A CISO Guide to Cyber Resilience - Debra Baker

A CISO Guide to Cyber Resilience

A how-to guide for every CISO to build a resilient security program

(Autor)

Buch | Softcover
238 Seiten
2024
Packt Publishing Limited (Verlag)
978-1-83546-692-6 (ISBN)
56,10 inkl. MwSt
Explore expert strategies to master cyber resilience as a CISO, ensuring your organization's security program stands strong against evolving threats

Key Features

Unlock expert insights into building robust cybersecurity programs
Benefit from guidance tailored to CISOs and establish resilient security and compliance programs
Stay ahead with the latest advancements in cyber defense and risk management including AI integration
Purchase of the print or Kindle book includes a free PDF eBook

Book DescriptionThe rising number of cybersecurity attacks is a top concern for organizations across the globe. Amid the ever-evolving cybersecurity landscape, CISOs play a crucial role in fortifying organizational defenses and safeguarding sensitive data. Written by the CEO of TrustedCISO, with 30+ years of experience, A CISO Guide to Cyber Resilience will take you through some of the latest and most significant large-scale cyber-attacks and guide you on how to make your network cyber-resilient so your company can quickly recover from any attack.
You’ll begin with an in-depth analysis of a ransomware attack targeting a fictional company, BigCo, understanding its impact and response strategies, and then delve into fundamental security policies and controls. As you progress, you’ll find that every chapter provides actionable skills and insights suitable for various levels of expertise, from basic to intermediate. Toward the end, you’ll explore advanced concepts such as zero-trust, managed detection and response, security baselines, data and asset classification, and the integration of artificial intelligence and cybersecurity.
By the end of this book, you’ll be equipped with the knowledge and skills necessary to build, manage, and improve a resilient cybersecurity program, ensuring your organization remains protected against evolving threats. What you will learn

Defend against cybersecurity attacks and expedite the recovery process
Protect your network from ransomware and phishing
Understand products required to lower cyber risk
Establish and maintain vital offline backups for ransomware recovery
Understand the importance of regular patching and vulnerability prioritization
Set up security awareness training
Create and integrate security policies into organizational processes

Who this book is forThis book is for new CISOs, directors of cybersecurity, directors of information security, aspiring CISOs, and individuals who want to learn how to build a resilient cybersecurity program. A basic understanding of cybersecurity concepts is required.

Debra Baker has 30 years of experience in Information Security. As CEO of TrustedCISO, Debra provides strategic cybersecurity CISO Advisory Services. She has an AI first startup aiming to power through the pain of Third Party Vendor Assessment and Compliance. Previously, Debra was CISO at RedSeal where she led the security program successfully getting SOC2 Type 2. Previously, she served as Regulatory Compliance Manager at Cisco. While at Cisco she founded the cryptographic knowledge base, CryptoDoneRight in collaboration with Johns Hopkins University. Debra was named one of the top 100 Women in Cybersecurity, "Women Know Cyber: 100 Fascinating Females Fighting Cybercrime."

Table of Contents

The Attack on BigCo
Identity and Access Management
Security Policies
Security and Risk Management
Secure Your Endpoints
Data Safeguarding
Security Awareness Culture
Vulnerability Management
Asset Inventory
Data Protection
Taking Your Endpoint Security to the Next Level
Secure Configuration Baseline
Classify Your Data and Assets
Cyber Resilience in the Age of Artificial Intelligence (AI)

Erscheinungsdatum
Vorwort Ray Rothrock
Verlagsort Birmingham
Sprache englisch
Maße 191 x 235 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
ISBN-10 1-83546-692-3 / 1835466923
ISBN-13 978-1-83546-692-6 / 9781835466926
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Konzepte – Verfahren – Protokolle

von Claudia Eckert

Buch | Hardcover (2023)
De Gruyter Oldenbourg (Verlag)
84,95