Developing Cybersecurity Programs and Policies
Home > Computing and Information Technology > Computer networking and communications > Network security > Developing Cybersecurity Programs and Policies
Developing Cybersecurity Programs and Policies

Developing Cybersecurity Programs and Policies

|
     0     
5
4
3
2
1




Out of Stock


Notify me when this book is in stock
About the Book

All the Knowledge You Need to Build Cybersecurity Programs and Policies That Work Clearly presents best practices, governance frameworks, and key standards Includes focused coverage of healthcare, finance, and PCI DSS compliance An essential and invaluable guide for leaders, managers, and technical professionals Today, cyberattacks can place entire organizations at risk. Cybersecurity can no longer be delegated to specialists: success requires everyone to work together, from leaders on down. Developing Cybersecurity Programs and Policies offers start-to-finish guidance for establishing effective cybersecurity in any organization. Drawing on more than 20 years of real-world experience, Omar Santos presents realistic best practices for defining policy and governance, ensuring compliance, and collaborating to harden the entire organization. First, Santos shows how to develop workable cybersecurity policies and an effective framework for governing them. Next, he addresses risk management, asset management, and data loss prevention, showing how to align functions from HR to physical security. You’ll discover best practices for securing communications, operations, and access; acquiring, developing, and maintaining technology; and responding to incidents. Santos concludes with detailed coverage of compliance in finance and healthcare, the crucial Payment Card Industry Data Security Standard (PCI DSS) standard, and the NIST Cybersecurity Framework. Whatever your current responsibilities, this guide will help you plan, manage, and lead cybersecurity–and safeguard all the assets that matter. Learn How To ·         Establish cybersecurity policies and governance that serve your organization’s needs ·         Integrate cybersecurity program components into a coherent framework for action ·         Assess, prioritize, and manage security risk throughout the organization ·         Manage assets and prevent data loss ·         Work with HR to address human factors in cybersecurity ·         Harden your facilities and physical environment ·         Design effective policies for securing communications, operations, and access ·         Strengthen security throughout the information systems lifecycle ·         Plan for quick, effective incident response and ensure business continuity ·         Comply with rigorous regulations in finance and healthcare ·         Plan for PCI compliance to safely process payments ·         Explore and apply the guidance provided by the NIST Cybersecurity Framework  

