Home > Business and Economics > Business and Management > Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit
51%
Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit

Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit

5       |  2 Reviews 
5
4
3
2
1

In Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Add to Wishlist

About the Book

Add cybersecurity to your value proposition and protect your company from cyberattacks Cybersecurity is now a requirement for every company in the world regardless of size or industry. Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit covers everything a founder, entrepreneur and venture capitalist should know when building a secure company in today’s world. It takes you step-by-step through the cybersecurity moves you need to make at every stage, from landing your first round of funding through to a successful exit. The book describes how to include security and privacy from the start and build a cyber resilient company. You'll learn the basic cybersecurity concepts every founder needs to know, and you'll see how baking in security drives the value proposition for your startup’s target market. This book will also show you how to scale cybersecurity within your organization, even if you aren’t an expert! Cybersecurity as a whole can be overwhelming for startup founders. Start-Up Secure breaks down the essentials so you can determine what is right for your start-up and your customers. You’ll learn techniques, tools, and strategies that will ensure data security for yourself, your customers, your funders, and your employees. Pick and choose the suggestions that make the most sense for your situation—based on the solid information in this book. Get primed on the basic cybersecurity concepts every founder needs to know Learn how to use cybersecurity know-how to add to your value proposition Ensure that your company stays secure through all its phases, and scale cybersecurity wisely as your business grows Make a clean and successful exit with the peace of mind that comes with knowing your company's data is fully secure Start-Up Secure is the go-to source on cybersecurity for start-up entrepreneurs, leaders, and individual contributors who need to select the right frameworks and standards at every phase of the entrepreneurial journey.

Table of Contents:
Foreword xv Preface xvii Acknowledgments xxi About the Author xxv Introduction 1 Part I Fundamentals Chapter 1: Minimum Security Investment for Maximum Risk Reduction 7 Communicating Your Cybersecurity 9 Email Security 10 Secure Your Credentials 12 SAAS Can Be Secure 14 Patching 15 Antivirus is Still Necessary but Goes by a Different Name 18 Mobile Devices 18 Summary 20 Action Plan 20 Notes 21 Chapter 2: Cybersecurity Strategy and Roadmap Development 23 What Type of Business is This? 24 What Types of Customers Will We Sell To? 24 What Types of Information Will the Business Consume? 25 What Types of Information Will the Business Create? 25 Where Geographically Will Business Be Conducted? 26 Building the Roadmap 26 Opening Statement 26 Stakeholders 27 Tactics 27 Measurability 27 Case Study 28 Summary 30 Action Plan 30 Note 30 Chapter 3: Secure Your Credentials 31 Password Managers 32 Passphrase 33 Multi-Factor Authentication 35 Entitlements 37 Key Management 38 Case Study 39 Summary 41 Action Plan 42 Notes 42 Chapter 4: Endpoint Protection 43 Vendors 44 Selecting an EDR 45 Managed Detection and Response 46 Case Study 49 Summary 50 Action Plan 51 Notes 51 Chapter 5: Your Office Network 53 Your First Office Space 54 Co-Working Spaces 57 Virtual Private Network 58 Summary 60 Action Plan 60 Notes 60 Chapter 6: Your Product in the Cloud 63 Secure Your Cloud Provider Accounts 65 Protect Your Workloads 66 Patching 67 Endpoint Protection 68 Secure Your Containers 69 Summary 70 Action Plan 70 Notes 71 Chapter 7: Information Technology 73 Asset Management 74 Identity and Access Management 76 Summary 77 Action Plan 78 Part II Growing the Team Chapter 8: Hiring, Outsourcing, or Hybrid 81 Catalysts to Hiring 82 Get the First Hire Right 83 Executive versus Individual Contributor 84 Recruiting 86 Job Descriptions 86 Interviewing 88 First 90 Days is a Myth 90 Summary 90 Action Plan 90 Note 91 Part III Maturation Chapter 9: Compliance 95 Master Service Agreements, Terms and Conditions, Oh My 96 Patch and Vulnerability Management 97 Antivirus 98 Auditing 98 Incident Response 99 Policies and Controls 100 Change Management 100 Encryption 101 Data Loss Prevention 101 Data Processing Agreement 102 Summary 102 Action Plan 103 Note 103 Chapter 10: Industry and Government Standards and Regulations 105 Open Source 106 OWASP 106 Center for Internet Security 20 106 United States Public 106 SOC 106 Retail 109 PCI DSS 109 SOX 111 Energy, Oil, and Gas 111 NERC CIP 111 ISA-62443-3-3 (99.03.03)-2013 112 Federal Energy Regulatory Commission 112 Department of Energy Cybersecurity Framework 112 Health 113 HIPAA 113 HITECH 114 HITRUST 114 Financial 114 FFIEC 114 FINRA 115 NCUA 115 Education 115 FERPA 115 International 116 International Organization for Standardization (ISO) 116 UL 2900 117 GDPR 117 Privacy Shield 118 UK Cyber Essentials 118 United States Federal and State Government 118 NIST 119 NISPOM 120 DFARS PGI 120 FedRAMP 120 FISMA 122 NYCRR 500 122 CCPA 122 Summary 123 Action Plan 123 Notes 124 Chapter 11: Communicating Your Cybersecurity Posture and Maturity to Customers 127 Certifications and Audits 128 Questionnaires 129 Shared Assessments 129 Cloud Security Alliance 130 Vendor Security Alliance 130 Sharing Data with Your Customer 131 Case Study 133 Summary 135 Action Plan 136 Notes 136 Chapter 12: When the Breach Happens 137 Cyber Insurance 138 Incident Response Retainers 139 The Incident 140 Tabletop Exercises 141 Summary 142 Action Plan 142 Note 142 Chapter 13: Secure Development 143 Frameworks 144 BSIMM 144 OpenSAMM 145 CMMI 145 Microsoft SDL 147 Pre-Commit 147 Integrated Development Environment 148 Commit 148 Build 149 Penetration Testing 149 Summary 150 Action Plan 150 Notes 151 Chapter 14: Third-Party Risk 153 Terms and Conditions 154 Should I Review This Vendor? 154 What to Ask and Look For 155 Verify DMARC Settings 156 Check TLS Certificates 157 Check the Security Headers of the Website 157 Summary 158 Action Plan 158 Note 159 Chapter 15: Bringing It All Together 161 Glossary 167 Index 181


