A CISO Guide to Cyber Resilience. A how-to guide for every CISO to build a resilient security program - Helion
Tytuł oryginału: A CISO Guide to Cyber Resilience. A how-to guide for every CISO to build a resilient security program
ISBN: 9781835461037
stron: 238, Format: ebook
Data wydania: 2024-04-30
Księgarnia: Helion
Cena książki: 98,10 zł (poprzednio: 109,00 zł)
Oszczędzasz: 10% (-10,90 zł)
This book, written by the CEO of TrustedCISO with 30+ years of experience, guides CISOs in fortifying organizational defenses and safeguarding sensitive data. Analyze a ransomware attack on a fictional company, BigCo, and learn fundamental security policies and controls. With its help, you’ll gain actionable skills and insights suitable for various expertise levels, from basic to intermediate. You’ll also explore advanced concepts such as zero-trust, managed detection and response, security baselines, data and asset classification, and the integration of AI and cybersecurity. By the end, you'll be equipped to build, manage, and improve a resilient cybersecurity program, ensuring your organization remains protected against evolving threats.
Osoby które kupowały "A CISO Guide to Cyber Resilience. A how-to guide for every CISO to build a resilient security program", wybierały także:
- Windows Media Center. Domowe centrum rozrywki 66,67 zł, (8,00 zł -88%)
- Ruby on Rails. Ćwiczenia 18,75 zł, (3,00 zł -84%)
- Przywództwo w świecie VUCA. Jak być skutecznym liderem w niepewnym środowisku 58,64 zł, (12,90 zł -78%)
- Scrum. O zwinnym zarządzaniu projektami. Wydanie II rozszerzone 58,64 zł, (12,90 zł -78%)
- Od hierarchii do turkusu, czyli jak zarządzać w XXI wieku 58,64 zł, (12,90 zł -78%)
Spis treści
A CISO Guide to Cyber Resilience. A how-to guide for every CISO to build a resilient security program eBook -- spis treści
- 1. The Attack on BigCo
- 2. Identity and Access Management
- 3. Security Policies
- 4. Security and Risk Management
- 5. Secure Your Endpoints
- 6. Data Safeguarding
- 7. Security Awareness Culture
- 8. Vulnerability Management
- 9. Asset Inventory
- 10. Data Protection
- 11. Taking Your Endpoint Security to the Next Level
- 12. Secure Configuration Baseline
- 13. Classify Your Data and Assets
- 14. Cyber Resilience in the Age of Artificial Intelligence (AI)