Building Effective Cybersecurity Programs Building Effective Cybersecurity Programs
A Rothstein Publishing Collection eBook

Building Effective Cybersecurity Programs

A Security Manager’s Handbook

    • $42.99
    • $42.99

Publisher Description

You know by now that your company could not survive without the Internet. Not in today’s market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program? Tari Schreider, in Building Effective Cybersecurity Programs: A Security Manager’s Handbook, lays out the step-by-step roadmap to follow as you build or enhance your cybersecurity program.

Over 30+ years, Tari Schreider has designed and implemented cybersecurity programs throughout the world, helping hundreds of companies like yours. Building on that experience, he has created a clear roadmap that will allow the process to go more smoothly for you.
Building Effective Cybersecurity Programs: A Security Manager’s Handbook is organized around the six main steps on the roadmap that will put your cybersecurity program in place:
Design a Cybersecurity ProgramEstablish a Foundation of GovernanceBuild a Threat, Vulnerability Detection, and Intelligence CapabilityBuild a Cyber Risk Management CapabilityImplement a Defense-in-Depth StrategyApply Service Management to Cybersecurity Programs
Because Schreider has researched and analyzed over 150 cybersecurity architectures, frameworks, and models, he has saved you hundreds of hours of research. He sets you up for success by talking to you directly as a friend and colleague, using practical examples. His book helps you to:
Identify the proper cybersecurity program roles and responsibilities. Classify assets and identify vulnerabilities. Define an effective cybersecurity governance foundation. Evaluate the top governance frameworks and models. Automate your governance program to make it more effective. Integrate security into your application development process. Apply defense-in-depth as a multi-dimensional strategy. Implement a service management approach to implementing countermeasures.


With this handbook, you can move forward confidently, trusting that Schreider is recommending the best components of a cybersecurity program for you. In addition, the book provides hundreds of citations and references allow you to dig deeper as you explore specific topics relevant to your organization or your studies.

GENRE
Business & Personal Finance
RELEASED
2017
October 20
LANGUAGE
EN
English
LENGTH
249
Pages
PUBLISHER
Rothstein Publishing
SELLER
Ingram DV LLC
SIZE
17.3
MB

More Books Like This

Building an Effective Cybersecurity Program, 2nd Edition Building an Effective Cybersecurity Program, 2nd Edition
2019
The Cyber Risk Handbook The Cyber Risk Handbook
2017
Enterprise Cybersecurity Enterprise Cybersecurity
2015
Modern Cybersecurity Strategies for Enterprises: Protect and Secure Your Enterprise Networks, Digital Business Assets, and Endpoint Security with Tested and Proven Methods (English Edition) Modern Cybersecurity Strategies for Enterprises: Protect and Secure Your Enterprise Networks, Digital Business Assets, and Endpoint Security with Tested and Proven Methods (English Edition)
2022
Cybersecurity Risk Management Cybersecurity Risk Management
2021
The Essential Guide to Cybersecurity for SMBs The Essential Guide to Cybersecurity for SMBs
2020

More Books by Tari Schreider & Kristen Noakes-Fry

Other Books in This Series

The Manager’s Guide to Enterprise Security Risk Management The Manager’s Guide to Enterprise Security Risk Management
2016
Adaptive Business Continuity: A New Approach Adaptive Business Continuity: A New Approach
2017
The Manager’s Guide to Quick Crisis Response The Manager’s Guide to Quick Crisis Response
2016
The Manager’s Guide to Risk Assessment The Manager’s Guide to Risk Assessment
2017
The Manager’s Guide to Business Continuity Exercises The Manager’s Guide to Business Continuity Exercises
2016
The Manager’s Guide to Simple, Strategic, Service-Oriented Business Continuity The Manager’s Guide to Simple, Strategic, Service-Oriented Business Continuity
2017