Cyber Guardians Empowering Board Members for Effective Cybersecurity /
A comprehensive overview for directors aiming to meet their cybersecurity responsibilities In Cyber Guardians: Empowering Board Members for Effective Cybersecurity, veteran cybersecurity advisor Bart McDonough delivers a comprehensive and hands-on roadmap to effective cybersecurity oversight for dir...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Hoboken, New Jersey :
John Wiley & Sons, Inc.,
[2024]
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Intro
- Table of Contents
- Title Page
- Preface: What to Expect from This Book
- Chapter 1: Introduction
- Summary of a Board's Incident Response
- Checklist for a Board's Incident Response
- Chapter 2: Cybersecurity Basics
- CIA Framework
- Key Cybersecurity Concepts and Terminology for Board Members
- Common Cyber Threats and Risks Faced by Companies
- Key Technologies and Defense Strategies
- Threat Intelligence
- Threat Actors
- MITRE ATT&CK Framework
- Chapter 2 Summary
- Chapter 3: Legal and Regulatory Landscape
- Overview of Relevant Cybersecurity Regulations and Laws
- Discussion of Compliance Requirements and Industry Standards
- Individual Director Liability
- Chapter 3 Summary
- Chapter 4: Board Oversight of Cybersecurity
- The Board's Role in Overseeing Cybersecurity Strategy
- Developing an Effective Cybersecurity Governance Framework
- Best Practices for Board Engagement and Reporting
- Overcoming Objections to Effective Cybersecurity Oversight
- Promoting a Cybersecurity Culture
- Chapter 4 Summary
- Chapter 5: Board Oversight of Cybersecurity: Ensuring Effective Governance
- The Role of the Board in Overseeing Cybersecurity
- Developing an Effective Cybersecurity Governance Framework
- Strategies for Identifying, Assessing, and Prioritizing Cyber Risks
- Conducting Cybersecurity Risk Assessments
- How to Develop and Promote a Culture of Cybersecurity
- Chapter 5 Summary
- Chapter 6: Incident Response and Business Continuity Planning
- Implementing Cybersecurity Policies and Procedures
- Incident Response and Business Continuity Planning
- Incident Response Planning
- Defining the Types of Assessments
- Chapter 6 Summary
- Chapter 7: Vendor Management and Third-Party Risk
- The Importance of Third-Party Risk Management for Board Members
- Best Practices for Managing Third-Party Cyber Risk
- Legal and Regulatory Considerations in Third-Party Risk Management
- Sample Questions to ask Third-Party Vendors
- Chapter 7 Summary
- Chapter 8: Cybersecurity Training and Awareness
- Importance of Cybersecurity Awareness for All Employees
- Strategies for Providing Effective Training and Awareness Programs
- More Detail on Effective Training Strategies
- Chapter 8 Summary
- Chapter 9: Cyber Insurance
- Understanding Cyber Insurance
- Key Components of Cyber Insurance
- Evaluating and Purchasing Cyber Insurance
- Managing and Reviewing the Cyber Insurance Policy
- Chapter 9 Summary
- Chapter 10: Conclusion: Moving Forward with Cybersecurity Governance
- The Board's Role in Cybersecurity Governance
- Key Takeaways and Action Items for Board Members
- Chapter 10 Summary
- Appendix A: Checklist of Key Considerations for Board Members
- Appendix B: Sample Questions
- Appendix C: Sample Board Meeting Agenda
- Appendix D: List of Key Vendors
- Appendix E: Cybersecurity Resources
- Appendix F: Cybersecurity Books