/
Resilient Cybersecurity: Reconstruct your defense strategy in an evolving cyber world

Resilient Cybersecurity: Reconstruct your defense strategy in an evolving cyber world

by Mark Dunkerley (Author)
★★★★★
★★★★★

5|9 ratings

Save 43%28.29$49.99
Prime
In Stock

FREE delivery Wednesday, June 25 on orders shipped by Amazon over $35 Or Prime members get FREE delivery Monday, June 23. Order within 10 hrs 29 mins. Join Prime

Free delivery with Prime

28.29 USwith Prime
FREE delivery Wednesday, June 25 on orders shipped by Amazon over $35 Or Prime members get FREE delivery Monday, June 23. Order within 10 hrs 29 mins. Join Prime
In Stock
Secure transaction

Ships from and sold by Amazon.US

Return policy: Eligible for Return, Refund or Replacement

Build a robust cybersecurity program that adapts to the constantly evolving threat landscapeKey FeaturesGain a deep understanding of the current state of cybersecurity, including insights into the latest threats such as Ransomware and AILay the foundation of your cybersecurity program with a comprehensive approach allowing for continuous maturityEquip yourself and your organizations with the knowledge and strategies to build and manage effective cybersecurity strategiesBook DescriptionBuilding a Comprehensive Cybersecurity Program addresses the current challenges and knowledge gaps in cybersecurity, empowering individuals and organizations to navigate the digital landscape securely and effectively. Readers will gain insights into the current state of the cybersecurity landscape, understanding the evolving threats and the challenges posed by skill shortages in the field.This book emphasizes the importance of prioritizing well-being within the cybersecurity profession, addressing a concern often overlooked in the industry. You will construct a cybersecurity program that encompasses architecture, identity and access management, security operations, vulnerability management, vendor risk management, and cybersecurity awareness. It dives deep into managing Operational Technology (OT) and the Internet of Things (IoT), equipping readers with the knowledge and strategies to secure these critical areas.You will also explore the critical components of governance, risk, and compliance (GRC) within cybersecurity programs, focusing on the oversight and management of these functions. This book provides practical insights, strategies, and knowledge to help organizations build and enhance their cybersecurity programs, ultimately safeguarding against evolving threats in today's digital landscape.What you will learnBuild and define a cybersecurity program foundationDiscover the importance of why an architecture program is needed within cybersecurityLearn the importance of Zero Trust ArchitectureLearn what modern identity is and how to achieve itReview of the importance of why a Governance program is neededBuild a comprehensive user awareness, training, and testing program for your usersReview what is involved in a mature Security Operations CenterGain a thorough understanding of everything involved with regulatory and complianceWho this book is forThis book is geared towards the top leaders within an organization, C-Level, CISO, and Directors who run the cybersecurity program as well as management, architects, engineers and analysts who help run a cybersecurity program. Basic knowledge of Cybersecurity and its concepts will be helpful.Table of ContentsCurrent StateSetting the FoundationsBuilding your RoadmapSolidifying your StrategyCybersecurity ArchitectureIdentity & Access ManagementCybersecurity OperationsVulnerability ManagementCybersecurity Awareness, Training & TestingSupplier Risk ManagementProactive ServicesOperational Technology (OT) & the Internet of Things (IoT)Governance OversightManaging RiskRegulatory & ComplianceSome Final Thoughts Read more

Product Information

PublisherPackt Publishing
Publication dateSeptember 27, 2024
LanguageEnglish
Print length752 pages
ISBN-101835462510
ISBN-13978-1835462515
Item Weight3.45 pounds
Dimensions0.54 x 7.5 x 9.25 inches
Best Sellers Rank#1,366,765 in Books (See Top 100 in Books) #195 in Computer Viruses #549 in Privacy & Online Safety #1,605 in Internet & Telecommunications
Customer Reviews5.0 5.0 out of 5 stars 9 ratings

Similar Products