Table of Contents:
Chapter 1: Understanding Cybersecurity Policy and Governance Information Security vs. Cybersecurity Policies Looking at Policy Through the Ages     Policy in Ancient Times     The United States Constitution as a Policy Revolution     Policy Today Cybersecurity Policy     What Are Assets?     Successful Policy Characteristics     What Is the Role of Government?     Additional Federal Banking Regulations     Government Cybersecurity Regulations in Other Countries     The Challenges of Global Policies Cybersecurity Policy Life Cycle     Policy Development     Policy Publication     Policy Adoption     Policy Review Summary Chapter 2: Cybersecurity Policy Organization, Format, and Styles Policy Hierarchy     Standards     Baselines     Guidelines     Procedures     Plans and Programs Writing Style and Technique     Using Plain Language     The Plain Language Movement     Plain Language Techniques for Policy Writing Policy Format     Understand Your Audience     Policy Format Types     Policy Components Summary Chapter 3: Cybersecurity Framework Confidentiality, Integrity, and Availability     What Is Confidentiality?     What Is Integrity?     What Is Availability?     Who Is Responsible for CIA? NIST’s Cybersecurity Framework     What Is NIST’s Function?     So, What About ISO?     NIST Cybersecurity Framework     ISO Standards Summary Chapter 4: Governance and Risk Management Understanding Cybersecurity Policies     What Is Governance?     What Is Meant by Strategic Alignment?     Regulatory Requirements     User-Level Cybersecurity Policies     Vendor Cybersecurity Policies     Cybersecurity Vulnerability Disclosure Policies     Client Synopsis of Cybersecurity Policies     Who Authorizes Cybersecurity Policy?     What Is a Distributed Governance Model?     Evaluating Cybersecurity Policies     Revising Cybersecurity Policies: Change Drivers     NIST Cybersecurity Framework Governance Subcategories and Informative References     Regulatory Requirements Cybersecurity Risk     Is Risk Bad?     Understanding Risk Management     Risk Appetite and Tolerance     What Is a Risk Assessment?     Risk Assessment Methodologies Summary Chapter 5: Asset Management and Data Loss Prevention Information Assets and Systems     Who Is Responsible for Information Assets? Information Classification     How Does the Federal Government Classify Data?     Why Is National Security Information Classified Differently?     Who Decides How National Security Data Is Classified?     How Does the Private Sector Classify Data?     Can Information Be Reclassified or Even Declassified? Labeling and Handling Standards     Why Label?     Why Handling Standards? Information Systems Inventory     Why an Inventory Is Necessary and What Should Be Inventoried Understanding Data Loss Prevention Technologies Summary Chapter 6: Human Resources Security The Employee Life Cycle     What Does Recruitment Have to Do with Security?     What Happens in the Onboarding Phase?     What Is User Provisioning?     What Should an Employee Learn During Orientation?     Why Is Termination Considered the Most Dangerous Phase? The Importance of Employee Agreements     What Are Confidentiality or Nondisclosure Agreements?     What Is an Acceptable Use Agreement? The Importance of Security Education and Training     Influencing Behavior with Security Awareness     Teaching a Skill with Security Training     Security Education Is Knowledge Driven Summary Chapter 7: Physical and Environmental Security Understanding the Secure Facility Layered Defense Model     How Do We Secure the Site?     How Is Physical Access Controlled? Protecting Equipment     No Power, No Processing?     How Dangerous Is Fire?     What About Disposal?     Stop, Thief! Summary Chapter 8: Communications and Operations Security Standard Operating Procedures     Why Document SOPs?     Developing SOPs Operational Change Control     Why Manage Change?     Why Is Patching Handled Differently? Malware Protection     Are There Different Types of Malware?     How Is Malware Controlled?     What Is Antivirus Software? Data Replication     Is There a Recommended Backup or Replication Strategy? Secure Messaging     What Makes Email a Security Risk?     Are Email Servers at Risk?     Other Collaboration and Communication Tools Activity Monitoring and Log Analysis     What Is Log Management? Service Provider Oversight     What Is Due Diligence?     What Should Be Included in Service Provider Contracts? Threat Intelligence and Information Sharing     How Good Is Cyber Threat Intelligence if It Cannot Be Shared? Summary Chapter 9: Access Control Management Access Control Fundamentals     What Is a Security Posture?     How Is Identity Verified?     What Is Authorization?     Accounting Infrastructure Access Controls     Why Segment a Network?     What Is Layered Border Security?     Remote Access Security User Access Controls     Why Manage User Access?     What Types of Access Should Be Monitored? Summary Chapter 10: Information Systems Acquisition, Development, and Maintenance System Security Requirements     What Is SDLC?     What About Commercially Available or Open Source Software?     The Testing Environment     Protecting Test Data Secure Code     The Open Web Application Security Project (OWASP) Cryptography     Why Encrypt?     Regulatory Requirements     What Is a “Key”?     What Is PKI?     Why Protect Cryptographic Keys?     Digital Certificate Compromise Summary Chapter 11: Cybersecurity Incident Response Incident Response     What Is an Incident?     How Are Incidents Reported?     What Is an Incident Response Program?     The Incident Response Process     Tabletop Exercises and Playbooks     Information Sharing and Coordination     Computer Security Incident Response Teams     Product Security Incident Response Teams (PSIRTs)     Incident Response Training and Exercises What Happened? Investigation and Evidence Handling     Documenting Incidents     Working with Law Enforcement     Understanding Forensic Analysis Data Breach Notification Requirements     Is There a Federal Breach Notification Law?     Does Notification Work? Summary Chapter 12: Business Continuity Management Emergency Preparedness     What Is a Resilient Organization?     Regulatory Requirements Business Continuity Risk Management     What Is a Business Continuity Threat Assessment?     What Is a Business Continuity Risk Assessment?     What Is a Business Impact Assessment? The Business Continuity Plan     Roles and Responsibilities     Disaster Response Plans     Operational Contingency Plans     The Disaster Recovery Phase     The Resumption Phase Plan Testing and Maintenance     Why Is Testing Important?     Plan Maintenance Summary Chapter 13: Regulatory Compliance for Financial Institutions The Gramm-Leach-Bliley Act     What Is a Financial Institution?     Regulatory Oversight     What Are the Interagency Guidelines? New York’s Department of Financial Services Cybersecurity Regulation (23 NYCRR Part 500) What Is a Regulatory Examination?     Examination Process     Examination Ratings Personal and Corporate Identity Theft     What Is Required by the Interagency Guidelines Supplement A?     What Is Required by the Supplement to the Authentication in an Internet Banking Environment Guidance? Summary Chapter 14: Regulatory Compliance for the Health-Care Sector The HIPAA Security Rule     What Is the Objective of the HIPAA Security Rule?     How Is the HIPAA Security Rule Organized?     What Are the Physical Safeguards?     What Are the Technical Safeguards?     What Are the Organizational Requirements?     What Are the Policies and Procedures Standards?     The HIPAA Security Rule Mapping to NIST Cybersecurity Framework The HITECH Act and the Omnibus Rule     What Changed for Business Associates?     What Are the Breach Notification Requirements? Understanding the HIPAA Compliance Enforcement Process Summary Chapter 15: PCI Compliance for Merchants Protecting Cardholder Data     What Is the PAN?     The Luhn Algorithm     What Is the PCI DDS Framework?     Business-as-Usual Approach     What Are the PCI Requirements? PCI Compliance     Who Is Required to Comply with PCI DSS?     What Is a Data Security Compliance Assessment?     What Is the PCI DSS Self-Assessment Questionnaire (SAQ)?     Are There Penalties for Noncompliance? Summary Chapter 16: NIST Cybersecurity Framework Introducing the NIST Cybersecurity Framework Components The Framework Core     Identify     Protect     Detect     Respond     Recover Framework Implementation Tiers (“Tiers”)     Who Should Coordinate the Framework Implementation? NIST’s Recommended Steps to Establish or Improve a Cybersecurity Program Communication with Stakeholders and Supply Chain Relationships NIST’s Cybersecurity Framework Reference Tool Adopting the NIST Cybersecurity Framework in Real Life Summary Appendix A: Cybersecurity Program Resources 608 Appendix B: Answers to the Multiple Choice Questions 618     9780789759405   TOC   6/27/2018  


Best Sellers


Product Details
  • ISBN-13: 9780134858524
  • Publisher: Pearson Education (US)
  • Binding: Digital download
  • No of Pages: 600
  • ISBN-10: 0134858522
  • Publisher Date: 20 Jul 2018
  • Language: English


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Developing Cybersecurity Programs and Policies
Pearson Education (US) -
Developing Cybersecurity Programs and Policies
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Developing Cybersecurity Programs and Policies

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!