FOREWORD – 1 page
ABOUT THE AUTHORS – 1 page
ACKNOWLEDGMENTS – 1 page
INTRODUCTION – 2 pages
CHAPTERS
This chapter presents the business case for setting up an enduring IT security awareness and training program for use in training the employees of the company—from IT users to career IT security professionals. This chapter introduces fundamental concepts and terms used throughout the book.
This chapter presents thinking like an IT security professional to establish and maintain common security protections.
This chapter presents a risk management process that involves asset management, security vulnerabilities, security threats, risk identification, risk mitigation, and security controls.
This chapter presents how to establish security scopes and select corresponding controls to protect the confidentiality, availability, and integrity of company information.
This chapter presents how the Chapter 4 IT security process is applied to various scenarios. Each scenario will walk through a number of common security controls and apply the IT security process to identify how to protect company information.
This chapter presents practical guidance on how to write an IT Awareness and Training implementation plan.
This chapter presents human issues related to bringing about enterprise-wide cultural change due to implementation of an IT Awareness and Training Program.
This chapter presents practical guidance for measuring program implementation success and how to use the measurements to achieve awareness and training goals.
This chapter presents practical guidance for monitoring compliance, evaluating feedback and improving the program.
This chapter presents a view of the evolving cybersecurity attacks as they become more capable and sophisticated.
APPENDICES – 10 pages
GLOSSARY – 3 pages
BIBLIOGRAPHY – 3 pages
INDEX – 4 pages
Building an Effective Security Program provides readers with a comprehensive approach to securing the IT systems in use at their organizations. This book provides information on how to structure and operate an effective cybersecurity program that includes people, processes, technologies, security awareness, and training. This program will establish and maintain effective security protections for the confidentiality, availability, and integrity of organization information. In this book, the authors take a pragmatic approach to building organization cyberdefenses that are effective while also remaining affordable.
This book is intended for business leaders, IT professionals, cybersecurity personnel, educators, and students interested in deploying real-world cyberdefenses against today’s persistent and sometimes devastating cyberattacks. It includes detailed explanation of the following IT security topics:
Schlagwörter zu:
Building an Effective Security Program von Chris Williams - mit der ISBN: 9781501506420
COM018000 COMPUTERS / Data Processing; COM021030 COMPUTERS / Database Management / Data Mining; COM032000 COMPUTERS / Information Technology; Cyber Threat; Cybercrime; Cybersecurity; Hacking; Phishing; Security; Virus, Online-Buchhandlung
interessiert haben, schauten sich auch die folgenden Bücher & eBooks an: