Enterprise Cybersecurity Study Guide How to Build a Successful Cyberdefense Program Against Advanced Threats

Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How...

Descripción completa

Detalles Bibliográficos
Autores principales: Donaldson, Scott E. author (author), Siegel, Stanley G. author, Williams, Chris K. author, Aslam, Abdul. author
Formato: Libro electrónico
Idioma:Inglés
Publicado: Berkeley, CA : Apress 2018.
Edición:1st ed. 2018.
Colección:The expert's voice in cybersecurity
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009630582406719
Tabla de Contenidos:
  • Part I: The Cybersecurity Challenge
  • Chapter 1: Defining the Cybersecurity Challenge
  • Chapter 2: Meeting the Cybersecurity Challenge
  • Part II: A New Enterprise Cybersecurity Architecture
  • Chapter 3: Enterprise Cybersecurity Architecture
  • Chapter 4: Implementing Enterprise Cybersecurity
  • Chapter 5: Operating Enterprise Cybersecurity
  • Chapter 6: Enterprise Cybersecurity and the Cloud
  • Chapter 7: Enterprise Cybersecurity for Mobile and BYOD
  • Part III: The Art of Cyber Defense
  • Chapter 8: Building an Effective Defense
  • Chapter 9: Responding to Incidents
  • Chapter 10: Managing a Cybersecurity Crisis
  • Part IV: Enterprise Cyber Defense Assessment
  • Chapter 11: Assessing Enterprise Cybersecurity
  • Chapter 12: Measuring a Cybersecurity Program
  • Chapter 13: Mapping Against Cybersecurity Frameworks
  • Part V: Enterprise Cybersecurity Program
  • Chapter 14: Managing an Enterprise Cybersecurity Program
  • Chapter 15: Looking to the Future
  • Part VI: Appendices
  • Appendix A: Sample Cybersecurity Policy
  • Appendix B: Cybersecurity Operational Processes
  • Appendix C: Object Measurement
  • Appendix D: Cybersecurity Sample Assessment
  • Appendix E: Cybersecurity Capability Value Scales.