Managing Cybersecurity Risk: Cases Studies and Solutions,2nd Edition


Managing Cybersecurity Risk: Cases Studies and Solutions
ISBN-10: 178719891X
ISBN-13: 9781787198913
Edition 版本:‏ Second Edition,Second edition
Released: 2018-06-01
Print Length 页数: 250 pages

Book Description


The first edition,published November 2016,was targeted at the directors and senior managers of SMEs and larger organisations that have not yet paid sufficient attention to cybersecurity and possibly did not appreciate the scale or severity of permanent risk to their businesses.
The book was an important wake-up call and primer and proved a significant success,including wide global reach and diverse additional use of the chapter content through media outlets.
The new edition,targeted at a similar readership,will provide more detailed information about the cybersecurity environment and specific threats. It will offer advice on the resources available to build defences and the selection of tools and managed services to achieve enhanced security at acceptable cost. A content sharing partnership has been agreed with major technology provider Alien Vault and the 2017 edition will be a larger book of approximately 250 pages.
Contents
Foreword
Preface
List of Contributors
Introduction
Part One Cybersecurity in the Information Age
1.1Building Business Resilience
1.2Enterprise Vulnerablity Scanning
1.3Cybercrime-Translating the Tech from the Floor to the Boardroom
1.4Cybersecurity: Moving from Awareness to Understanding
1.5How Cyber Criminals Make Money
1.6If SMEs are the Life Blood of the British Economy,We’ ve Cut an Artery
Part Two Addressing the Management lssues
2.1Managing Cyber Risk-The Role of the Board
2.2Activating the Human Firewall -The Leap from Knowing to Doing
2.3 The Resilient Organisation-Are We Searching for Our “Phlogiston”?
2.4An Action Plan for Response and Damage Containment
2.5Addressing the Skills Shortage in Cybersecurity
Part Three General Data Protection Regulation
3.1 GDPR-A View from the Frontline
3.2GDPR-Introducing the UK Regime
3.3Using Scenario Workshops to Prepare for GDPR and Other Legislation
3.4GDPR-Comparative International Regimes
3.5Intrusion Detection System Evaluation Guide
Part Four Innovative Tools for Cyber Threat Response
4.1ldentifying Affordable and Cost-effective Solutions
4.2Detecting Ransomware with Unifned Security
4.3Petya Ransomwware Rapid Response Guide
4.4The Incident Response Toolkit: Putting the OODA Loop to Work in the Real World
Part Five Cautionary Tales from the Frontline
5.1The Power of Storytelling
5.2How to Avoid That ‘1 Told You So’ Moment
5.3A Cuckoo in the Nest?
5.4The Trouble with Contractors
5.5Hacked into a Parallel Universe
Contributors’ Contacts

请登录以查看全部内容 登录

打赏
未经允许不得转载:finelybook » Managing Cybersecurity Risk: Cases Studies and Solutions,2nd Edition

评论 抢沙发

觉得文章有用就打赏一下

您的打赏,我们将继续给力更多优质内容

支付宝扫一扫

微信扫一扫