close menu
Bookswagon-24x7 online bookstore
close menu
My Account
49%
8 Steps to Better Security: A Simple Cyber Resilience Guide for Business

8 Steps to Better Security: A Simple Cyber Resilience Guide for Business

          
5
4
3
2
1

International Edition


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book

Harden your business against internal and external cybersecurity threats with a single accessible resource.

In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps.

Written to be accessible to non-technical businesspeople as well as security professionals, and with insights from other security industry leaders, this important book will walk you through how to:

  • Foster a strong security culture that extends from the custodial team to the C-suite
  • Build an effective security team, regardless of the size or nature of your business
  • Comply with regulatory requirements, including general data privacy rules and industry-specific legislation
  • Test your cybersecurity, including third-party penetration testing and internal red team specialists

Perfect for CISOs, security leaders, non-technical businesspeople, and managers at any level, 8 Steps to Better Security is also a must-have resource for companies of all sizes, and in all industries.



Table of Contents:

Foreword xi

Introduction xiii

Chapter 1: Step 1: Foster a Strong Security Culture 1

Kevin Mitnick, Human Hacker Extraordinaire 3

The Importance of a Strong Security Culture 5

Hackers Are the Bad Guys, Right? 6

What is Security Culture? 7

How to Foster a Strong Security Culture 9

Security Leaders on Security Culture 12

What Makes a Good CISO? 13

The Biggest Mistakes Businesses Make When It Comes to Cybersecurity 14

The Psychological Phases of a Cybersecurity Professional 15

Chapter 2: Step 2: Build a Security Team 19

Why Step 2 is Controversial 20

How to Hire the Right Security Team. . .the Right Way 28

Security Team Tips from Security Leaders 29

The “Culture Fit”—Yuck! 30

Cybersecurity Budgets 34

Design Your Perfect Security Team 35

Chapter 3: Step 3: Regulatory Compliance 39

What Are Data Breaches, and Why Are They Bad? 40

The Scary Truth Found in Data Breach Research 45

An Introduction to Common Data Privacy Regulations 49

The General Data Protection Regulation 49

The California Consumer Privacy Act 50

The Health Insurance Portability and Accountability Act 52

The Gramm-Leach-Bliley Act 52

Payment Card Industry Data Security Standard 53

Governance, Risk Management, and Compliance 53

More About Risk Management 54

Threat Modeling 55

Chapter 4: Step 4: Frequent Security Testing 57

What is Security Testing? 58

Security Testing Types 58

Security Audits 58

Vulnerability Assessments Versus Penetration Testing 59

Red Team Testing 61

Bug Bounty Programs 61

What’s Security Maturity? 63

The Basics of Security Audits and Vulnerability Assessments 64

Log Early, Log Often 66

Prepare for Vulnerability Assessments and Security Audits 67

A Concise Guide to Penetration Testing 69

Penetration Testing Based on Network Knowledge 70

Penetration Testing Based on Network Aspects 73

Security Leaders on Security Maturity 76

Security Testing is Crucial 78

Chapter 5: Step 5: Security Framework Application 79

What is Incident Response? 80

Preparation 80

Identification or Analysis 82

Containment, Mitigation, or Eradication 83

Recovery 84

Post-incident 86

Your Computer Security Incident Response Team 86

Cybersecurity Frameworks 89

NIST Cybersecurity Framework 89

Identify 90

Protect 92

Detect 95

Respond 97

Recover 99

ISO 27000 Cybersecurity Frameworks 101

CIS Controls 102

COBIT Cybersecurity Framework 105

Security Frameworks and Cloud Security 106

Chapter 6: Step 6: Control Your Data Assets 109

The CIA Triad 110

Access Control 112

Patch Management 113

Physical Security and Your Data 115

Malware 116

Cryptography Basics 119

Bring Your Own Device and Working from Home 123

Data Loss Prevention 124

Managed Service Providers 126

The Dark Web and Your Data 128

Security Leaders on Cyber Defense 130

Control Your Data 132

Chapter 7: Step 7: Understand the Human Factor 133

Social Engineering 134

Phishing 139

What Can NFTs and ABA Teach Us About Social Engineering? 141

How to Prevent Social Engineering Attacks on Your Business 146

UI and UX Design 147

Internal Threats 148

Hacktivism 152

Chapter 8: Step 8: Build Redundancy and Resilience 155

Understanding Data and Networks 156

Building Capacity and Scalability with the Power of the Cloud 158

Back It Up, Back It Up, Back It Up 161

RAID 162

What Ransomware Taught Business About Backups 164

Business Continuity 167

Disaster Recovery 168

Chapter 9: Afterword 173

Step 1 173

The Most Notorious Cyberattacker Was Actually a Con Man 174

A Strong Security Culture Requires All Hands on Deck 174

Hackers Are the Good Guys, Actually 174

What Is Security Culture? 175

What Makes a Good CISO? 175

The Psychological Phases of a Cybersecurity Professional 176

Recommended Readings 177

Step 2 178

Tackling the Cybersecurity Skills Gap Myth 178

Take “Culture Fit” Out of Your Vocabulary 179

Your Cybersecurity Budget 180

Recommended Readings 180

Step 3 181

Data Breaches 181

Data Privacy Regulations 182

Risk Management 183

Recommended Readings 183

Step 4 184

Security Audits 184

Vulnerability Assessments 185

Penetration Testing 185

Bug Bounty Programs 185

Recommended Reading 186

Step 5 187

Incident Response 187

Cybersecurity Frameworks 187

Recommended Reading 188

Step 6 188

The CIA Triad 188

Access Control 189

Patch Management 189

Physical Security 189

Malware 189

Cryptography 190

BYOD and Working from Home 190

Data Loss Prevention 191

Managed Service Providers 191

Recommended Reading 191

Step 7 192

Social Engineering 192

UI and UX Design 193

Internal Threats 193

Recommended Readings 194

Step 8 194

Cloud Networks 195

Data Backups 195

Business Continuity and Disaster Recovery 196

Recommended Readings 196

Keeping Your Business Cyber Secure 197

Index 199


Best Seller

| | See All

Product Details
  • ISBN-13: 9781119811237
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: John Wiley & Sons Inc
  • Height: 224 mm
  • No of Pages: 224
  • Spine Width: 18 mm
  • Weight: 304 gr
  • ISBN-10: 1119811236
  • Publisher Date: 18 Nov 2021
  • Binding: Paperback
  • Language: English
  • Returnable: N
  • Sub Title: A Simple Cyber Resilience Guide for Business
  • Width: 145 mm


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Be The First to Review
8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
John Wiley & Sons Inc -
8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

8 Steps to Better Security: A Simple Cyber Resilience Guide for Business

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    | | See All


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA