Buy Cyber Strategy Book by Mark Sweeney - Bookswagon
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer security > Computer fraud and hacking > Cyber Strategy: Risk-Driven Security and Resiliency
Cyber Strategy: Risk-Driven Security and Resiliency

Cyber Strategy: Risk-Driven Security and Resiliency


     0     
5
4
3
2
1



Available


X
About the Book

Cyber Strategy: Risk-Driven Security and Resiliency provides a process and roadmap for any company to develop its unified Cybersecurity and Cyber Resiliency strategies. It demonstrates a methodology for companies to combine their disassociated efforts into one corporate plan with buy-in from senior management that will efficiently utilize resources, target high risk threats, and evaluate risk assessment methodologies and the efficacy of resultant risk mitigations. The book discusses all the steps required from conception of the plan from preplanning (mission/vision, principles, strategic objectives, new initiatives derivation), project management directives, cyber threat and vulnerability analysis, cyber risk and controls assessment to reporting and measurement techniques for plan success and overall strategic plan performance. In addition, a methodology is presented to aid in new initiative selection for the following year by identifying all relevant inputs. Tools utilized include: Key Risk Indicators (KRI) and Key Performance Indicators (KPI) National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF) Target State Maturity interval mapping per initiative Comparisons of current and target state business goals and critical success factors A quantitative NIST-based risk assessment of initiative technology components Responsible, Accountable, Consulted, Informed (RACI) diagrams for Cyber Steering Committee tasks and Governance Boards’ approval processes Swimlanes, timelines, data flow diagrams (inputs, resources, outputs), progress report templates, and Gantt charts for project management The last chapter provides downloadable checklists, tables, data flow diagrams, figures, and assessment tools to help develop your company’s cybersecurity and cyber resiliency strategic plan.

Table of Contents:
Author Biographies. 1 Why Cybersecurity and Cyber Resiliency Strategies Are Mandatory for Organizations Today. 2 The 6 STEPs in Developing and Maintaining a Cybersecurity and Cyber Resiliency Strategy. 3 Strategy Project Management. 4 Cyber Threats, Vulnerabilities, and Intelligence Analysis. 5 Cyber Risks and Controls. 6 Current and Target State Assessments. 7 Measuring Strategic Plan Performance and End of Year (EoY) Tasks. 8 Checklists and Templates to Help Create an Enterprise-Wide Cybersecurity and Cyber Resiliency Strategy

About the Author :
Carol A. Siegel is a Cybersecurity strategy and IT Risk Management professional with over 30+ years’ experience. Carol earned her BS in Systems Analysis Engineering from Boston University in 1971, and her MBA in Computer Applications from New York University in 1984. She has CISSP, CISA and CISM certifications from ISC2 and ISACA respectively. Carol has co-authored one of the first books on Internet security, a book for Microsoft on Windows NT Security as well as numerous articles for Auerbach Publications on information security and risk management. Carol has worked for many Fortune 50 financial services companies in the Banking, Insurance, Big Four, and Pharma sectors and has held several Chief Information Security Officer (CISO) positions. Most recently, Carol worked for the Federal Reserve Bank of New York. Mark Sweeney is a Cybersecurity and Cyber Resiliency professional with over 5 years of experience in strategizing and implementing risk-based cybersecurity and cyber resiliency programs. Mark earned his BS in Security & Risk Analysis – Information & Cyber Security from Penn State University in 2014. Mark has worked in Big Four consulting companies and the Financial Services Industry as a Cybersecurity and Cyber Resiliency expert and is currently a cyber underwriter.

Review :
"This book is an invaluable step-by-step guide to implementing a truly resilient Cybersecurity framework. The universal concepts and strategies presented here are complemented by pragmatic processes, roadmaps, and templates useful in any organization. Whether you're a project manager, a cyber risk analyst, or a C-level executive, this book has something for you." - William Flynn, Independent Management Consultant "Achieving a correctly secured, risk-managed technology environment requires a strong plan, great program management, organizational buy-in, and a focus on execution, none of which happen by accident. This book provides a handy step-by-step guide for the cyber security practitioner in the development and implementation of their security improvement plan, including all-important risk assessments, budgeting, project plans, and governance models to help ensure success (or flag and address problems before they become big issues). Electronic templates available to the purchaser help simplify the work required. The practical application of this book to aid in managing real-world program implementation challenges is its greatest strength." - David S Bauer, Managing Partner and Co-Founder, Holding Ground Decision Intelligence LLC "Cyber security information is a complex topic to understand. There are many organisations offering standards and strategic frameworks that asks you to choose theirs without offering an understanding of the domain first. If you want to learn about the cyber security strategy domain end-to-end then this is the book that does it! You can then use the checklist and templates in the book knowing you are adopting best practice, or if you organisation already has adopted a standard, strengthen these with the information you have learned. " - Ian Thomson, Director of AI Automation Services, SystemsAccountants and Kanbina AI Services "This is the tour de force on designing, implementing and maintaining a modern cyber security and resiliency program. This book is a necessity for all information security and resiliency professionals." - Howard Taylor, CISO of Radware "This is a good, high level overview of cyber strategy and resiliency." - Dean A. Henry, Dean Henry Business & Technology Consulting, LLC


Best Sellers


Product Details
  • ISBN-13: 9780367458171
  • Publisher: Taylor & Francis Ltd
  • Binding: Hardback
  • Language: English
  • Sub Title: Risk-Driven Security and Resiliency
  • Width: 156 mm
  • ISBN-10: 0367458179
  • Publisher Date: 07 Apr 2020
  • Height: 234 mm
  • No of Pages: 200
  • Weight: 453 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Cyber Strategy: Risk-Driven Security and Resiliency
Taylor & Francis Ltd -
Cyber Strategy: Risk-Driven Security and Resiliency
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Cyber Strategy: Risk-Driven Security and Resiliency

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    Fresh on the Shelf


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!