Dengarkan dan baca

Masuki dunia cerita tanpa batas

  • Baca dan dengarkan sebanyak yang Anda mau
  • Lebih dari 1 juta judul
  • Judul eksklusif + Storytel Original
  • Uji coba gratis 14 hari, lalu €9,99/bulan
  • Mudah untuk membatalkan kapan saja
Coba gratis
Details page - Device banner - 894x1036

Building Effective Cybersecurity Programs: A Security Manager’s Handbook

Seri

1 of 13

Bahasa
Inggris
Format
Kategori

Ekonomi & Bisnis

You know by now that your company could not survive without the Internet. Not in today’s market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program? Tari Schreider, in Building Effective Cybersecurity Programs: A Security Manager’s Handbook, lays out the step-by-step roadmap to follow as you build or enhance your cybersecurity program.

Over 30+ years, Tari Schreider has designed and implemented cybersecurity programs throughout the world, helping hundreds of companies like yours. Building on that experience, he has created a clear roadmap that will allow the process to go more smoothly for you. Building Effective Cybersecurity Programs: A Security Manager’s Handbook is organized around the six main steps on the roadmap that will put your cybersecurity program in place:

1. Design a Cybersecurity Program 2. Establish a Foundation of Governance 3. Build a Threat, Vulnerability Detection, and Intelligence Capability 4. Build a Cyber Risk Management Capability 5. Implement a Defense-in-Depth Strategy 6. Apply Service Management to Cybersecurity Programs

Because Schreider has researched and analyzed over 150 cybersecurity architectures, frameworks, and models, he has saved you hundreds of hours of research. He sets you up for success by talking to you directly as a friend and colleague, using practical examples. His book helps you to:

• Identify the proper cybersecurity program roles and responsibilities. • Classify assets and identify vulnerabilities. • Define an effective cybersecurity governance foundation. • Evaluate the top governance frameworks and models. • Automate your governance program to make it more effective. • Integrate security into your application development process. • Apply defense-in-depth as a multi-dimensional strategy. • Implement a service management approach to implementing countermeasures.

With this handbook, you can move forward confidently, trusting that Schreider is recommending the best components of a cybersecurity program for you. In addition, the book provides hundreds of citations and references allow you to dig deeper as you explore specific topics relevant to your organization or your studies.

© 2017 Rothstein Publishing (buku elektronik ): 9781944480509

Tanggal rilis

buku elektronik : 20 Oktober 2017

Yang lain juga menikmati...

Selalu dengan Storytel

  • Lebih dari 900.000 judul

  • Mode Anak (lingkungan aman untuk anak)

  • Unduh buku untuk akses offline

  • Batalkan kapan saja

Terpopuler

Premium

Bagi yang ingin mendengarkan dan membaca tanpa batas.

Rp39000 /bulan
7 hari gratis
  • 1 akun

  • Akses Tanpa Batas

  • Akses bulanan tanpa batas

  • Batalkan kapan saja

  • Judul dalam bahasa Inggris dan Indonesia

Coba sekarang

Premium 6 bulan

Bagi yang ingin mendengarkan dan membaca tanpa batas

Rp189000 /6 bulan
7 hari gratis
Hemat 19%
  • 1 akun

  • Akses Tanpa Batas

  • Akses bulanan tanpa batas

  • Batalkan kapan saja

  • Judul dalam bahasa Inggris dan Indonesia

Coba sekarang

Local

Bagi yang hanya ingin mendengarkan dan membaca dalam bahasa lokal.

Rp19900 /bulan
7 hari gratis
  • 1 akun

  • Akses Tanpa Batas

  • Akses tidak terbatas

  • Batalkan kapan saja

  • Judul dalam bahasa Indonesia

Coba sekarang

Local 6 bulan

Bagi yang hanya ingin mendengarkan dan membaca dalam bahasa lokal.

Rp89000 /6 bulan
7 hari gratis
Hemat 25%
  • 1 akun

  • Akses Tanpa Batas

  • Akses tidak terbatas

  • Batalkan kapan saja

  • Judul dalam bahasa Indonesia

Coba sekarang