Building Effective Cybersecurity Programs

A Security Manager’s Handbook

Business & Finance, Industries & Professions, Insurance, Management & Leadership, Management
Cover of the book Building Effective Cybersecurity Programs by Tari Schreider, Rothstein Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Tari Schreider ISBN: 9781944480509
Publisher: Rothstein Publishing Publication: October 20, 2017
Imprint: Rothstein Publishing Language: English
Author: Tari Schreider
ISBN: 9781944480509
Publisher: Rothstein Publishing
Publication: October 20, 2017
Imprint: Rothstein Publishing
Language: English

You know by now that your company could not survive without the Internet. Not in today’s market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program? Tari Schreider, in Building Effective Cybersecurity Programs: A Security Manager’s Handbook, lays out the step-by-step roadmap to follow as you build or enhance your cybersecurity program.

Over 30+ years, Tari Schreider has designed and implemented cybersecurity programs throughout the world, helping hundreds of companies like yours. Building on that experience, he has created a clear roadmap that will allow the process to go more smoothly for you. Building Effective Cybersecurity Programs: A Security Manager’s Handbook is organized around the six main steps on the roadmap that will put your cybersecurity program in place:

  1. Design a Cybersecurity Program
  2. Establish a Foundation of Governance
  3. Build a Threat, Vulnerability Detection, and Intelligence Capability
  4. Build a Cyber Risk Management Capability
  5. Implement a Defense-in-Depth Strategy
  6. Apply Service Management to Cybersecurity Programs

Because Schreider has researched and analyzed over 150 cybersecurity architectures, frameworks, and models, he has saved you hundreds of hours of research. He sets you up for success by talking to you directly as a friend and colleague, using practical examples. His book helps you to:

  • Identify the proper cybersecurity program roles and responsibilities.
  • Classify assets and identify vulnerabilities.
  • Define an effective cybersecurity governance foundation.
  • Evaluate the top governance frameworks and models.
  • Automate your governance program to make it more effective.
  • Integrate security into your application development process.
  • Apply defense-in-depth as a multi-dimensional strategy.
  • Implement a service management approach to implementing countermeasures.

With this handbook, you can move forward confidently, trusting that Schreider is recommending the best components of a cybersecurity program for you. In addition, the book provides hundreds of citations and references allow you to dig deeper as you explore specific topics relevant to your organization or your studies.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

You know by now that your company could not survive without the Internet. Not in today’s market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program? Tari Schreider, in Building Effective Cybersecurity Programs: A Security Manager’s Handbook, lays out the step-by-step roadmap to follow as you build or enhance your cybersecurity program.

Over 30+ years, Tari Schreider has designed and implemented cybersecurity programs throughout the world, helping hundreds of companies like yours. Building on that experience, he has created a clear roadmap that will allow the process to go more smoothly for you. Building Effective Cybersecurity Programs: A Security Manager’s Handbook is organized around the six main steps on the roadmap that will put your cybersecurity program in place:

  1. Design a Cybersecurity Program
  2. Establish a Foundation of Governance
  3. Build a Threat, Vulnerability Detection, and Intelligence Capability
  4. Build a Cyber Risk Management Capability
  5. Implement a Defense-in-Depth Strategy
  6. Apply Service Management to Cybersecurity Programs

Because Schreider has researched and analyzed over 150 cybersecurity architectures, frameworks, and models, he has saved you hundreds of hours of research. He sets you up for success by talking to you directly as a friend and colleague, using practical examples. His book helps you to:

With this handbook, you can move forward confidently, trusting that Schreider is recommending the best components of a cybersecurity program for you. In addition, the book provides hundreds of citations and references allow you to dig deeper as you explore specific topics relevant to your organization or your studies.

More books from Rothstein Publishing

Cover of the book Blindsided by Tari Schreider
Cover of the book Creating and Maintaining Resilient Supply Chains by Tari Schreider
Cover of the book Cause Analysis Manual by Tari Schreider
Cover of the book Enterprise Security Risk Management by Tari Schreider
Cover of the book Principles and Practice of Business Continuity by Tari Schreider
Cover of the book The Manager’s Guide to Enterprise Security Risk Management by Tari Schreider
Cover of the book The Manager’s Guide to Quick Crisis Response by Tari Schreider
Cover of the book A Risk Management Approach to Business Continuity by Tari Schreider
Cover of the book Motor Disorders by Tari Schreider
Cover of the book Business Continuity Planning by Tari Schreider
Cover of the book Business Continuity Management by Tari Schreider
Cover of the book The Cost of Emotions in the Workplace by Tari Schreider
Cover of the book The Manager’s Guide to Cybersecurity Law by Tari Schreider
Cover of the book Emergency Evacuation Planning for Your Workplace by Tari Schreider
Cover of the book The Manager’s Guide to Risk Assessment by Tari Schreider
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy