The Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks
Written by Alan Calder
Narrated by Stephen Perring
()
About this audiobook
This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape.
Suitable for senior directors (CEO, CISO, CIO), compliance managers, privacy managers, IT managers, security analysts and others, the book is divided into six parts:
Part 1: Introduction. The world of cyber security and the approach taken in this book.
Part 2: Threats and vulnerabilities. A discussion of a range of threats organisations face, organised by threat category, to help you understand what you are defending yourself against before you start thinking about your actual defences.
Part 3: The CRF processes. Detailed discussions of each of the 24 CRF processes, explaining a wide range of security areas by process category and offering guidance on how to implement each.
Part 4: Eight steps to implementing cyber security. Our eight-step approach to implementing the cyber security processes you need and maintaining them.
Part 5: Reference frameworks. An explanation of how standards and frameworks work, along with their benefits. It also presents ten framework options, introducing you to some of the best-known standards and giving you an idea of the range available.
Part 6: Conclusion and appendices. The appendices include a glossary of all the acronyms and abbreviations used in this book.
Whether you are just starting out on the road to cyber security or looking to enhance and improve your existing cyber resilience programme, it should be clear that cyber security is no longer optional in today's information age; it is an essential component of business success.
Make sure you understand the threats and vulnerabilities your organisation faces and how the Cyber Resilience Framework can help you tackle them. Start your journey to cyber security now – buy this book today!
Alan Calder
Alan Calder is a leading author on IT governance and information security issues. He is the CEO of GRC International Group plc, the AIM-listed company that owns IT Governance Ltd. Alan is an acknowledged international cyber security guru. He has been involved in the development of a wide range of information security management training courses that have been accredited by the International Board for IT Governance Qualifications (IBITGQ). He is a frequent media commentator on information security and IT governance issues, and has contributed articles and expert comment to a wide range of trade, national and online news outlets.
More audiobooks from Alan Calder
EU GDPR – An international guide to compliance Rating: 5 out of 5 stars5/5NIST Cybersecurity Framework: A pocket guide Rating: 0 out of 5 stars0 ratings
Related to The Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks
Related audiobooks
Cyber Security: Essential principles to secure your organisation Rating: 5 out of 5 stars5/5A Leader's Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Rating: 0 out of 5 stars0 ratingsThe Ransomware Threat Landscape: Prepare for, recognise and survive ransomware attacks Rating: 0 out of 5 stars0 ratingsCybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsSecurity Chaos Engineering: Sustaining Resilience in Software and Systems Rating: 0 out of 5 stars0 ratingsCyber Resilience: Defence-in-depth principles Rating: 0 out of 5 stars0 ratingsGray Hat: Vulnerability Scanning & Penetration Testing Rating: 0 out of 5 stars0 ratingsOWASP Top 10 Vulnerabilities: Beginner's Guide To Web Application Security Risks Rating: 0 out of 5 stars0 ratingsRethinking IT Security: What Needs to Be Said — How Can We Solve the IT Security Problem Long Term? Rating: 0 out of 5 stars0 ratingsPentesting 101: Cracking Gadgets And Hacking Software Rating: 0 out of 5 stars0 ratingsStart-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit Rating: 0 out of 5 stars0 ratingsZero Day: Novice No More: Expose Software Vulnerabilities And Eliminate Bugs Rating: 0 out of 5 stars0 ratingsZero Trust Security: Building