Articoli correlati a Resilient Cybersecurity: Reconstruct your defense strategy...

Resilient Cybersecurity: Reconstruct your defense strategy in an evolving cyber world - Brossura

 
9781835462515: Resilient Cybersecurity: Reconstruct your defense strategy in an evolving cyber world

Sinossi

Build a robust cybersecurity program that adapts to the constantly evolving threat landscape

Key Features

  • Gain a deep understanding of the current state of cybersecurity, including insights into the latest threats such as Ransomware and AI
  • Lay the foundation of your cybersecurity program with a comprehensive approach allowing for continuous maturity
  • Equip yourself and your organizations with the knowledge and strategies to build and manage effective cybersecurity strategies

Book Description

Building a Comprehensive Cybersecurity Program addresses the current challenges and knowledge gaps in cybersecurity, empowering individuals and organizations to navigate the digital landscape securely and effectively. Readers will gain insights into the current state of the cybersecurity landscape, understanding the evolving threats and the challenges posed by skill shortages in the field.

This book emphasizes the importance of prioritizing well-being within the cybersecurity profession, addressing a concern often overlooked in the industry. You will construct a cybersecurity program that encompasses architecture, identity and access management, security operations, vulnerability management, vendor risk management, and cybersecurity awareness. It dives deep into managing Operational Technology (OT) and the Internet of Things (IoT), equipping readers with the knowledge and strategies to secure these critical areas.

You will also explore the critical components of governance, risk, and compliance (GRC) within cybersecurity programs, focusing on the oversight and management of these functions. This book provides practical insights, strategies, and knowledge to help organizations build and enhance their cybersecurity programs, ultimately safeguarding against evolving threats in today's digital landscape.

What you will learn

  • Build and define a cybersecurity program foundation
  • Discover the importance of why an architecture program is needed within cybersecurity
  • Learn the importance of Zero Trust Architecture
  • Learn what modern identity is and how to achieve it
  • Review of the importance of why a Governance program is needed
  • Build a comprehensive user awareness, training, and testing program for your users
  • Review what is involved in a mature Security Operations Center
  • Gain a thorough understanding of everything involved with regulatory and compliance

Who this book is for

This book is geared towards the top leaders within an organization, C-Level, CISO, and Directors who run the cybersecurity program as well as management, architects, engineers and analysts who help run a cybersecurity program. Basic knowledge of Cybersecurity and its concepts will be helpful.

Table of Contents

  1. Current State
  2. Setting the Foundations
  3. Building your Roadmap
  4. Solidifying your Strategy
  5. Cybersecurity Architecture
  6. Identity & Access Management
  7. Cybersecurity Operations
  8. Vulnerability Management
  9. Cybersecurity Awareness, Training & Testing
  10. Supplier Risk Management
  11. Proactive Services
  12. Operational Technology (OT) & the Internet of Things (IoT)
  13. Governance Oversight
  14. Managing Risk
  15. Regulatory & Compliance
  16. Some Final Thoughts

Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.

Informazioni sull?autore

Mark Dunkerley is a cybersecurity and technology leader with over 20 years of experience working in higher education, healthcare, and Fortune 100 companies. Mark has extensive knowledge in IT architecture and cybersecurity through delivering secure technology solutions and services. He has experience in cloud technologies, vulnerability management, vendor risk management, identity and access management, security operations, security testing, awareness and training, application and data security, incident and response management, regulatory and compliance, and more. Mark holds a master's degree in business administration and has received certifications through (ISC)², AirWatch, Microsoft, CompTIA, VMware, AXELOS, Cisco, and EMC. Mark has spoken at multiple events, is a published author, sits on customer advisory boards, has published several case studies, and is featured as one of Security magazine's 2022 Top Cybersecurity Leaders.

Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.

Compra usato

Condizioni: come nuovo
Unread book in perfect condition...
Visualizza questo articolo

EUR 17,03 per la spedizione da U.S.A. a Italia

Destinazione, tempi e costi

EUR 7,67 per la spedizione da U.S.A. a Italia

Destinazione, tempi e costi

Risultati della ricerca per Resilient Cybersecurity: Reconstruct your defense strategy...

