Cybersecurity Resilience Planning Handbook

The Handbook delivers a cybersecurity planning process that focuses on cyber risks and helps you protect your vital assets and systems.
Publisher: Matthew Bender
Publication Language: English
Book
$375.70
Quantity
In Stock
Published:
ISBN/ISSN: 9781522115472
Publisher: Matthew Bender

Product details

The first step in protecting your organization from cyber attack is to develop a plan for its defense. The Cybersecurity Resilience Planning Handbook provides guidance for executive management, corporate counsel, IT management, and security administrators to help them understand cyber threats and build more secure and resilient systems.

The Handbook offers practical tools and expert guidance for assessing and monitoring vulnerabilities to cyber attack and a step-by-step process for developing a cybersecurity plan that complies with legal obligations and satisfies regulatory and statutory requirements. It can be used as a cybersecurity "best practices" guide because it provides a wider perspective on cybersecurity in general for a better understanding of how to reduce and manage the risks. A detailed cybersecurity implementation plan is included to make the planning process both effective and efficient.

Featured authors

Table of contents

Part I. Identification of Cyber Assets, Services, and Risks
Chapter 1: Introduction to Cybersecurity
Chapter 2: Cybersecurity Laws, Standards, and Frameworks
Chapter 3: Types of Cyber Attacks
Chapter 4: Cybersecurity Technologies
Chapter 5: Cybersecurity Governance
Chapter 6: Risk Management

Part II. Protection from Cyber Threats
Chapter 7: Physical Security
Chapter 8: Authentication and Authorization
Chapter 9: Network Security and Management
Chapter 10: Host Security and Management
Chapter 11: Data Security
Chapter 12: Management Practices

Part III. Detection of Cyber Attacks
Chapter 13: Cybersecurity Log Management
Chapter 14: Cybersecurity Continuous Monitoring
Chapter 15 External Service Providers
Chapter 16: Cybersecurity Assessments

Part IV. Responding to Cyber Incidents
Chapter 17: Cyber Incident Response Planning
Chapter 18: Forensic Techniques

Part V. Recovering from Cyber Attacks
Chapter 19: Backup and Recovery
Chapter 20: Business Continuity Planning and Management

Part VI. Working Materials
Chapter 21: Explanation of Cybersecurity and Cyber Technology Terms
Chapter 22: Cybersecurity Resilience Implementation Plan