Cyber Resilience & Robust Security Postures Rating: 0 out of 5 stars0 ratingsThe Ultimate Kali Linux Book - Second Edition: Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire Rating: 0 out of 5 stars0 ratingsDefense In Depth: Network Security And Cyber Resilience Rating: 0 out of 5 stars0 ratingsHacking For Dummies, 7th Edition Rating: 5 out of 5 stars5/5Malware Analysis: Digital Forensics, Cybersecurity, And Incident Response Rating: 0 out of 5 stars0 ratingsCyber Auditing Unleashed: Advanced Security Strategies For Ethical Hackers Rating: 0 out of 5 stars0 ratingsBuilding a Cyber Risk Management Program: Evolving Security for the Digital Age Rating: 0 out of 5 stars0 ratingsCompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5NIST Cloud Security: Cyber Threats, Policies, And Best Practices Rating: 5 out of 5 stars5/5Red Team Operations: Attack: Black Box Hacking, Social Engineering & Web App Scanning Rating: 5 out of 5 stars5/5Trojan Exposed: Cyber Defense And Security Protocols For Malware Eradication Rating: 0 out of 5 stars0 ratingsThe CISO Evolution: Business Knowledge for Cybersecurity Executives Rating: 5 out of 5 stars5/5Zero Trust and Third-Party Risk: Reduce the Blast Radius Rating: 0 out of 5 stars0 ratingsHACKING: How to Hack Web Apps Rating: 5 out of 5 stars5/5Burp Suite: Novice To Ninja: Pen Testing Cloud, Network, Mobile & Web Applications Rating: 0 out of 5 stars0 ratingsThe DevSecOps Playbook: Deliver Continuous Security at Speed Rating: 0 out of 5 stars0 ratings
Law For You
Win Your Case: How to Present, Persuade, and Prevail--Every Place, Every Time Rating: 5 out of 5 stars5/5The Invention of Murder: How the Victorians Revelled in Death and Detection and Created Modern Crime Rating: 4 out of 5 stars4/5We Were Once a Family: A Story of Love, Death, and Child Removal in America Rating: 4 out of 5 stars4/5Sweet Taste of Liberty: A True Story of Slavery and Restitution in America Rating: 5 out of 5 stars5/5Whoever Fights Monsters: My Twenty Years Tracking Serial Killers for the FBI Rating: 4 out of 5 stars4/5Covered with Night: A Story of Murder and Indigenous Justice in Early America Rating: 4 out of 5 stars4/5On Account of Race: The Supreme Court, White Supremacy, and the Ravaging of African American Voting Rights Rating: 4 out of 5 stars4/5Arrest-Proof Yourself: Second Edition Rating: 4 out of 5 stars4/5Jews Don’t Count Rating: 4 out of 5 stars4/5When Harry Became Sally: Responding to the Transgender Moment Rating: 4 out of 5 stars4/5The Color of Money: Black Banks and the Racial Wealth Gap Rating: 5 out of 5 stars5/5Forensics: What Bugs, Burns, Prints, DNA, and More Tell Us about Crime Rating: 4 out of 5 stars4/5Hitler's American Model: The United States and the Making of Nazi Race Law Rating: 4 out of 5 stars4/5The Law of the Land: The Evolution of Our Legal System Rating: 4 out of 5 stars4/5Six Women of Salem: The Untold Story of the Accused and Their Accusers in the Salem Witch Trials Rating: 4 out of 5 stars4/5The Law Rating: 4 out of 5 stars4/5By Hands Now Known: Jim Crow's Legal Executioners Rating: 5 out of 5 stars5/5The Executive Juris Doctor: Learn to Think Like a Lawyer Rating: 4 out of 5 stars4/5Law School Confidential: A Complete Guide to the Law School Experience: By Students, for Students Rating: 4 out of 5 stars4/5The End of Policing Rating: 4 out of 5 stars4/5The Law Says What?: Stuff You Didn't Know About the Law (but Really Should!) Rating: 4 out of 5 stars4/5Estate & Trust Administration For Dummies Rating: 3 out of 5 stars3/5The Sewing Girl's Tale: A Story of Crime and Consequences in Revolutionary America Rating: 4 out of 5 stars4/5The Dark Net: Inside the Digital Underworld Rating: 4 out of 5 stars4/5Limited Liability Companies For Dummies: 3rd Edition Rating: 4 out of 5 stars4/5Why the Innocent Plead Guilty and the Guilty Go Free: And Other Paradoxes of Our Broken Legal System Rating: 4 out of 5 stars4/5
Reviews for The Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks
0 ratings0 reviews