Foto dell'editore

Dunkerley, Mark
Editore: Packt Publishing, 2024
ISBN 10: 1835462510 ISBN 13: 9781835462515
Nuovo Brossura

Da: California Books, Miami, FL, U.S.A.

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: New. Codice articolo I-9781835462515

Contatta il venditore

Compra nuovo

EUR 48,27
Convertire valuta
Spese di spedizione: EUR 7,67
Da: U.S.A. a: Italia
Destinazione, tempi e costi

Quantità: Più di 20 disponibili

Aggiungi al carrello

Foto dell'editore

Dunkerley, Mark
Editore: Packt Publishing, 2024
ISBN 10: 1835462510 ISBN 13: 9781835462515
Antico o usato Brossura

Da: GreatBookPrices, Columbia, MD, U.S.A.

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: As New. Unread book in perfect condition. Codice articolo 48322874

Contatta il venditore

Compra usato

EUR 40,81
Convertire valuta
Spese di spedizione: EUR 17,03
Da: U.S.A. a: Italia
Destinazione, tempi e costi

Quantità: Più di 20 disponibili

Aggiungi al carrello

Foto dell'editore

Dunkerley, Mark
Editore: Packt Publishing, 2024
ISBN 10: 1835462510 ISBN 13: 9781835462515
Nuovo Brossura

Da: Ria Christie Collections, Uxbridge, Regno Unito

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: New. In. Codice articolo ria9781835462515_new

Contatta il venditore

Compra nuovo

EUR 52,06
Convertire valuta
Spese di spedizione: EUR 10,44
Da: Regno Unito a: Italia
Destinazione, tempi e costi

Quantità: Più di 20 disponibili

Aggiungi al carrello

Foto dell'editore

Dunkerley, Mark
Editore: Packt Publishing, 2024
ISBN 10: 1835462510 ISBN 13: 9781835462515
Nuovo Brossura

Da: GreatBookPrices, Columbia, MD, U.S.A.

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: New. Codice articolo 48322874-n

Contatta il venditore

Compra nuovo

EUR 45,94
Convertire valuta
Spese di spedizione: EUR 17,03
Da: U.S.A. a: Italia
Destinazione, tempi e costi

Quantità: Più di 20 disponibili

Aggiungi al carrello

Foto dell'editore

Mark Dunkerley
Editore: Packt Publishing Limited, 2024
ISBN 10: 1835462510 ISBN 13: 9781835462515
Nuovo Paperback / softback
Print on Demand

Da: THE SAINT BOOKSTORE, Southport, Regno Unito

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Paperback / softback. Condizione: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 526. Codice articolo C9781835462515

Contatta il venditore

Compra nuovo

EUR 57,45
Convertire valuta
Spese di spedizione: EUR 10,10
Da: Regno Unito a: Italia
Destinazione, tempi e costi

Quantità: Più di 20 disponibili

Aggiungi al carrello

Foto dell'editore

Dunkerley, Mark
Editore: Packt Publishing, 2024
ISBN 10: 1835462510 ISBN 13: 9781835462515
Nuovo Brossura

Da: GreatBookPricesUK, Woodford Green, Regno Unito

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: New. Codice articolo 48322874-n

Contatta il venditore

Compra nuovo

EUR 52,05
Convertire valuta
Spese di spedizione: EUR 17,41
Da: Regno Unito a: Italia
Destinazione, tempi e costi

Quantità: Più di 20 disponibili

Aggiungi al carrello

Foto dell'editore

Dunkerley, Mark
Editore: Packt Publishing, 2024
ISBN 10: 1835462510 ISBN 13: 9781835462515
Antico o usato Brossura

Da: GreatBookPricesUK, Woodford Green, Regno Unito

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: As New. Unread book in perfect condition. Codice articolo 48322874

Contatta il venditore

Compra usato

EUR 56,69
Convertire valuta
Spese di spedizione: EUR 17,41
Da: Regno Unito a: Italia
Destinazione, tempi e costi

Quantità: Più di 20 disponibili

Aggiungi al carrello

Immagini fornite dal venditore

Mark Dunkerley
ISBN 10: 1835462510 ISBN 13: 9781835462515
Nuovo Paperback

Da: Rarewaves.com UK, London, Regno Unito

Valutazione del venditore 4 su 5 stelle 4 stelle, Maggiori informazioni sulle valutazioni dei venditori

