The Practical, Comprehensive Guide to Applying Cybersecurity Best Practices and Standards in Real Environments In Effective Cybersecurity, William Stallings introduces the technology, operational procedures, and management practices needed for successful cybersecurity. Stallings makes extensive use of standards and best practices documents that are often used to guide or mandate cybersecurity implementation. Going beyond these, he offers in-depth tutorials on the “how” of implementation, integrated into a unified framework and realistic plan of action. Each chapter contains a clear technical overview, as well as a detailed discussion of action items and appropriate policies. Stallings offers many pedagogical features designed to help readers master the material: clear learning objectives, keyword lists, review questions, and QR codes linking to relevant standards documents and web resources. Effective Cybersecurity aligns with the comprehensive Information Security Forum document “The Standard of Good Practice for Information Security,” extending ISF’s work with extensive insights from ISO, NIST, COBIT, other official standards and guidelines, and modern professional, academic, and industry literature. • Understand the cybersecurity discipline and the role of standards and best practices • Define security governance, assess risks, and manage strategy and tactics • Safeguard information and privacy, and ensure GDPR compliance • Harden systems across the system development life cycle (SDLC) • Protect servers, virtualized systems, and storage • Secure networks and electronic communications, from email to VoIP • Apply the most appropriate methods for user authentication • Mitigate security risks in supply chains and cloud environments This knowledge is indispensable to every cybersecurity professional. Stallings presents it systematically and coherently, making it practical and actionable.
Effective Cybersecurity: Understanding and Using Standards and Best Practices
Implement a service management approach to implementing countermeasures. With this handbook, you can move forward confidently, trusting that Schreider is recommending the best components of a cybersecurity program for you.
If you are a manager already involved in your organization’s cybersecurity program, you have much to gain from reading this book. This book will become your go to field manual guiding or affirming your program decisions.
Praise for The Cyber Risk Handbook "Domenic Antonucci and his outstanding collection of contributors have produced a most timely and comprehensive reference and teaching guide on one of the most potentially impactful and evolving risks ...
This book provides information on how to structure and operate an effective cybersecurity program that includes people, processes, technologies, security awareness, and training.
The book provides such a perspective from multiple sources that include investigation into critical business systems such as supply chain management, logistics, ERP, CRM, knowledge management, and others.
This book establishes the business case for setting up an enduring IT security awareness program for use in training IT professionals and IT security professionals.
This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program.
In the book, veteran cybersecurity advisor Bart McDonough walks you through how to fulfil your directorial responsibilities as a board member at an organization with respect to IT and data security.
This book is designed by leading industry experts to help you enter the world of cybersecurity with confidence, covering everything from gaining the right certification to tips and tools for finding your first job.