Books > Computing & IT > Computer communications & networking > Network security
|
Buy Now
Enterprise Cybersecurity Study Guide - How to Build a Successful Cyberdefense Program Against Advanced Threats (Paperback, 1st ed.)
Loot Price: R1,784
Discovery Miles 17 840
You Save: R389
(18%)
|
|
Enterprise Cybersecurity Study Guide - How to Build a Successful Cyberdefense Program Against Advanced Threats (Paperback, 1st ed.)
Expected to ship within 10 - 15 working days
|
Use the methodology in this study guide to design, manage, and
operate a balanced enterprise cybersecurity program that is
pragmatic and realistic in the face of resource constraints and
other real-world limitations. This guide is an instructional
companion to the book Enterprise Cybersecurity: How to Build a
Successful Cyberdefense Program Against Advanced Threats. The study
guide will help you understand the book's ideas and put them to
work. The guide can be used for self-study or in the classroom.
Enterprise cybersecurity is about implementing a cyberdefense
program that will succeed in defending against real-world attacks.
While we often know what should be done, the resources to do it
often are not sufficient. The reality is that the Cybersecurity
Conundrum-what the defenders request, what the frameworks specify,
and what the budget allows versus what the attackers exploit-gets
in the way of what needs to be done. Cyberattacks in the headlines
affecting millions of people show that this conundrum fails more
often than we would prefer. Cybersecurity professionals want to
implement more than what control frameworks specify, and more than
what the budget allows. Ironically, another challenge is that even
when defenders get everything that they want, clever attackers are
extremely effective at finding and exploiting the gaps in those
defenses, regardless of their comprehensiveness. Therefore, the
cybersecurity challenge is to spend the available budget on the
right protections, so that real-world attacks can be thwarted
without breaking the bank. People involved in or interested in
successful enterprise cybersecurity can use this study guide to
gain insight into a comprehensive framework for coordinating an
entire enterprise cyberdefense program. What You'll Learn Know the
methodology of targeted attacks and why they succeed Master the
cybersecurity risk management process Understand why cybersecurity
capabilities are the foundation of effective cyberdefenses Organize
a cybersecurity program's policy, people, budget, technology, and
assessment Assess and score a cybersecurity program Report
cybersecurity program status against compliance and regulatory
frameworks Use the operational processes and supporting information
systems of a successful cybersecurity program Create a data-driven
and objectively managed cybersecurity program Discover how
cybersecurity is evolving and will continue to evolve over the next
decade Who This Book Is For Those involved in or interested in
successful enterprise cybersecurity (e.g., business professionals,
IT professionals, cybersecurity professionals, and students). This
guide can be used in a self-study mode. The book can be used by
students to facilitate note-taking in the classroom and by
Instructors to develop classroom presentations based on the
contents of the original book, Enterprise Cybersecurity: How to
Build a Successful Cyberdefense Program Against Advanced Threats.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.