Paperback. Condizione: New. Build a robust cybersecurity program that adapts to the constantly evolving threat landscapeKey FeaturesGain a deep understanding of the current state of cybersecurity, including insights into the latest threats such as Ransomware and AILay the foundation of your cybersecurity program with a comprehensive approach allowing for continuous maturityEquip yourself and your organizations with the knowledge and strategies to build and manage effective cybersecurity strategiesBook DescriptionBuilding a Comprehensive Cybersecurity Program addresses the current challenges and knowledge gaps in cybersecurity, empowering individuals and organizations to navigate the digital landscape securely and effectively. Readers will gain insights into the current state of the cybersecurity landscape, understanding the evolving threats and the challenges posed by skill shortages in the field.This book emphasizes the importance of prioritizing well-being within the cybersecurity profession, addressing a concern often overlooked in the industry. You will construct a cybersecurity program that encompasses architecture, identity and access management, security operations, vulnerability management, vendor risk management, and cybersecurity awareness. It dives deep into managing Operational Technology (OT) and the Internet of Things (IoT), equipping readers with the knowledge and strategies to secure these critical areas.You will also explore the critical components of governance, risk, and compliance (GRC) within cybersecurity programs, focusing on the oversight and management of these functions. This book provides practical insights, strategies, and knowledge to help organizations build and enhance their cybersecurity programs, ultimately safeguarding against evolving threats in today's digital landscape.What you will learnBuild and define a cybersecurity program foundationDiscover the importance of why an architecture program is needed within cybersecurityLearn the importance of Zero Trust ArchitectureLearn what modern identity is and how to achieve itReview of the importance of why a Governance program is neededBuild a comprehensive user awareness, training, and testing program for your usersReview what is involved in a mature Security Operations CenterGain a thorough understanding of everything involved with regulatory and complianceWho this book is forThis book is geared towards the top leaders within an organization, C-Level, CISO, and Directors who run the cybersecurity program as well as management, architects, engineers and analysts who help run a cybersecurity program. Basic knowledge of Cybersecurity and its concepts will be helpful. Codice articolo LU-9781835462515

Contatta il venditore

Compra nuovo

EUR 71,97
Convertire valuta
Spese di spedizione: EUR 2,32
Da: Regno Unito a: Italia
Destinazione, tempi e costi

Quantità: Più di 20 disponibili

Aggiungi al carrello

Immagini fornite dal venditore

Mark Dunkerley
ISBN 10: 1835462510 ISBN 13: 9781835462515
Nuovo Paperback

Da: Rarewaves.com USA, London, LONDO, Regno Unito

Valutazione del venditore 4 su 5 stelle 4 stelle, Maggiori informazioni sulle valutazioni dei venditori

Paperback. Condizione: New. Build a robust cybersecurity program that adapts to the constantly evolving threat landscapeKey FeaturesGain a deep understanding of the current state of cybersecurity, including insights into the latest threats such as Ransomware and AILay the foundation of your cybersecurity program with a comprehensive approach allowing for continuous maturityEquip yourself and your organizations with the knowledge and strategies to build and manage effective cybersecurity strategiesBook DescriptionBuilding a Comprehensive Cybersecurity Program addresses the current challenges and knowledge gaps in cybersecurity, empowering individuals and organizations to navigate the digital landscape securely and effectively. Readers will gain insights into the current state of the cybersecurity landscape, understanding the evolving threats and the challenges posed by skill shortages in the field.This book emphasizes the importance of prioritizing well-being within the cybersecurity profession, addressing a concern often overlooked in the industry. You will construct a cybersecurity program that encompasses architecture, identity and access management, security operations, vulnerability management, vendor risk management, and cybersecurity awareness. It dives deep into managing Operational Technology (OT) and the Internet of Things (IoT), equipping readers with the knowledge and strategies to secure these critical areas.You will also explore the critical components of governance, risk, and compliance (GRC) within cybersecurity programs, focusing on the oversight and management of these functions. This book provides practical insights, strategies, and knowledge to help organizations build and enhance their cybersecurity programs, ultimately safeguarding against evolving threats in today's digital landscape.What you will learnBuild and define a cybersecurity program foundationDiscover the importance of why an architecture program is needed within cybersecurityLearn the importance of Zero Trust ArchitectureLearn what modern identity is and how to achieve itReview of the importance of why a Governance program is neededBuild a comprehensive user awareness, training, and testing program for your usersReview what is involved in a mature Security Operations CenterGain a thorough understanding of everything involved with regulatory and complianceWho this book is forThis book is geared towards the top leaders within an organization, C-Level, CISO, and Directors who run the cybersecurity program as well as management, architects, engineers and analysts who help run a cybersecurity program. Basic knowledge of Cybersecurity and its concepts will be helpful. Codice articolo LU-9781835462515

