|
Showing 1 - 2 of
2 matches in All Departments
Use the methodology in this study guide to design, manage, and
operate a balanced enterprise cybersecurity program that is
pragmatic and realistic in the face of resource constraints and
other real-world limitations. This guide is an instructional
companion to the book Enterprise Cybersecurity: How to Build a
Successful Cyberdefense Program Against Advanced Threats. The study
guide will help you understand the book's ideas and put them to
work. The guide can be used for self-study or in the classroom.
Enterprise cybersecurity is about implementing a cyberdefense
program that will succeed in defending against real-world attacks.
While we often know what should be done, the resources to do it
often are not sufficient. The reality is that the Cybersecurity
Conundrum-what the defenders request, what the frameworks specify,
and what the budget allows versus what the attackers exploit-gets
in the way of what needs to be done. Cyberattacks in the headlines
affecting millions of people show that this conundrum fails more
often than we would prefer. Cybersecurity professionals want to
implement more than what control frameworks specify, and more than
what the budget allows. Ironically, another challenge is that even
when defenders get everything that they want, clever attackers are
extremely effective at finding and exploiting the gaps in those
defenses, regardless of their comprehensiveness. Therefore, the
cybersecurity challenge is to spend the available budget on the
right protections, so that real-world attacks can be thwarted
without breaking the bank. People involved in or interested in
successful enterprise cybersecurity can use this study guide to
gain insight into a comprehensive framework for coordinating an
entire enterprise cyberdefense program. What You'll Learn Know the
methodology of targeted attacks and why they succeed Master the
cybersecurity risk management process Understand why cybersecurity
capabilities are the foundation of effective cyberdefenses Organize
a cybersecurity program's policy, people, budget, technology, and
assessment Assess and score a cybersecurity program Report
cybersecurity program status against compliance and regulatory
frameworks Use the operational processes and supporting information
systems of a successful cybersecurity program Create a data-driven
and objectively managed cybersecurity program Discover how
cybersecurity is evolving and will continue to evolve over the next
decade Who This Book Is For Those involved in or interested in
successful enterprise cybersecurity (e.g., business professionals,
IT professionals, cybersecurity professionals, and students). This
guide can be used in a self-study mode. The book can be used by
students to facilitate note-taking in the classroom and by
Instructors to develop classroom presentations based on the
contents of the original book, Enterprise Cybersecurity: How to
Build a Successful Cyberdefense Program Against Advanced Threats.
Enterprise Cybersecurity empowers organizations of all sizes to
defend themselves with next-generation cybersecurity programs
against the escalating threat of modern targeted cyberattacks. This
book presents a comprehensive framework for managing all aspects of
an enterprise cybersecurity program. It enables an enterprise to
architect, design, implement, and operate a coherent cybersecurity
program that is seamlessly coordinated with policy, programmatics,
IT life cycle, and assessment. Fail-safe cyberdefense is a pipe
dream. Given sufficient time, an intelligent attacker can
eventually defeat defensive measures protecting an enterprise's
computer systems and IT networks. To prevail, an enterprise
cybersecurity program must manage risk by detecting attacks early
enough and delaying them long enough that the defenders have time
to respond effectively. Enterprise Cybersecurity shows players at
all levels of responsibility how to unify their organization's
people, budgets, technologies, and processes into a cost-efficient
cybersecurity program capable of countering advanced cyberattacks
and containing damage in the event of a breach. The authors of
Enterprise Cybersecurity explain at both strategic and tactical
levels how to accomplish the mission of leading, designing,
deploying, operating, managing, and supporting cybersecurity
capabilities in an enterprise environment. The authors are
recognized experts and thought leaders in this rapidly evolving
field, drawing on decades of collective experience in cybersecurity
and IT. In capacities ranging from executive strategist to systems
architect to cybercombatant, Scott E. Donaldson, Stanley G. Siegel,
Chris K. Williams, and Abdul Aslam have fought on the front lines
of cybersecurity against advanced persistent threats to government,
military, and business entities.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
|