UID:
almahu_9949907353302882
Format:
1 online resource (238 pages)
ISBN:
1835461034
,
9781835461037
,
9781835466926
Content:
The rising number of cybersecurity attacks is a top concern for organizations across the globe. Amid the ever-evolving cybersecurity landscape, CISOs play a crucial role in fortifying organizational defenses and safeguarding sensitive data. Written by the CEO of TrustedCISO, with 30+ years of experience, A CISO Guide to Cyber Resilience will take you through some of the latest and most significant large-scale cyber-attacks and guide you on how to make your network cyber-resilient so your company can quickly recover from any attack. You'll begin with an in-depth analysis of a ransomware attack targeting a fictional company, BigCo, understanding its impact and response strategies, and then delve into fundamental security policies and controls. As you progress, you'll find that every chapter provides actionable skills and insights suitable for various levels of expertise, from basic to intermediate. Toward the end, you'll explore advanced concepts such as zero-trust, managed detection and response, security baselines, data and asset classification, and the integration of artificial intelligence and cybersecurity. By the end of this book, you'll be equipped with the knowledge and skills necessary to build, manage, and improve a resilient cybersecurity program, ensuring your organization remains protected against evolving threats.
Note:
A CISO guide to cyber resilience : A how-to guide for every CISO to build a resilient security program -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Attack on BigCo -- Chapter 1: The Attack on BigCo -- Part 2: Security Resilience: Getting the Basics Down -- Chapter 2: Identity and Access Management -- Chapter 3: Security Policies -- Chapter 4: Security and Risk Management -- Chapter 5: Securing Your Endpoints -- Chapter 6: Data Safeguarding -- Chapter 7: Security Awareness Culture -- Chapter 8: Vulnerability Management -- Chapter 9: Asset Inventory -- Chapter 10: Data Protection -- Part 3: Security Resilience: Taking Your Security Program to the Next Level -- Chapter 11: Taking Your Endpoint Security to the Next Level -- Chapter 12: Secure Configuration Baseline -- Chapter 13: Classify Your Data and Assets -- Chapter 14: Cyber Resilience in the Age of Artificial Intelligence (AI) -- Index.
,
Mode of access: World Wide Web.
Language:
English
Keywords:
Electronic books.
URL:
https://portal.igpublish.com/iglibrary/search/PACKT0007157.html
URL:
Volltext
(URL des Erstveröffentlichers)
Bookmarklink