This eBook includes the following formats, accessible from your Account page after purchase:
EPUB The open industry format known for its reflowable content and usability on supported mobile devices.
MOBI The eBook format compatible with the Amazon Kindle and Amazon Kindle applications.
PDF The popular standard, used most often with the free Adobe® Reader® software.
This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.
Also available in other formats.
Register your product to gain access to bonus material or receive a coupon.
This book is a complete guide to establishing a cybersecurity program and governance in your organization. In this book, you will learn how to create cybersecurity policies, standards, procedures, guidelines, and plans —and the differences among them. This book covers the Confidentiality, Integrity & Availability (CIA) security model. You will also learn how threat actors are launching attacks against their victims compromising confidentiality, integrity, and availability of systems and networks. This book covers the NIST Cybersecurity Framework and ISO/IEC 27000-series standards. You will learn how to align security with business strategy, as well as define, inventory, and classify your information and systems.
This book teaches you how to systematically identify, prioritize, and manage cybersecurity risks and reduce social engineering (human) risks with role-based Security Education, Awareness, and Training (SETA). You will also learn how to implement effective physical, environmental, communications, and operational security; and effectively manage access control. In this book you will learn how to respond to incidents and ensure continuity of operations and how to comply with laws and regulations, including GLBA, HIPAA/HITECH, FISMA, state data security and notification rules, and PCI DSS.
Chapter 1. Understanding Cybersecurity Policy and Governance
Chapter 2. Cybersecurity Policy Organization, Format and Styles
Chapter 3. Cybersecurity Framework
Chapter 4. Governance and Risk Management
Chapter 5. Asset Management and Data Loss Prevention
Chapter 6. Human Resources Security
Chapter 7. Physical and Environmental Security
Chapter 8. Communications and Operations Security
Chapter 9. Access Control Management
Chapter 10. Information Systems Acquisition, Development, and Maintenance
Chapter 11. Cybersecurity Incident Response
Chapter 12. Business Continuity Management
Chapter 13. Regulatory Compliance for Financial Institutions
Chapter 14. Regulatory Compliance for the Healthcare Sector
Chapter 15. PCI Compliance for Merchants
Appendix A. Information Security Program Resources
Appendix B. Sample Information Security Policy
Appendix C. Information Systems Acceptable Use Agreement and Policy