Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Results Page:  Previous Next
Author Crawley, Kim, author.

Title 8 steps to better security : a simple cyber resilience guide for business / Kim Crawley. [O'Reilly electronic resource]

Publication Info. Hoboken : John Wiley & Sons, Inc., [2021]
QR Code
Description 1 online resource (xx, 204 pages)
Note Includes index.
Summary "Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps. Written to be accessible to non-technical businesspeople as well as security professionals, and with insights from other security industry leaders, this important book will walk you through how to: foster a strong security culture that extends from the custodial team to the C-suite; build an effective security team, regardless of the size or nature of your business; comply with regulatory requirements, including general data privacy rules and industry-specific legislation; test your cybersecurity, including third-party penetration testing and internal red team specialists. Perfect for CISOs, security leaders, non-technical businesspeople, and managers at any level, 8 Steps to Better Security is also a must-have resource for companies of all sizes, and in all industries." -- Description provided by publisher.
Contents Foreword -- Introduction -- Chapter 1 Step 1: Foster a Strong Security Culture -- Kevin Mitnick, Human Hacker Extraordinaire -- The Importance of a Strong Security Culture -- Hackers Are the Bad Guys, Right? -- What Is Security Culture? -- How to Foster a Strong Security Culture -- Security Leaders on Security Culture -- What Makes a Good CISO? -- The Biggest Mistakes Businesses Make When It Comes to Cybersecurity -- The Psychological Phases of a Cybersecurity Professional -- Chapter 2 Step 2: Build a Security Team -- Why Step 2 Is Controversial -- How to Hire the Right Security Team. . .the Right Way -- Security Team Tips from Security Leaders -- The "Culture Fit"-Yuck! -- Cybersecurity Budgets -- Design Your Perfect Security Team -- Chapter 3 Step 3: Regulatory Compliance
What Are Data Breaches, and Why Are They Bad? -- The Scary Truth Found in Data Breach Research -- An Introduction to Common Data Privacy Regulations -- The General Data Protection Regulation -- The California Consumer Privacy Act -- The Health Insurance Portability and Accountability Act -- The Gramm-Leach-Bliley Act -- Payment Card Industry Data Security Standard -- Governance, Risk Management, and Compliance -- More About Risk Management -- Threat Modeling -- Chapter 4 Step 4: Frequent Security Testing -- What Is Security Testing? -- Security Testing Types -- Security Audits -- Vulnerability Assessments Versus Penetration Testing -- Red Team Testing -- Bug Bounty Programs -- What's Security Maturity? -- The Basics of Security Audits and Vulnerability Assessments
Log Early, Log Often -- Prepare for Vulnerability Assessments and Security Audits -- A Concise Guide to Penetration Testing -- Penetration Testing Based on Network Knowledge -- Penetration Testing Based on Network Aspects -- Security Leaders on Security Maturity -- Security Testing Is Crucial -- Chapter 5 Step 5: Security Framework Application -- What Is Incident Response? -- Preparation -- Identification or Analysis -- Containment, Mitigation, or Eradication -- Recovery -- Post-incident -- Your Computer Security Incident Response Team -- Cybersecurity Frameworks -- NIST Cybersecurity Framework -- ISO 27000 Cybersecurity Frameworks -- CIS Controls -- COBIT Cybersecurity Framework -- Security Frameworks and Cloud Security -- Chapter 6 Step 6: Control Your Data Assets
Subject Computer security.
Business enterprises -- Computer networks -- Security measures.
Computer networks -- Management.
Computer networks -- Security measures.
Computer Security
Sécurité informatique.
Réseaux d'ordinateurs -- Gestion.
Réseaux d'ordinateurs -- Sécurité -- Mesures.
Business enterprises -- Computer networks -- Security measures
Computer networks -- Management
Computer networks -- Security measures
Computer security
Added Title Eight steps to better security
Other Form: Print version: Crawley, Kim. 8 steps to better security. Hoboken : John Wiley & Sons, Inc., [2022] 9781119811237 (OCoLC)1272885750
ISBN 9781119811251
1119811252
1119811244
9781119811244 (electronic bk.)
9781394176823 (electronic bk.)
1394176821 (electronic bk.)
Standard No. 10.1002/9781394176823 doi
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information