The cybersecurity control playbook : from fundamentals to advanced strategies
by
 
Edwards, Jason (Cybersecurity expert), author.

Title
The cybersecurity control playbook : from fundamentals to advanced strategies

Author
Edwards, Jason (Cybersecurity expert), author.

ISBN
9781394331888
 
9781394331864
 
9781394331871

Physical Description
1 online resource (xxvii, 510 pages) : color illustrations

General Note
Includes index.

Contents
Understanding Cybersecurity Controls -- The Risk-Based Approach -- Small Business Implentation -- Medium-Sized Enterprises -- Large Corporations -- Introduction to MITRE ATTACK -- Mapping Threats to Controls using MITRE ATTACK -- Enhancing Defenses with MITRE DEFEND -- Cybersecurity Frameworks Overview -- NIST 800- -- Center for Internet Security 18 Controls -- Agile Implementation of Controls and Control Frameworks -- Adaptive Control Testing & Continuous Improvement -- Testing Controls in Small and Medium Enterprises -- Control Testing in Larger and Complex Enterprises -- Control Failures Identification, Management, and Reporting -- Control Testing for Regulated Companies -- Emerging Threats and Technologies -- Appendix A -- Glossary of Terms -- Appendix B -- Risk Register Example -- Appendix C -- Risk Taxonomy -- Appendix D -- SME Security Team Structure -- Appendix E -- Developing Process Maps -- Appendix F -- Establishing a Regulatory Change Management Program -- Appendix G -- Recommended Metrics for MITRE ATTACK Techniques.

Abstract
"This book is an essential resource for anyone looking to protect their organization in the digital age; whether running a small business, managing a medium-sized company, or leading a large corporation, this book contains strategies that will fit all needs. Written in a highly accessible, jargon-free style, the highly experienced author shares his advice for effective cybersecurity controls which are crucial for protecting sensitive data, maintaining system integrity, and ensuring privacy. They help prevent data breaches, reduce financial risks, and build trust. Additionally, they are vital for meeting regulatory requirements in various industries. As technology advances, these controls will become increasingly important in securing our digital world. Each chapter provides clear explanations of foundational concepts before delving into more advanced topics, ensuring that readers understand the basics. Additionally, the book includes appendices and links to online resources for those who need to brush up on specific skills. By incorporating these supportive elements, the book ensures that all readers can fully grasp and apply the cybersecurity strategies discussed regardless of their starting point"-- Provided by publisher.

Local Note
John Wiley and Sons

Subject Term
Computer security.
 
Data protection.
 
Business enterprises -- Data processing -- Security measures.
 
Sécurité informatique.
 
Protection de l'information (Informatique)
 
Entreprises -- Informatique -- Sécurité -- Mesures.
 
Cryptography.
 
Cybernetics.
 
COMPUTERS.
 
Networking.
 
Security.

Genre
Electronic books.

Added Corporate Author
John Wiley & Sons,

Electronic Access
https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888


LibraryMaterial TypeItem BarcodeShelf Number[[missing key: search.ChildField.HOLDING]]Status
Online LibraryE-Book599789-1001QA76.9 .A25 E3884 2025Wiley E-Kitap Koleksiyonu