Cargando…

8 steps to better security : a simple cyber resilience guide for business /

"Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Crawley, Kim (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken : John Wiley & Sons, Inc., [2021]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1282302724
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 211103s2021 nju o 001 0 eng d
040 |a ITD  |b eng  |e rda  |e pn  |c ITD  |d ITD  |d N$T  |d UKMGB  |d OCLCF  |d UKAHL  |d OCLCO  |d ORMDA  |d WAU  |d OCLCO  |d IEEEE 
015 |a GBC1E6477  |2 bnb 
016 7 |a 020313505  |2 Uk 
020 |a 9781119811251 
020 |a 1119811252 
020 |a 1119811244 
020 |a 9781119811244  |q (electronic bk.) 
020 |a 9781394176823  |q (electronic bk.) 
020 |a 1394176821  |q (electronic bk.) 
020 |z 9781119811237 (pbk.) 
024 7 |a 10.1002/9781394176823  |2 doi 
029 1 |a UKMGB  |b 020313505 
035 |a (OCoLC)1282302724 
037 |a 9781119811244  |b Wiley 
037 |a 9781119811237  |b O'Reilly Media 
037 |a 9932138  |b IEEE 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Crawley, Kim,  |e author. 
245 1 0 |a 8 steps to better security :  |b a simple cyber resilience guide for business /  |c Kim Crawley. 
246 3 |a Eight steps to better security 
264 1 |a Hoboken :  |b John Wiley & Sons, Inc.,  |c [2021] 
300 |a 1 online resource (xx, 204 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Includes index. 
588 0 |a Online resource; title from PDF title page (ProQuest Ebook Central, viewed February 28, 2022). 
520 |a "Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps. Written to be accessible to non-technical businesspeople as well as security professionals, and with insights from other security industry leaders, this important book will walk you through how to: foster a strong security culture that extends from the custodial team to the C-suite; build an effective security team, regardless of the size or nature of your business; comply with regulatory requirements, including general data privacy rules and industry-specific legislation; test your cybersecurity, including third-party penetration testing and internal red team specialists. Perfect for CISOs, security leaders, non-technical businesspeople, and managers at any level, 8 Steps to Better Security is also a must-have resource for companies of all sizes, and in all industries." --  |c Description provided by publisher. 
505 0 |a Foreword -- Introduction -- Chapter 1 Step 1: Foster a Strong Security Culture -- Kevin Mitnick, Human Hacker Extraordinaire -- The Importance of a Strong Security Culture -- Hackers Are the Bad Guys, Right? -- What Is Security Culture? -- How to Foster a Strong Security Culture -- Security Leaders on Security Culture -- What Makes a Good CISO? -- The Biggest Mistakes Businesses Make When It Comes to Cybersecurity -- The Psychological Phases of a Cybersecurity Professional -- Chapter 2 Step 2: Build a Security Team -- Why Step 2 Is Controversial -- How to Hire the Right Security Team. . .the Right Way -- Security Team Tips from Security Leaders -- The "Culture Fit"-Yuck! -- Cybersecurity Budgets -- Design Your Perfect Security Team -- Chapter 3 Step 3: Regulatory Compliance 
505 8 |a What Are Data Breaches, and Why Are They Bad? -- The Scary Truth Found in Data Breach Research -- An Introduction to Common Data Privacy Regulations -- The General Data Protection Regulation -- The California Consumer Privacy Act -- The Health Insurance Portability and Accountability Act -- The Gramm-Leach-Bliley Act -- Payment Card Industry Data Security Standard -- Governance, Risk Management, and Compliance -- More About Risk Management -- Threat Modeling -- Chapter 4 Step 4: Frequent Security Testing -- What Is Security Testing? -- Security Testing Types -- Security Audits -- Vulnerability Assessments Versus Penetration Testing -- Red Team Testing -- Bug Bounty Programs -- What's Security Maturity? -- The Basics of Security Audits and Vulnerability Assessments 
505 8 |a Log Early, Log Often -- Prepare for Vulnerability Assessments and Security Audits -- A Concise Guide to Penetration Testing -- Penetration Testing Based on Network Knowledge -- Penetration Testing Based on Network Aspects -- Security Leaders on Security Maturity -- Security Testing Is Crucial -- Chapter 5 Step 5: Security Framework Application -- What Is Incident Response? -- Preparation -- Identification or Analysis -- Containment, Mitigation, or Eradication -- Recovery -- Post-incident -- Your Computer Security Incident Response Team -- Cybersecurity Frameworks -- NIST Cybersecurity Framework -- ISO 27000 Cybersecurity Frameworks -- CIS Controls -- COBIT Cybersecurity Framework -- Security Frameworks and Cloud Security -- Chapter 6 Step 6: Control Your Data Assets 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Business enterprises  |x Computer networks  |x Security measures. 
650 0 |a Computer networks  |x Management. 
650 0 |a Computer networks  |x Security measures. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Gestion. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a Business enterprises  |x Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00842535 
650 7 |a Computer networks  |x Management.  |2 fast  |0 (OCoLC)fst00872323 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
776 0 8 |i Print version:  |a Crawley, Kim.  |t 8 steps to better security.  |d Hoboken : John Wiley & Sons, Inc., [2022]  |z 9781119811237  |w (OCoLC)1272885750 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781119811237/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH39143296 
938 |a EBSCOhost  |b EBSC  |n 3004173 
994 |a 92  |b IZTAP