Inicio > > Seguridad informática > Resilient Cybersecurity
Resilient Cybersecurity

Resilient Cybersecurity

Mark Dunkerley

76,30 €
IVA incluido
Disponible
Editorial:
Packt Publishing
Año de edición:
2024
Materia
Seguridad informática
ISBN:
9781835462515
76,30 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Build a robust cybersecurity program that adapts to the constantly evolving threat landscapeKey Features:- Gain a deep understanding of the current state of cybersecurity, including insights into the latest threats such as Ransomware and AI- Lay the foundation of your cybersecurity program with a comprehensive approach allowing for continuous maturity- Equip yourself and your organizations with the knowledge and strategies to build and manage effective cybersecurity strategiesBook Description:Building a Comprehensive Cybersecurity Program addresses the current challenges and knowledge gaps in cybersecurity, empowering individuals and organizations to navigate the digital landscape securely and effectively. Readers will gain insights into the current state of the cybersecurity landscape, understanding the evolving threats and the challenges posed by skill shortages in the field.This book emphasizes the importance of prioritizing well-being within the cybersecurity profession, addressing a concern often overlooked in the industry. You will construct a cybersecurity program that encompasses architecture, identity and access management, security operations, vulnerability management, vendor risk management, and cybersecurity awareness. It dives deep into managing Operational Technology (OT) and the Internet of Things (IoT), equipping readers with the knowledge and strategies to secure these critical areas.You will also explore the critical components of governance, risk, and compliance (GRC) within cybersecurity programs, focusing on the oversight and management of these functions. This book provides practical insights, strategies, and knowledge to help organizations build and enhance their cybersecurity programs, ultimately safeguarding against evolving threats in today’s digital landscape.What You Will Learn:- Build and define a cybersecurity program foundation- Discover the importance of why an architecture program is needed within cybersecurity- Learn the importance of Zero Trust Architecture- Learn what modern identity is and how to achieve it- Review of the importance of why a Governance program is needed- Build a comprehensive user awareness, training, and testing program for your users- Review what is involved in a mature Security Operations Center- Gain a thorough understanding of everything involved with regulatory and complianceWho this book is for:This book is geared towards the top leaders within an organization, C-Level, CISO, and Directors who run the cybersecurity program as well as management, architects, engineers and analysts who help run a cybersecurity program. Basic knowledge of Cybersecurity and its concepts will be helpful.Table of Contents- Current State- Setting the Foundations- Building your Roadmap- Solidifying your Strategy- Cybersecurity Architecture- Identity & Access Management- Cybersecurity Operations- Vulnerability Management- Cybersecurity Awareness, Training & Testing- Supplier Risk Management- Proactive Services- Operational Technology (OT) & the Internet of Things (IoT)- Governance Oversight- Managing Risk- Regulatory & Compliance- Some Final Thoughts

Artículos relacionados

  • Information Security and Ethics
    Quigley
    ...
  • Cybersecurity Fundamentals Explained
    Brian Mackay
    The issue of Cybersecurity is of paramount importance in the digital age. With near-continuous revelations about incidents and breaches in the media, organizations and individuals are faced with the challenge of finding the balance between risk, innovation, and cost. At the same time, the field of cybersecurity is undergoing dramatic changes, demanding that organizations embrac...
    Disponible

    22,44 €

  • Improving Security, Privacy, and Trust in Cloud Computing
    Cloud computing adoption has revolutionized how businesses and individuals harness the power of technology. The cloud’s scalability, accessibility, and cost-efficiency have propelled it to the forefront of modern computing paradigms. However, as organizations increasingly rely on cloud services to store, process, and manage their data and applications, an intricate web of chall...
  • Enhancing Performance, Efficiency, and Security Through Complex Systems Control
    Academic scholars and professionals in engineering strive to enhance the performance, efficiency, and security of complex systems, but accessing comprehensive resources for these challenges can be daunting. Enhancing Performance, Efficiency, and Security Through Complex Systems Control offers an ideal solution. Edited by esteemed academics Idriss Chana, Aziz Bouazi, and Hussain...
    Disponible

    294,76 €

  • Enhancing Performance, Efficiency, and Security Through Complex Systems Control
    Academic scholars and professionals in engineering strive to enhance the performance, efficiency, and security of complex systems, but accessing comprehensive resources for these challenges can be daunting. Enhancing Performance, Efficiency, and Security Through Complex Systems Control offers an ideal solution. Edited by esteemed academics Idriss Chana, Aziz Bouazi, and Hussain...
  • Emerging Technologies and Security in Cloud Computing
    In today’s digital age, the exponential growth of cloud computing services has brought significant opportunities for businesses and individuals alike. However, this surge in cloud adoption has also ushered in a host of critical concerns, with the paramount issues being data privacy and security. The goal of protecting sensitive information from cyber threats and ensuring confid...

Otros libros del autor