The cybersecurity control playbook : from fundamentals to advanced strategies
by
Edwards, Jason (Cybersecurity expert), author.
Title
:
The cybersecurity control playbook : from fundamentals to advanced strategies
Author
:
Edwards, Jason (Cybersecurity expert), author.
ISBN
:
9781394331888
9781394331864
9781394331871
Physical Description
:
1 online resource (xxvii, 510 pages) : color illustrations
General Note
:
Includes index.
Contents
:
Understanding Cybersecurity Controls -- The Risk-Based Approach -- Small Business Implentation -- Medium-Sized Enterprises -- Large Corporations -- Introduction to MITRE ATTACK -- Mapping Threats to Controls using MITRE ATTACK -- Enhancing Defenses with MITRE DEFEND -- Cybersecurity Frameworks Overview -- NIST 800- -- Center for Internet Security 18 Controls -- Agile Implementation of Controls and Control Frameworks -- Adaptive Control Testing & Continuous Improvement -- Testing Controls in Small and Medium Enterprises -- Control Testing in Larger and Complex Enterprises -- Control Failures Identification, Management, and Reporting -- Control Testing for Regulated Companies -- Emerging Threats and Technologies -- Appendix A -- Glossary of Terms -- Appendix B -- Risk Register Example -- Appendix C -- Risk Taxonomy -- Appendix D -- SME Security Team Structure -- Appendix E -- Developing Process Maps -- Appendix F -- Establishing a Regulatory Change Management Program -- Appendix G -- Recommended Metrics for MITRE ATTACK Techniques.
Abstract
:
"This book is an essential resource for anyone looking to protect their organization in the digital age; whether running a small business, managing a medium-sized company, or leading a large corporation, this book contains strategies that will fit all needs. Written in a highly accessible, jargon-free style, the highly experienced author shares his advice for effective cybersecurity controls which are crucial for protecting sensitive data, maintaining system integrity, and ensuring privacy. They help prevent data breaches, reduce financial risks, and build trust. Additionally, they are vital for meeting regulatory requirements in various industries. As technology advances, these controls will become increasingly important in securing our digital world. Each chapter provides clear explanations of foundational concepts before delving into more advanced topics, ensuring that readers understand the basics. Additionally, the book includes appendices and links to online resources for those who need to brush up on specific skills. By incorporating these supportive elements, the book ensures that all readers can fully grasp and apply the cybersecurity strategies discussed regardless of their starting point"-- Provided by publisher.
Local Note
:
John Wiley and Sons
Subject Term
:
Computer security.
Data protection.
Business enterprises -- Data processing -- Security measures.
Sécurité informatique.
Protection de l'information (Informatique)
Entreprises -- Informatique -- Sécurité -- Mesures.
Cryptography.
Cybernetics.
COMPUTERS.
Networking.
Security.
Genre
:
Electronic books.
Added Corporate Author
:
John Wiley & Sons,
Electronic Access
:
| Library | Material Type | Item Barcode | Shelf Number | [[missing key: search.ChildField.HOLDING]] | Status |
|---|
| Online Library | E-Book | 599789-1001 | QA76.9 .A25 E3884 2025 | | Wiley E-Kitap Koleksiyonu |