Contatta il venditore

Compra nuovo

EUR 79,77
Convertire valuta
Spese di spedizione: EUR 2,32
Da: Regno Unito a: Italia
Destinazione, tempi e costi

Quantità: Più di 20 disponibili

Aggiungi al carrello

Immagini fornite dal venditore

Mark Dunkerley
Editore: Packt Publishing, 2024
ISBN 10: 1835462510 ISBN 13: 9781835462515
Nuovo Taschenbuch
Print on Demand

Da: AHA-BUCH GmbH, Einbeck, Germania

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Taschenbuch. Condizione: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Build a robust cybersecurity program that adapts to the constantly evolving threat landscapeKey Features: Gain a deep understanding of the current state of cybersecurity, including insights into the latest threats such as Ransomware and AI Lay the foundation of your cybersecurity program with a comprehensive approach allowing for continuous maturity Equip yourself and your organizations with the knowledge and strategies to build and manage effective cybersecurity strategiesBook Description:Building a Comprehensive Cybersecurity Program addresses the current challenges and knowledge gaps in cybersecurity, empowering individuals and organizations to navigate the digital landscape securely and effectively. Readers will gain insights into the current state of the cybersecurity landscape, understanding the evolving threats and the challenges posed by skill shortages in the field.This book emphasizes the importance of prioritizing well-being within the cybersecurity profession, addressing a concern often overlooked in the industry. You will construct a cybersecurity program that encompasses architecture, identity and access management, security operations, vulnerability management, vendor risk management, and cybersecurity awareness. It dives deep into managing Operational Technology (OT) and the Internet of Things (IoT), equipping readers with the knowledge and strategies to secure these critical areas.You will also explore the critical components of governance, risk, and compliance (GRC) within cybersecurity programs, focusing on the oversight and management of these functions. This book provides practical insights, strategies, and knowledge to help organizations build and enhance their cybersecurity programs, ultimately safeguarding against evolving threats in today's digital landscape.What You Will Learn: Build and define a cybersecurity program foundation Discover the importance of why an architecture program is needed within cybersecurity Learn the importance of Zero Trust Architecture Learn what modern identity is and how to achieve it Review of the importance of why a Governance program is needed Build a comprehensive user awareness, training, and testing program for your users Review what is involved in a mature Security Operations Center Gain a thorough understanding of everything involved with regulatory and complianceWho this book is for:This book is geared towards the top leaders within an organization, C-Level, CISO, and Directors who run the cybersecurity program as well as management, architects, engineers and analysts who help run a cybersecurity program. Basic knowledge of Cybersecurity and its concepts will be helpful.Table of Contents Current State Setting the Foundations Building your Roadmap Solidifying your Strategy Cybersecurity Architecture Identity & Access Management Cybersecurity Operations Vulnerability Management Cybersecurity Awareness, Training & Testing Supplier Risk Management Proactive Services Operational Technology (OT) & the Internet of Things (IoT) Governance Oversight Managing Risk Regulatory & Compliance Some Final Thoughts. Codice articolo 9781835462515

Contatta il venditore

Compra nuovo

EUR 70,84
Convertire valuta
Spese di spedizione: EUR 14,99
Da: Germania a: Italia
Destinazione, tempi e costi

Quantità: 1 disponibili

Aggiungi al carrello

Vedi altre 6 copie di questo libro

Vedi tutti i risultati per questo libro