books and video courses. You can follow Omar on any of the following:
Personal website: omarsantos.io
Twitter: @santosomar
LinkedIn: https://www.linkedin.com/in/santosomar
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
EUR 3,20 expédition vers Etats-Unis
Destinations, frais et délaisEUR 7,65 expédition vers Etats-Unis
Destinations, frais et délaisVendeur : HPB-Red, Dallas, TX, Etats-Unis
paperback. Etat : Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! N° de réf. du vendeur S_433735375
Quantité disponible : 1 disponible(s)
Vendeur : SecondSale, Montgomery, IL, Etats-Unis
Etat : Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. N° de réf. du vendeur 00074786839
Quantité disponible : 1 disponible(s)
Vendeur : BooksRun, Philadelphia, PA, Etats-Unis
Paperback. Etat : Very Good. 3. It's a well-cared-for item that has seen limited use. The item may show minor signs of wear. All the text is legible, with all pages included. It may have slight markings and/or highlighting. N° de réf. du vendeur 0789759403-8-1
Quantité disponible : 1 disponible(s)
Vendeur : FirstClassBooks, Little Rock, AR, Etats-Unis
Etat : Good. Used books cannot guarantee unused access codes or working CD's! N° de réf. du vendeur FAY-OOS-S24-777-09857
Quantité disponible : 1 disponible(s)
Vendeur : Best Price, Torrance, CA, Etats-Unis
Etat : New. SUPER FAST SHIPPING. N° de réf. du vendeur 9780789759405
Quantité disponible : 1 disponible(s)
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
Etat : New. N° de réf. du vendeur 30617872-n
Quantité disponible : Plus de 20 disponibles
Vendeur : Grand Eagle Retail, Mason, OH, Etats-Unis
Paperback. Etat : new. Paperback. This book is a complete guide to establishing a cybersecurity program and governance in your organisation. In this book, you will learn how to create cybersecurity policies, standards, procedures, guidelines, and plans and the differences among them. This book covers the Confidentiality, Integrity & Availability (CIA) security model. You will also learn how threat actors are launching attacks against their victims compromising confidentiality, integrity, and availability of systems and networks. This book covers the NIST Cybersecurity Framework and ISO/IEC 27000-series standards. You will learn how to align security with business strategy, as well as define, inventory, and classify your information and systems. This book teaches you how to systematically identify, prioritise, and manage cybersecurity risks and reduce social engineering (human) risks with role-based Security Education, Awareness, and Training (SETA). You will also learn how to implement effective physical, environmental, communications, and operational security; and effectively manage access control. In this book you will learn how to respond to incidents and ensure continuity of operations and how to comply with laws and regulations, including GLBA, HIPAA/HITECH, FISMA, state data security and notification rules, and PCI DSS. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. N° de réf. du vendeur 9780789759405
Quantité disponible : 1 disponible(s)
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
Etat : As New. Unread book in perfect condition. N° de réf. du vendeur 30617872
Quantité disponible : Plus de 20 disponibles
Vendeur : Ubiquity Trade, Miami, FL, Etats-Unis
Etat : New. Brand new! Please provide a physical shipping address. N° de réf. du vendeur 9780789759405
Quantité disponible : Plus de 20 disponibles
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
Etat : New. N° de réf. du vendeur 30617872-n
Quantité disponible : Plus de 20 disponibles