8 steps to better security a simple cyber resilience guide for business

"Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience...

Descripción completa

Detalles Bibliográficos
Otros Autores: Crawley, Kim, author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Hoboken, New Jersey : John Wiley & Sons, Inc [2022]
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009645677506719
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright Page
  • About the Author
  • Acknowledgments
  • Contents
  • Foreword
  • Introduction
  • Chapter 1 Step 1: Foster a Strong Security Culture
  • Kevin Mitnick, Human Hacker Extraordinaire
  • The Importance of a Strong Security Culture
  • Hackers Are the Bad Guys, Right?
  • What Is Security Culture?
  • How to Foster a Strong Security Culture
  • Security Leaders on Security Culture
  • What Makes a Good CISO?
  • The Biggest Mistakes Businesses Make When It Comes to Cybersecurity
  • The Psychological Phases of a Cybersecurity Professional
  • Chapter 2 Step 2: Build a Security Team
  • Why Step 2 Is Controversial
  • How to Hire the Right Security Team. . .the Right Way
  • Security Team Tips from Security Leaders
  • The "Culture Fit"-Yuck!
  • Cybersecurity Budgets
  • Design Your Perfect Security Team
  • Chapter 3 Step 3: Regulatory Compliance
  • What Are Data Breaches, and Why Are They Bad?
  • The Scary Truth Found in Data Breach Research
  • An Introduction to Common Data Privacy Regulations
  • The General Data Protection Regulation
  • The California Consumer Privacy Act
  • The Health Insurance Portability and Accountability Act
  • The Gramm-Leach-Bliley Act
  • Payment Card Industry Data Security Standard
  • Governance, Risk Management, and Compliance
  • More About Risk Management
  • Threat Modeling
  • Chapter 4 Step 4: Frequent Security Testing
  • What Is Security Testing?
  • Security Testing Types
  • Security Audits
  • Vulnerability Assessments Versus Penetration Testing
  • Red Team Testing
  • Bug Bounty Programs
  • What's Security Maturity?
  • The Basics of Security Audits and Vulnerability Assessments
  • Log Early, Log Often
  • Prepare for Vulnerability Assessments and Security Audits
  • A Concise Guide to Penetration Testing
  • Penetration Testing Based on Network Knowledge.
  • Penetration Testing Based on Network Aspects
  • Security Leaders on Security Maturity
  • Security Testing Is Crucial
  • Chapter 5 Step 5: Security Framework Application
  • What Is Incident Response?
  • Preparation
  • Identification or Analysis
  • Containment, Mitigation, or Eradication
  • Recovery
  • Post-incident
  • Your Computer Security Incident Response Team
  • Cybersecurity Frameworks
  • NIST Cybersecurity Framework
  • ISO 27000 Cybersecurity Frameworks
  • CIS Controls
  • COBIT Cybersecurity Framework
  • Security Frameworks and Cloud Security
  • Chapter 6 Step 6: Control Your Data Assets
  • The CIA Triad
  • Access Control
  • Patch Management
  • Physical Security and Your Data
  • Malware
  • Cryptography Basics
  • Bring Your Own Device and Working from Home
  • Managed Service Providers
  • The Dark Web and Your Data
  • Security Leaders on Cyber Defense
  • Control Your Data
  • Chapter 7 Step 7: Understand the Human Factor
  • Social Engineering
  • Phishing
  • What Can NFTs and ABA Teach Us About Social Engineering?
  • How to Prevent Social Engineering Attacks on Your Business
  • UI and UX Design
  • Internal Threats
  • Hacktivism
  • Chapter 8 Step 8: Build Redundancy and Resilience
  • Understanding Data and Networks
  • Building Capacity and Scalability with the Power of the Cloud
  • Back It Up, Back It Up, Back It Up
  • RAID
  • What Ransomware Taught Business About Backups
  • Business Continuity
  • Disaster Recovery
  • Chapter 9 Afterword
  • Step 1
  • The Most Notorious Cyberattacker Was Actually a Con Man
  • A Strong Security Culture Requires All Hands on Deck
  • Hackers Are the Good Guys, Actually
  • What Is Security Culture?
  • What Makes a Good CISO?
  • The Psychological Phases of a Cybersecurity Professional
  • Recommended Readings
  • Step 2
  • Tackling the Cybersecurity Skills Gap Myth
  • Take "Culture Fit" Out of Your Vocabulary.
  • Your Cybersecurity Budget
  • Recommended Readings
  • Step 3
  • Data Breaches
  • Data Privacy Regulations
  • Risk Management
  • Recommended Readings
  • Step 4
  • Security Audits
  • Vulnerability Assessments
  • Penetration Testing
  • Bug Bounty Programs
  • Recommended Reading
  • Step 5
  • Incident Response
  • Cybersecurity Frameworks
  • Recommended Reading
  • Step 6
  • The CIA Triad
  • Access Control
  • Patch Management
  • Physical Security
  • Malware
  • Cryptography
  • BYOD and Working from Home
  • Data Loss Prevention
  • Managed Service Providers
  • Recommended Reading
  • Step 7
  • Social Engineering
  • UI and UX Design
  • Internal Threats
  • Recommended Readings
  • Step 8
  • Cloud Networks
  • Data Backups
  • Business Continuity and Disaster Recovery
  • Recommended Readings
  • Keeping Your Business Cyber Secure
  • Index
  • EULA.