|
Showing 1 - 2 of
2 matches in All Departments
This book explains the ongoing war between private business and
cyber criminals, state-sponsored attackers, terrorists, and
hacktivist groups. Further, it explores the risks posed by trusted
employees that put critical information at risk through malice,
negligence, or simply making a mistake. It clarifies the historical
context of the current situation as it relates to cybersecurity,
the challenges facing private business, and the fundamental changes
organizations can make to better protect themselves. The problems
we face are difficult, but they are not hopeless. Cybercrime
continues to grow at an astounding rate. With constant coverage of
cyber-attacks in the media, there is no shortage of awareness of
increasing threats. Budgets have increased and executives are
implementing stronger defenses. Nonetheless, breaches continue to
increase in frequency and scope. Building a Comprehensive IT
Security Program shares why organizations continue to fail to
secure their critical information assets and explains the internal
and external adversaries facing organizations today. This book
supplies the necessary knowledge and skills to protect
organizations better in the future by implementing a comprehensive
approach to security. Jeremy Wittkop's security expertise and
critical experience provides insights into topics such as: Who is
attempting to steal information and why? What are critical
information assets? How are effective programs built? How is stolen
information capitalized? How do we shift the paradigm to better
protect our organizations? How we can make the cyber world safer
for everyone to do business?
Learn how to build a cybersecurity program for a changing world
with the help of proven best practices and emerging techniques Key
Features Understand what happens in an attack and build the proper
defenses to secure your organization Defend against hacking
techniques such as social engineering, phishing, and many more
Partner with your end user community by building effective security
awareness training programs Book DescriptionSecurity is everyone's
responsibility and for any organization, the focus should be to
educate their employees about the different types of security
attacks and how to ensure that security is not compromised. This
cybersecurity book starts by defining the modern security and
regulatory landscape, helping you understand the challenges related
to human behavior and how attacks take place. You'll then see how
to build effective cybersecurity awareness and modern information
security programs. Once you've learned about the challenges in
securing a modern enterprise, the book will take you through
solutions or alternative approaches to overcome those issues and
explain the importance of technologies such as cloud access
security brokers, identity and access management solutions, and
endpoint security platforms. As you advance, you'll discover how
automation plays an important role in solving some key challenges
and controlling long-term costs while building a maturing program.
Toward the end, you'll also find tips and tricks to keep yourself
and your loved ones safe from an increasingly dangerous digital
world. By the end of this book, you'll have gained a holistic
understanding of cybersecurity and how it evolves to meet the
challenges of today and tomorrow. What you will learn Understand
the macro-implications of cyber attacks Identify malicious users
and prevent harm to your organization Find out how ransomware
attacks take place Work with emerging techniques for improving
security profiles Explore identity and access management and
endpoint security Get to grips with building advanced automation
models Build effective training programs to protect against hacking
techniques Discover best practices to help you and your family stay
safe online Who this book is forThis book is for security
practitioners, including analysts, engineers, and security leaders,
who want to better understand cybersecurity challenges. It is also
for beginners who want to get a holistic view of information
security to prepare for a career in the cybersecurity field.
Business leaders looking to learn about cyber threats and how they
can protect their organizations from harm will find this book
especially useful. Whether you're a beginner or a seasoned
cybersecurity professional, this book has something new for
everyone.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
Barbie
Margot Robbie, Ryan Gosling
Blu-ray disc
R256
Discovery Miles 2 560
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
|