Best Sellers


Product Details
  • ISBN-13: 9781119700739
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: John Wiley & Sons Inc
  • Height: 231 mm
  • No of Pages: 160
  • Spine Width: 25 mm
  • Weight: 431 gr
  • ISBN-10: 1119700736
  • Publisher Date: 24 Jun 2021
  • Binding: Hardback
  • Language: English
  • Returnable: N
  • Sub Title: Baking Cybersecurity into Your Company from Founding to Exit
  • Width: 160 mm


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

5       |  2 Reviews 
out of (%) reviewers recommend this product
Top Reviews
Rating Snapshot
Select a row below to filter reviews.
5
4
3
2
1
Average Customer Ratings
5       |  2 Reviews 
00 of 0 Reviews
Sort by :
Active Filters

00 of 0 Reviews
SEARCH RESULTS
1–2 of 2 Reviews
    BoxerLover2 - 5 Days ago
    A Thrilling But Totally Believable Murder Mystery

    Read this in one evening. I had planned to do other things with my day, but it was impossible to put down. Every time I tried, I was drawn back to it in less than 5 minutes. I sobbed my eyes out the entire last 100 pages. Highly recommend!

    BoxerLover2 - 5 Days ago
    A Thrilling But Totally Believable Murder Mystery

    Read this in one evening. I had planned to do other things with my day, but it was impossible to put down. Every time I tried, I was drawn back to it in less than 5 minutes. I sobbed my eyes out the entire last 100 pages. Highly recommend!


Sample text
Photo of
    Media Viewer

    Sample text
    Reviews
    Reader Type:
    BoxerLover2
    00 of 0 review

    Your review was submitted!
    Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit
    John Wiley & Sons Inc -
    Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit
    Writing guidlines
    We want to publish your review, so please:
    • keep your review on the product. Review's that defame author's character will be rejected.
    • Keep your review focused on the product.
    • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
    • Refrain from mentioning competitors or the specific price you paid for the product.
    • Do not include any personally identifiable information, such as full names.

    Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit

    Required fields are marked with *

    Review Title*
    Review
      Add Photo Add up to 6 photos
      Would you recommend this product to a friend?
      Tag this Book
      Read more
      Does your review contain spoilers?
      What type of reader best describes you?
      I agree to the terms & conditions
      You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

      CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

      These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


      By submitting any content to Bookswagon, you guarantee that:
      • You are the sole author and owner of the intellectual property rights in the content;
      • All "moral rights" that you may have in such content have been voluntarily waived by you;
      • All content that you post is accurate;
      • You are at least 13 years old;
      • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
      You further agree that you may not submit any content:
      • That is known by you to be false, inaccurate or misleading;
      • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
      • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
      • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
      • For which you were compensated or granted any consideration by any unapproved third party;
      • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
      • That contains any computer viruses, worms or other potentially damaging computer programs or files.
      You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


      For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


      All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

      Accept

      New Arrivals


      Inspired by your browsing history


      Your review has been submitted!

      You've already reviewed this product!
      ASK VIDYA