Du er ikke logget ind
Beskrivelse
Explore expert strategies to master cyber resilience as a CISO, ensuring your organization's security program stands strong against evolving threats
Key Features
- Unlock expert insights into building robust cybersecurity programs
- Benefit from guidance tailored to CISOs and establish resilient security and compliance programs
- Stay ahead with the latest advancements in cyber defense and risk management including AI integration
- Purchase of the print or Kindle book includes a free PDF eBook
Book Description
This book, written by the CEO of TrustedCISO with 30+ years of experience, guides CISOs in fortifying organizational defenses and safeguarding sensitive data. Analyze a ransomware attack on a fictional company, BigCo, and learn fundamental security policies and controls. With its help, you'll gain actionable skills and insights suitable for various expertise levels, from basic to intermediate. You'll also explore advanced concepts such as zero-trust, managed detection and response, security baselines, data and asset classification, and the integration of AI and cybersecurity. By the end, you'll be equipped to build, manage, and improve a resilient cybersecurity program, ensuring your organization remains protected against evolving threats.
What you will learn
- Defend against cybersecurity attacks and expedite the recovery process
- Protect your network from ransomware and phishing
- Understand products required to lower cyber risk
- Establish and maintain vital offline backups for ransomware recovery
- Understand the importance of regular patching and vulnerability prioritization
- Set up security awareness training
- Create and integrate security policies into organizational processes
Who this book is for
This book is for new CISOs, directors of cybersecurity, directors of information security, aspiring CISOs, and individuals who want to learn how to build a resilient cybersecurity program. A basic understanding of cybersecurity concepts is required.
Table of Contents
- The Attack on BigCo
- Identity and Access Management
- Security Policies
- Security and Risk Management
- Secure Your Endpoints
- Data Safeguarding
- Security Awareness Culture
- Vulnerability Management
- Asset Inventory
- Data Protection
- Taking Your Endpoint Security to the Next Level
- Secure Configuration Baseline
- Classify Your Data and Assets
- Cyber Resilience in the Age of Artificial Intelligence (AI)