8 Steps to Better Security A Simple Cyber Resilience Guide for Business 1st Edition by Kim Crawley – Ebook PDF Instant Download/Delivery. 9781119811244 ,1119811244
Full download 8 Steps to Better Security A Simple Cyber Resilience Guide for Business 1st Edition after payment
Product details:
ISBN 10: 1119811244
ISBN 13: 9781119811244
Author: Kim Crawley
In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps.
Written to be accessible to non-technical businesspeople as well as security professionals, and with insights from other security industry leaders, this important book will walk you through how to:
- Foster a strong security culture that extends from the custodial team to the C-suite
- Build an effective security team, regardless of the size or nature of your business
- Comply with regulatory requirements, including general data privacy rules and industry-specific legislation
- Test your cybersecurity, including third-party penetration testing and internal red team specialists
Perfect for CISOs, security leaders, non-technical businesspeople, and managers at any level, 8 Steps to Better Security is also a must-have resource for companies of all sizes, and in all industries.
8 Steps to Better Security A Simple Cyber Resilience Guide for Business 1st Edition Table of contents:
Chapter 1: Step 1: Foster a Strong Security Culture
Kevin Mitnick, Human Hacker Extraordinaire
The Importance of a Strong Security Culture
Hackers Are the Bad Guys, Right?
What Is Security Culture?
How to Foster a Strong Security Culture
Security Leaders on Security Culture
What Makes a Good CISO?
The Biggest Mistakes Businesses Make When It Comes to Cybersecurity
The Psychological Phases of a Cybersecurity Professional
Chapter 2: Step 2: Build a Security Team
Why Step 2 Is Controversial
How to Hire the Right Security Team…the Right Way
Security Team Tips from Security Leaders
The “Culture Fit”—Yuck!
Cybersecurity Budgets
Design Your Perfect Security Team
Chapter 3: Step 3: Regulatory Compliance
What Are Data Breaches, and Why Are They Bad?
The Scary Truth Found in Data Breach Research
An Introduction to Common Data Privacy Regulations
Payment Card Industry Data Security Standard
Governance, Risk Management, and Compliance
More About Risk Management
Threat Modeling
Chapter 4: Step 4: Frequent Security Testing
What Is Security Testing?
Security Testing Types
What’s Security Maturity?
The Basics of Security Audits and Vulnerability Assessments
A Concise Guide to Penetration Testing
Security Leaders on Security Maturity
Security Testing Is Crucial
Chapter 5: Step 5: Security Framework Application
What Is Incident Response?
Your Computer Security Incident Response Team
Cybersecurity Frameworks
Chapter 6: Step 6: Control Your Data Assets
The CIA Triad
Access Control
Patch Management
Physical Security and Your Data
Malware
Cryptography Basics
Bring Your Own Device and Working from Home
Data Loss Prevention
Managed Service Providers
The Dark Web and Your Data
Security Leaders on Cyber Defense
Control Your Data
Chapter 7: Step 7: Understand the Human Factor
Social Engineering
Phishing
What Can NFTs and ABA Teach Us About Social Engineering?
How to Prevent Social Engineering Attacks on Your Business
UI and UX Design
Internal Threats
Hacktivism
Note
Chapter 8: Step 8: Build Redundancy and Resilience
Understanding Data and Networks
Building Capacity and Scalability with the Power of the Cloud
Back It Up, Back It Up, Back It Up
RAID
What Ransomware Taught Business About Backups
Business Continuity
Disaster Recovery
Chapter 9: Afterword
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
Step 7
Step 8
Keeping Your Business Cyber Secure
Index
People also search for 8 Steps to Better Security A Simple Cyber Resilience Guide for Business 1st Edition:
8-8 study guide and intervention
m-step assessment integrity guide
kotter 8 steps explained
physical security strategy and process playbook pdf