Buch, Englisch, 220 Seiten, Format (B × H): 156 mm x 234 mm, Gewicht: 3540 g
Buch, Englisch, 220 Seiten, Format (B × H): 156 mm x 234 mm, Gewicht: 3540 g
ISBN: 978-1-032-55072-5
Verlag: CRC Press
Organizations of all sizes struggle to secure their data in a constantly evolving digital landscape. Expanding digital footprints and the rapid expansion of cloud strategies arising from the COVID-19 pandemic increase an organization’s attack surface. When combined with limited resources caused by the cybersecurity skills gap, securing small and mid-sized business IT infrastructures becomes more complicated. With limited staffing and budgetary restrictions, small businesses need to create cost-effective, security-driven programs that protect data while also meeting increasingly stringent compliance requirements.
This book bridges the gap between complex technical language and business objectives to create a security-first review of the security and compliance landscapes. Starting from the premise that “with security comes compliance,” this book starts by defining “security-first” and then walking readers through the process of creating a holistic security and compliance program.
Looking at security and privacy through the lens of zero trust, this overview of regulations and industry standards provides both background about and implications drawn from modern security practices. Rather than focusing solely on individual cybersecurity frameworks, this book offers insights into best practices based on the commonalities between regulations and industry standards, highlighting some of the primary differences to show the nuances.
Woven throughout are practical examples of solutions that enable small and mid-sized businesses to create “cybersustainable” security-focused policies, processes, and controls that protect today’s future for tomorrow’s digital ecosystem.
Zielgruppe
General, Postgraduate, Professional, Professional Practice & Development, and Undergraduate Advanced
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Wirtschaftswissenschaften Betriebswirtschaft Unternehmensorganisation, Corporate Responsibility Kleine und Mittlere Unternehmen
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Schadprogramme (Viren, Trojaner etc.)
Weitere Infos & Material
Chapter 1 Into the Mind of a Malicious Actor
Chapter 2 Reviewing the Compliance Landscape
Chapter 3 Compliance Risk
Chapter 4 Looking at Risk through a Security Lens
Chapter 5 How to Set Controls
Chapter 6 Continuous Monitoring
Chapter 7 Vendor Risk Management: Securing the Supply Chain
Chapter 8 Calculating the Total Cost of Compliance
Chapter 9 Information Security Audit: The What, How, and Why
Chapter 10 Cyber Liability Insurance
Chapter 11 Cybersustai nability: Ethical Data Handling for Corporate Responsibility
Chapter 12 Magic 8 Ball Says "Yes"