All the Knowledge You Need to Build Cybersecurity Programs and Policies That Work
Clearly presents best practices, governance frameworks, and key standards
Includes focused coverage of healthcare, finance, and PCI DSS compliance
An essential and invaluable guide for leaders, managers, and technical professionals
Today, cyberattacks can place entire organizations at risk. Cybersecurity can no longer be delegated to specialists: success requires everyone to work together, from leaders on down. Developing Cybersecurity Programs and Policies offers start-to-finish guidance for establishing effective cybersecurity in any organization. Drawing on more than 20 years of real-world experience, Omar Santos presents realistic best practices for defining policy and governance, ensuring compliance, and collaborating to harden the entire organization.
First, Santos shows how to develop workable cybersecurity policies and an effective framework for governing them. Next, he addresses risk management, asset management, and data loss prevention, showing how to align functions from HR to physical security. You’ll discover best practices for securing communications, operations, and access; acquiring, developing, and maintaining technology; and responding to incidents.
Santos concludes with detailed coverage of compliance in finance and healthcare, the crucial Payment Card Industry Data Security Standard (PCI DSS) standard, and the NIST Cybersecurity Framework.
Whatever your current responsibilities, this guide will help you plan, manage, and lead cybersecurity–and safeguard all the assets that matter.
Learn How To
· Establish cybersecurity policies and governance that serve your organization’s needs
· Integrate cybersecurity program components into a coherent framework for action
· Assess, prioritize, and manage security risk throughout the organization
· Manage assets and prevent data loss
· Work with HR to address human factors in cybersecurity
· Harden your facilities and physical environment
· Design effective policies for securing communications, operations, and access
· Strengthen security throughout the information systems lifecycle
· Plan for quick, effective incident response and ensure business continuity
· Comply with rigorous regulations in finance and healthcare
· Plan for PCI compliance to safely process payments
· Explore and apply the guidance provided by the NIST Cybersecurity Framework
"synopsis" may belong to another edition of this title.
Omar Santos is a principal engineer in the Cisco Product Security Incident Response Team (PSIRT) within the Cisco Security Research and Operations. He mentors and leads engineers and incident managers during the investigation and resolution of security vulnerabilities in all Cisco products, including cloud services. Omar has been working with information technology and cybersecurity since the mid-1990s. Omar has designed, implemented, and supported numerous secure networks for Fortune 100 and 500 companies and the U.S. government. Prior to his current role, he was a technical leader within the World-Wide Security Practice and the Cisco Technical Assistance Center (TAC), where he taught, led, and mentored many engineers within both organizations.
Omar is an active member of the security community, where he leads several industrywide initiatives and standard bodies. His active role helps businesses, academic institutions, state and local law enforcement agencies, and other participants that are dedicated to increasing the security of the critical infrastructure.
Omar often delivers technical presentations at many conferences and to Cisco customers and partners. He is the author of dozens of books and video courses. You can follow Omar on any of the following:
Personal website: omarsantos.io
Twitter: @santosomar
LinkedIn: https://www.linkedin.com/in/santosomar
"About this title" may belong to another edition of this title.
Shipping:
US$ 3.75
Within U.S.A.
Seller: HPB-Red, Dallas, TX, U.S.A.
paperback. Condition: Acceptable. Connecting readers with great books since 1972. Used textbooks may not include companion materials such as access codes, etc. May have condition issues including wear and notes/highlighting. We ship orders daily and Customer Service is our top priority! Seller Inventory # S_413722651
Quantity: 1 available
Seller: TextbookRush, Grandview Heights, OH, U.S.A.
Condition: Very Good. Ships SAME or NEXT business day. We Ship to APO/FPO addr. Choose EXPEDITED shipping and receive in 2-5 business days within the United States. See our member profile for customer support contact info. We have an easy return policy. Seller Inventory # 53737446
Quantity: 1 available
Seller: Book Deals, Tucson, AZ, U.S.A.
Condition: Very Good. Very Good condition. Shows only minor signs of wear, and very minimal markings inside (if any). 2.29. Seller Inventory # 353-0789759403-vrg
Quantity: 1 available
Seller: INDOO, Avenel, NJ, U.S.A.
Condition: New. Seller Inventory # 9780789759405
Quantity: 20 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New. Seller Inventory # 30617872-n
Quantity: Over 20 available
Seller: Book Deals, Tucson, AZ, U.S.A.
Condition: New. New! This book is in the same immaculate condition as when it was published 2.29. Seller Inventory # 353-0789759403-new
Quantity: 1 available
Seller: Grand Eagle Retail, Fairfield, OH, U.S.A.
Paperback. Condition: new. Paperback. This book is a complete guide to establishing a cybersecurity program and governance in your organisation. In this book, you will learn how to create cybersecurity policies, standards, procedures, guidelines, and plans and the differences among them. This book covers the Confidentiality, Integrity & Availability (CIA) security model. You will also learn how threat actors are launching attacks against their victims compromising confidentiality, integrity, and availability of systems and networks. This book covers the NIST Cybersecurity Framework and ISO/IEC 27000-series standards. You will learn how to align security with business strategy, as well as define, inventory, and classify your information and systems. This book teaches you how to systematically identify, prioritise, and manage cybersecurity risks and reduce social engineering (human) risks with role-based Security Education, Awareness, and Training (SETA). You will also learn how to implement effective physical, environmental, communications, and operational security; and effectively manage access control. In this book you will learn how to respond to incidents and ensure continuity of operations and how to comply with laws and regulations, including GLBA, HIPAA/HITECH, FISMA, state data security and notification rules, and PCI DSS. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Seller Inventory # 9780789759405
Quantity: 1 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition. Seller Inventory # 30617872
Quantity: Over 20 available
Seller: Revaluation Books, Exeter, United Kingdom
Paperback. Condition: Brand New. 3rd edition. 600 pages. 9.25x7.00x1.50 inches. In Stock. Seller Inventory # zk0789759403
Quantity: 1 available
Seller: Kennys Bookshop and Art Galleries Ltd., Galway, GY, Ireland
Condition: New. 2018. 3rd Edition. Paperback. . . . . . Seller Inventory # V9780789759405
Quantity: Over 20 available