reklama - zainteresowany?

Resilient Cybersecurity. Reconstruct your defense strategy in an evolving cyber world - Helion

Resilient Cybersecurity. Reconstruct your defense strategy in an evolving cyber world
ebook
Autor: Mark Dunkerley
Tytuł oryginału: Resilient Cybersecurity. Reconstruct your defense strategy in an evolving cyber world
ISBN: 9781835462904
Format: ebook
Księgarnia: Helion

Cena książki: 139,00 zł

Książka będzie dostępna od października 2024

Building a Comprehensive Cybersecurity Program addresses the current challenges and knowledge gaps in cybersecurity, empowering individuals and organizations to navigate the digital landscape securely and effectively. Readers will gain insights into the current state of the cybersecurity landscape, understanding the evolving threats and the challenges posed by skill shortages in the field.

This book emphasizes the importance of prioritizing well-being within the cybersecurity profession, addressing a concern often overlooked in the industry. You will construct a cybersecurity program that encompasses architecture, identity and access management, security operations, vulnerability management, vendor risk management, and cybersecurity awareness. It dives deep into managing Operational Technology (OT) and the Internet of Things (IoT), equipping readers with the knowledge and strategies to secure these critical areas.

You will also explore the critical components of governance, risk, and compliance (GRC) within cybersecurity programs, focusing on the oversight and management of these functions. This book provides practical insights, strategies, and knowledge to help organizations build and enhance their cybersecurity programs, ultimately safeguarding against evolving threats in today's digital landscape.

Spis treści

Resilient Cybersecurity. Reconstruct your defense strategy in an evolving cyber world eBook -- spis treści

  • 1. Current State
  • 2. Setting the Foundations
  • 3. Building your Roadmap
  • 4. Solidifying your Strategy
  • 5. Cybersecurity Architecture
  • 6. Identity & Access Management
  • 7. Cybersecurity Operations
  • 8. Vulnerability Management
  • 9. Cybersecurity Awareness, Training & Testing
  • 10. Supplier Risk Management
  • 11. Proactive Services
  • 12. Operational Technology (OT) & the Internet of Things (IoT)
  • 13. Governance Oversight
  • 14. Managing Risk
  • 15. Regulatory & Compliance
  • 16. Some Final Thoughts

Code, Publish & WebDesing by CATALIST.com.pl



(c) 2005-2024 CATALIST agencja interaktywna, znaki firmowe należą do wydawnictwa Helion S.A.